From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Android malware detection using convolutional neural networks and data section images., , , , , и . RACS, стр. 149-153. ACM, (2018)A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information., , , , , и . ICUFN, стр. 478-483. IEEE, (2019)A remotely controlled out-pipe climbing robot., , и . URAI, стр. 126. IEEE, (2013)RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks., , , , , , и . LEET, USENIX Association, (2012)Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor., , , , и . EUC, том 3207 из Lecture Notes in Computer Science, стр. 174-182. Springer, (2004)Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems., и . EUC Workshops, том 4097 из Lecture Notes in Computer Science, стр. 755-764. Springer, (2006)Multiple Antennas with a Reduced Iterative Turbo Decoder for A DS-CDMA System., , , , и . ICC (3), стр. 1233-1237. IEEE, (2000)Energy Consumption Optimization of Real-Time Embedded Systems., , , , , , и . ICESS, стр. 281-287. IEEE Computer Society, (2009)Sustainability of Machine Learning-based Android Malware Detection Using API calls and Permissions., , , , и . AIKE, стр. 18-25. IEEE, (2022)Machine learning-based software classification scheme for efficient program similarity analysis., , , , , и . RACS, стр. 114-118. ACM, (2015)