Author of the publication

Detecting Android Malware Based on Extreme Learning Machine.

, , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 47-53. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Take Renewable Energy into CRAN toward Green Wireless Access Networks., , , , and . IEEE Netw., 31 (4): 62-68 (2017)Spatial-Temporal Learning-Based Artificial Intelligence for IT Operations in the Edge Network., , , , , and . IEEE Netw., 35 (1): 197-203 (2021)Guest Editorial: Artificial Intelligence Empowered Future Connection., , , , , and . IEEE Netw., 35 (4): 118-119 (2021)Improving Power Efficiency for Online Video Streaming Service: A Self-Adaptive Approach., , , , , and . IEEE Trans. Sustain. Comput., 4 (3): 308-313 (2019)SDN-NFV-Aided Edge-Cloud Interplay for 5G-Envisioned Energy Internet Ecosystem., , , and . IEEE Netw., 35 (1): 356-364 (2021)When UAV Swarm Meets Edge-Cloud Computing: The QoS Perspective., , , , and . IEEE Netw., 33 (2): 36-43 (2019)Edge QoE: Intelligent Big Data Caching via Deep Reinforcement Learning., , , , and . IEEE Netw., 34 (4): 8-13 (2020)VeriDKG: A Verifiable SPARQL Query Engine for Decentralized Knowledge Graphs., , , , , , , and . Proc. VLDB Endow., 17 (4): 912-925 (December 2023)A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools., , , , and . ACM Comput. Surv., 54 (2): 44:1-44:42 (2022)Edge Learning: The Enabling Technology for Distributed Big Data Analytics in the Edge., , , , , , and . ACM Comput. Surv., 54 (7): 151:1-151:36 (2022)