Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel semi-supervised approach for feature extraction., , , , , and . IJCNN, page 3765-3770. IEEE, (2016)Densely Connected Convolutional Networks With Attention LSTM for Crowd Flows Prediction., , , , , and . IEEE Access, (2019)Joint network embedding of network structure and node attributes via deep autoencoder., , , , , and . Neurocomputing, (2022)Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware., , , , , and . ADMA, volume 11323 of Lecture Notes in Computer Science, page 238-254. Springer, (2018)Cyber Code Intelligence for Android Malware Detection., , , , , , and . IEEE Trans. Cybern., 53 (1): 617-627 (2023)Data-Driven Android Malware Intelligence: A Survey., , , , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 183-202. Springer, (2019)Online learning for vector autoregressive moving-average time series prediction., , , and . Neurocomputing, (2018)Rotation Exploration Transformer for Aerial Person Re-identification., , , and . ICME, page 1-6. IEEE, (2024)A Survey of Android Malware Detection with Deep Neural Models., , , , , and . ACM Comput. Surv., 53 (6): 126:1-126:36 (2021)Improving the Transferability of Adversarial Examples with Resized-Diverse-Inputs, Diversity-Ensemble and Region Fitting., , , , , and . ECCV (22), volume 12367 of Lecture Notes in Computer Science, page 563-579. Springer, (2020)