Author of the publication

Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms.

, , , , and . AsiaCCS, page 479-493. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Quality of Service of Cloud Gaming Systems., , , , , and . IEEE Trans. Multim., 16 (2): 480-495 (2014)Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled., , , and . J. Inf. Sci. Eng., 31 (3): 943-963 (2015)Placing Virtual Machines to Optimize Cloud Gaming Experience., , , , and . IEEE Trans. Cloud Computing, 3 (1): 42-53 (2015)To Cloud or Not to Cloud: Measuring the Performance of Mobile Gaming., , , , and . MobiGames@MobiSys, page 19-24. ACM, (2015)A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs., , , , and . HiPC, volume 3769 of Lecture Notes in Computer Science, page 432-443. Springer, (2005)Measuring Objective Visual Quality of Real-Time Communication Systems in the Wild., , , and . Int. J. Semantic Comput., 16 (2): 257-280 (2022)Guided Malware Sample Analysis Based on Graph Neural Networks., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)GPU consolidation for cloud games: Are we there yet?, , , , , and . NETGAMES, page 1-6. IEEE, (2014)Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography Area., , and . ICCSA (3), volume 3982 of Lecture Notes in Computer Science, page 610-620. Springer, (2006)Confessible Threshold Ring Signatures., , , and . ICSNC, page 25. IEEE Computer Society, (2006)