Author of the publication

A Malware Detection Method of Code Texture Visualization Based on an Improved Faster RCNN Combining Transfer Learning.

, , , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-scanning research for MPWFRFT communication signals., and . Wireless Networks, 26 (1): 723-737 (2020)An Acquisition Algorithm with NCCFR for BOC Modulated Signals., , , and . J. Electr. Comput. Eng., (2017)A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning., , , , and . Secur. Commun. Networks, (2019)Incremental-data stealth-transmission method in DSSS., , and . Wirel. Networks, 27 (4): 2441-2449 (2021)A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack., , , and . Secur. Commun. Networks, (2018)An Energy Efficient and QoS Aware Routing Algorithm Based on Data Classification for Industrial Wireless Sensor Networks., , , , and . IEEE Access, (2018)A Novel Method for Node Fault Detection Based on Clustering in Industrial Wireless Sensor Networks., , , , , , and . IJDSN, (2015)Large-scale fire rescue in wearable wireless sensor networks: A hole processing and trust value-based mobile adaptive routing algorithm., , , , and . Int. J. Commun. Syst., (2020)Energy Consumption Balanced Topology Variable Routing Algorithm for WWSN in Disaster Rescue Scenarios., , , , and . Int. J. Online Biomed. Eng., 15 (7): 52-65 (2019)The Research of Reconfiguration Technology in Mobile Ad Hoc Network., , and . FGCN (2), page 173-177. IEEE Computer Society, (2008)978-0-7695-3431-2.