Author of the publication

Semantic modelling of Android malware for effective malware comprehension, detection, and classification.

, , , , , and . ISSTA, page 306-317. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Semantic Data Parallel Query Method Based on Hadoop., , , , , and . WISE (1), volume 10041 of Lecture Notes in Computer Science, page 396-404. (2016)Research on Color Normalization of Traffic Sign Image Based on Surface Segmentation and Improved K-means Clustering Algorithm., , and . CSAE, page 170:1-170:7. ACM, (2020)Modeling and analysis of Bernoulli production systems with split and merge., and . ICRA, page 3618-3623. IEEE, (2008)Learning from Ontologies for Common Meaningful Structures., , and . Web Intelligence, page 397-400. IEEE Computer Society, (2005)Controllability of Boolean control networks with time delays both in states and inputs., , and . Neurocomputing, (2014)Unsupervised Word Sense Discrimination Improves Construction of the Wordnets., and . Web Intelligence/IAT Workshops, page 279-282. IEEE Computer Society, (2009)978-0-7695-3801-3.Performance Improvement of DSTBC Systems Using Decision Feedback Approach., , and . ICSNC, page 115-120. IEEE Computer Society, (2008)Intelligent Model-Based Speed Controller Design for PMSM., , and . BIC-TA, volume 472 of Communications in Computer and Information Science, page 435-439. Springer, (2014)Expert Self-tuning Using Fuzzy Reasoning for PID Controller., , and . BIC-TA, volume 472 of Communications in Computer and Information Science, page 138-141. Springer, (2014)MTF based Kalman filtering with linear prediction for power envelope restoration., and . ISPACS, page 198-203. IEEE, (2013)