Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning., , , and . CoRR, (2023)Adversarial Text-Based CAPTCHA Generation Method Utilizing Spatial Smoothing., , and . GLOBECOM, page 1-6. IEEE, (2021)An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio., , , and . IEICE Trans. Inf. Syst., 102-D (6): 1136-1144 (2019)Modeling the Relationship Between Stress and Appetite to Create a Dish Recommendation System Based on Desired Nutrients., , and . AHFE (1), volume 585 of Advances in Intelligent Systems and Computing, page 379-386. Springer, (2017)Android Malware Detection Scheme Based on Level of SSL Server Certificate., , and . GLOBECOM, page 1-6. IEEE, (2019)Android Malware Detection Scheme Based on Level of SSL Server Certificate., , and . IEICE Trans. Inf. Syst., 103-D (2): 379-389 (2020)A Preprocessing by Using Multiple Steganography for Intentional Image Downsampling on CNN-Based Steganalysis., , , and . IEEE Access, (2020)A Realtime IoT Malware Classification System Based on Pending Samples., , , and . ICC, page 4373-4378. IEEE, (2023)Texting while Walking Deterrence System by Vibration of Smartphone., and . IMCOM, page 69:1-69:5. ACM, (2018)A Website Fingerprinting Attack based on the Virtual Memory of the Process on Android Devices., , , and . APCC, page 7-12. IEEE, (2021)