Author of the publication

Detecting Android Malware Based on Extreme Learning Machine.

, , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 47-53. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Android Malware Based on Extreme Learning Machine., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 47-53. IEEE Computer Society, (2017)Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation., , , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 69-88. Springer, (2022)The iEBE-VISHNU code package for relativistic heavy-ion collisions, , , , , and . (Aug 21, 2015)Application of an Improved YOLOv5 Algorithm in Real-Time Detection of Foreign Objects by Ground Penetrating Radar., , , , , and . Remote. Sens., 14 (8): 1895 (2022)A Fault-Tolerant Integrated Borehole Trajectory Location Method Based on Geomagnetism/IMU of MWD., , , , , and . IEEE Access, (2019)Real-Time Pattern-Recognition of GPR Images with YOLO v3 Implemented by Tensorflow., , , and . Sensors, 20 (22): 6476 (2020)Wdcnn-based Fault Diagnosis method for AGV on Cloud Platform., , , , and . Int. J. Robotics Autom., 39 (2): 150-160 (2024)Solar Energy Product Based on Variable Length Gene Expression and Intuition Models., , , , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 802-809. Springer, (2012)Preserving privacy information flow security in composite service evolution., , , , , and . Frontiers Inf. Technol. Electron. Eng., 19 (5): 626-638 (2018)Flexible WDM/FTDM passive optical network with RZ-seeded all-optical sub-wavelength grid engine., , , , , , , , and . OFC/NFOEC, page 1-3. IEEE, (2013)