Author of the publication

A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks.

, , , , , and . Expert Syst. Appl., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The robust deep learning-based schemes for intrusion detection in Internet of Things environments., , , , and . Ann. des Télécommunications, 76 (5-6): 273-285 (2021)Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices., , , and . Trans. Emerg. Telecommun. Technol., (2019)Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing., , , , , and . Inf., 9 (10): 242 (2018)Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server Environments., , , , , and . DSC, page 38-45. IEEE, (2019)Model of the intrusion detection system based on the integration of spatial-temporal features., , , , , and . Comput. Secur., (2020)GPLFR - Global perspective and local flow registration-for forward-looking sonar images., , , , and . Neural Comput. Appl., 34 (15): 12663-12679 (2022)Attribute Based Encryption with Efficient Revocation from Lattices., , , , , and . Int. J. Netw. Secur., 22 (1): 161-170 (2020)Large universe attribute based access control with efficient decryption in cloud storage system., , , and . J. Syst. Softw., (2018)Offline/Online lattice-based ciphertext policy attribute-based encryption., , , , , and . J. Syst. Archit., (2022)A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks., , , , , and . Expert Syst. Appl., (2024)