From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Collective classification for packed executable identification., , , , и . CEAS, стр. 23-30. ACM, (2011)Surface Defect Modelling Using Co-occurrence Matrix and Fast Fourier Transformation., , , и . HAIS, том 11734 из Lecture Notes in Computer Science, стр. 745-757. Springer, (2019)Countering entropy measure attacks on packed software detection., , , , и . CCNC, стр. 164-168. IEEE, (2012)Content-Based Authorship Identification for Short Texts in Social Media Networks., , , , , , , и . HAIS, том 12886 из Lecture Notes in Computer Science, стр. 27-37. Springer, (2021)Quality assessment methodology based on machine learning with small datasets: Industrial castings defects., , , , , и . Neurocomputing, (2021)Idea: Opcode-Sequence-Based Malware Detection., , , , , , и . ESSoS, том 5965 из Lecture Notes in Computer Science, стр. 35-43. Springer, (2010)The Evolution of Permission as Feature for Android Malware Detection., , , и . CISIS-ICEUTE, том 369 из Advances in Intelligent Systems and Computing, стр. 389-400. Springer, (2015)Mitigating Toxicity in Dialogue Agents through Adversarial Reinforcement Learning., , и . AEQUITAS@ECAI, том 3808 из CEUR Workshop Proceedings, CEUR-WS.org, (2024)Anomaly-based Spam Filtering., , , , и . SECRYPT, стр. 5-14. SciTePress, (2011)Opcode-Sequence-Based Semi-supervised Unknown Malware Detection., , , , и . CISIS, том 6694 из Lecture Notes in Computer Science, стр. 50-57. Springer, (2011)