Author of the publication

ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification.

, , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward the identification of DSLR lenses by chromatic aberration., , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788010. SPIE, (2011)Protocols for data hiding in pseudo-random state., , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540W. SPIE, (2009)A Hands-On Mobile Device Forensics Course in Cybersecurity Education.. TALE, page 1-5. IEEE, (2021)Enhancing Teaching Effectiveness in Mobile Application Development with Structured Practice., and . TALE, page 1-5. IEEE, (2019)ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Robust Image Steganography: Hiding Messages in Frequency Coefficients., , , , and . AAAI, page 14955-14963. AAAI Press, (2023)A supraliminal channel in a wireless phone application., and . MM&Sec, page 151-154. ACM, (2009)A Forensic Mobile Application Designed for both Steganalysis and Steganography in Digital Images., and . MOBMU, page 84-89. Society for Imaging Science and Technology, (2017)A Supraliminal Channel in a Videoconferencing Application., , , and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 283-293. Springer, (2008)A square-root law for active wardens., and . MM&Sec, page 87-92. ACM, (2011)