From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Empirical Study on Android Malware Characterization by Social Network Analysis., , , и . IEEE Trans. Reliab., 73 (1): 757-770 (марта 2024)Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency., , , , и . IET Image Process., 14 (14): 3314-3323 (2020)Gamification narrative design as a predictor for mobile fitness app user persistent usage intentions: a goal priming perspective., , , и . Enterp. Inf. Syst., 15 (10): 1501-1545 (2021)Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?, , , , , , и . ISSTA, стр. 1407-1419. ACM, (2023)SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis., , , , , , , и . ASE, стр. 821-833. IEEE, (2020)MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis., , , , , и . ASE, стр. 139-150. IEEE, (2019)TGMM: Combining Parse Tree with GPU for Scalable Multilingual and Multi-Granularity Code Clone Detection., , , , и . CoRR, (2024)Gitor: Scalable Code Clone Detection by Building Global Sample Graph., , , , и . ESEC/SIGSOFT FSE, стр. 784-795. ACM, (2023)A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments., , , , , и . ICSE, стр. 12:1-12:13. ACM, (2024)Historical Embedding-Guided Efficient Large-Scale Federated Graph Learning., , , , , , , и . Proc. ACM Manag. Data, 2 (3): 144 (2024)