Author of the publication

Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification.

, , , and . COMPSAC, page 940-945. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Currency exchange system for electronic moneys., , and . ECIS, page 909-922. (2001)An effective power saving method in Geo-fencing service using temperature sensors., , , and . ICCE-TW, page 139-140. IEEE, (2014)An automatic training system against advanced persistent threat., , , and . ICMU, page 1-2. IEEE, (2017)A method to improve network performance of Proxy Mobile IPv6., , and . ICMU, page 74-75. IEEE Computer Society, (2015)Transmission Reduction Scheme in an Emergency Warning System with LTE D2D., , , and . ICMU, page 1-6. IEEE, (2019)Classification of Unknown Web Sites Based on Yearly Changes of Distribution Information of Malicious IP Addresses., , , and . NTMS, page 1-4. IEEE, (2018)Relay UE Selection Scheme in an Emergency Warning System Integrating Proximity Services., , , and . CCNC, page 1-2. IEEE, (2019)On designing end-user multicast for multiple video sources., , , , , and . ICME, page 497-500. IEEE Computer Society, (2003)Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification., , , and . COMPSAC, page 940-945. IEEE, (2023)Personally Customizable Group Navigation System Using Cellular Phones and Wireless Ad-Hoc Communication., , , , and . ICME, page 1342-1345. IEEE Computer Society, (2005)