Author of the publication

User Travelling Pattern Prediction via Indistinct Cellular Data Mining.

, , , , , , and . UIC/ATC, page 17-24. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An autonomous online malicious spam email detection system using extended RBF network., , , , and . IJCNN, page 1-7. IEEE, (2015)Application of string kernel based support vector machine for malware packer identification., , , , and . IJCNN, page 1-8. IEEE, (2013)An Accurate Packer Identification Method Using Support Vector Machine., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (1): 253-263 (2014)A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis., , and . ICONIP (2), volume 6444 of Lecture Notes in Computer Science, page 267-274. Springer, (2010)Using Genetic Algorithm to Balance the D-Index Algorithm for Metric Search.. ICONIP (2), volume 4985 of Lecture Notes in Computer Science, page 264-273. Springer, (2007)Discovery of Relationships between Interests from Bulletin Board System by Dissimilarity Reconstruction., , and . Discovery Science, volume 2843 of Lecture Notes in Computer Science, page 328-335. Springer, (2003)Fine-Grained Risk Level Quantication Schemes Based on APK Metadata., , , and . ICONIP (3), volume 9491 of Lecture Notes in Computer Science, page 663-673. Springer, (2015)A scalable and accurate feature representation method for identifying malicious mobile applications., , , , , and . SAC, page 1182-1189. ACM, (2019)Generating Labeled Training Datasets Towards Unified Network Intrusion Detection Systems., , , , , and . IEEE Access, (2022)Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks., , , , , , , , and . IEEE Access, (2021)