Author of the publication

Comprehensive Behavior Profiling Model for Malware Classification.

, , , and . ISCC, page 129-135. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Person Re-identification based on nonlinear ranking with difference vectors., , , , , and . Inf. Sci., (2014)An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling., , , , and . J. Multim., 5 (5): 464-472 (2010)Global-Local Graph Convolutional Network for cross-modality person re-identification., , , , , and . Neurocomputing, (2021)Saliency and Granularity: Discovering Temporal Coherence for Video-Based Person Re-Identification., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 6100-6112 (2022)NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary., , , , , , and . WASA (2), volume 12938 of Lecture Notes in Computer Science, page 147-159. Springer, (2021)Are we really making much progress?: Revisiting, benchmarking and refining heterogeneous graph neural networks., , , , , , , , , and . KDD, page 1150-1160. ACM, (2021)HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph., , , , , , and . HPCC/DSS/SmartCity, page 328-335. IEEE, (2020)CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection., , , , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 1834-1841. IOS Press, (2020)Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks., , , , and . ISCSCT (1), page 216-219. IEEE Computer Society, (2008)A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph., , , , , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 130-143. Springer, (2017)