Author of the publication

Malware Detection Method Based on CNN.

, and . ICS, volume 1013 of Communications in Computer and Information Science, page 608-617. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack and Improvement on the Lee-Chiu Remote Authentication Schem., and . DMS, page 357-360. Knowledge Systems Institute, (2005)Comments on Ä Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation".. IEEE Trans. Multim., 9 (2): 420-421 (2007)Hybrid GEMD Data Hiding., and . J. Inf. Hiding Multim. Signal Process., 5 (3): 420-430 (2014)Study on Android Hybrid Malware Detection Based on Machine Learning., , and . ICCCS, page 31-35. IEEE, (2019)Secure multi-group data hiding based on gemd map., , , and . Multimedia Tools Appl., 76 (2): 1901-1919 (2017)High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement., , and . ITCS, volume 180 of Lecture Notes in Electrical Engineering, page 285-291. Springer, (2012)A DoS-Resistant Robust Identification and Key Agreement Protocol with User Anonymity., , , and . J. Inf. Hiding Multim. Signal Process., 5 (4): 666-671 (2014)Digitally signed document flexible sanitizing scheme based on bilinear maps., , , and . ISI, page 172. IEEE, (2010)A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method., , , and . HIS (3), page 69-72. IEEE Computer Society, (2009)On ElGamal Signature Scheme.. FGCN (2), page 151-153. IEEE Computer Society, (2007)