Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes., , , , , and . J. Inf. Process., (2019)Detecting Privacy Information Abuse by Android Apps from API Call Logs., , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 143-157. Springer, (2018)Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network., , , and . IEEE Access, (2022)Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning., , , and . IEEE Access, (2024)Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition., , , and . ICISSP, page 325-332. SCITEPRESS, (2020)A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High Dependability., , and . IWIA, page 21-29. IEEE, (2010)Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function., , , and . ICOIN, page 273-278. IEEE, (2021)BTB Energy Reduction by Focusing on Useless Accesses., , , , and . IEICE Trans. Electron., 98-C (7): 569-579 (2015)Improvement of Data Utilization Efficiency for Cache Memory by Compressing Frequent Bit Sequences., , and . IEICE Trans. Electron., 99-C (8): 936-946 (2016)Malware Detection based on HTTPS Characteristic via Machine Learning., , , and . ICISSP, page 410-417. SciTePress, (2018)