Author of the publication

Detecting Privacy Information Abuse by Android Apps from API Call Logs.

, , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 143-157. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes., , , , , and . J. Inf. Process., (2019)A neural network approach to multi-language text-to-speech system., and . ICSLP, page 325-328. ISCA, (1990)Detecting Privacy Information Abuse by Android Apps from API Call Logs., , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 143-157. Springer, (2018)Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network., , , and . IEEE Access, (2022)Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning., , , and . IEEE Access, (2024)Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition., , , and . ICISSP, page 325-332. SCITEPRESS, (2020)Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function., , , and . ICOIN, page 273-278. IEEE, (2021)Construction of Structurally Annotated Spoken Dialogue Corpus., , , and . ALR/ALRN@IJCNLP, ACL, (2005)Cyber Attack Stage Tracing System based on Attack Scenario Comparison., , , , and . ICISSP, page 587-594. SCITEPRESS, (2022)Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network., , , and . COMPSAC, page 1495-1501. IEEE, (2022)