Author of the publication

Comparison of Three Deep Learning-based Approaches for IoT Malware Detection.

, , , , , and . KSE, page 382-388. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transfer Learning for Predicting Software Faults., , and . KSE, page 1-6. IEEE, (2019)Comparison of Three Deep Learning-based Approaches for IoT Malware Detection., , , , , and . KSE, page 382-388. IEEE, (2018)Towards An Accurate and Effective Printed Document Reader for Visually Impaired People., , , , , and . KSE, page 1-5. IEEE, (2022)A Summary of the ALQAC 2021 Competition., , , , , , , , , and 6 other author(s). KSE, page 1-5. IEEE, (2021)Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks., , and . ARES, page 157:1-157:10. ACM, (2024)Deep learning and sub-tree mining for document level sentiment classification., , and . KSE, page 268-273. IEEE, (2016)IoT Malware Detection based on Latent Representation., , , and . KSE, page 177-182. IEEE, (2020)Automated Large Program Repair based on Big Code., , and . SoICT, page 375-381. ACM, (2018)Convolutional Neural Networks over Control Flow Graphs for Software Defect Prediction., , and . ICTAI, page 45-52. IEEE Computer Society, (2017)ALQAC 2022: A Summary of the Competition., , , , , , , , , and 9 other author(s). KSE, page 1-5. IEEE, (2022)