Author of the publication

Effective and Efficient Malware Detection at the End Host.

, , , , , and . USENIX Security Symposium, page 351-366. USENIX Association, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local Importance Representation Convolutional Neural Network for Fine-Grained Image Classification., , and . Symmetry, 10 (10): 479 (2018)Privacy in the Genomic Era., , , , , , , and . ACM Comput. Surv., 48 (1): 6:1-6:44 (2015)Beyond Risk-Based Access Control: Towards Incentive-Based Access Control., , , and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 102-112. Springer, (2011)DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 271-284. Springer, (2013)A Semantic-Based Malware Detection System Design Based on Channels., , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 653-662. Springer, (2014)Automated Segmentation Using a Fast Implementation of the Chan-Vese Models., and . ICIC (2), volume 5227 of Lecture Notes in Computer Science, page 1135-1141. Springer, (2008)Robust Adaptive Neural Network Control for Strict-Feedback Nonlinear Systems Via Small-Gain Approaches., , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 888-897. Springer, (2006)High-Fidelity Router Emulation Technologies Based on Multi-Scale Virtualization., , , and . Information, 11 (1): 47 (2020)An efficient local Chan-Vese model for image segmentation., , and . Pattern Recognit., 43 (3): 603-618 (2010)Creativity in Agile Systems Development: A Literature Review., , and . CreativeSME, volume 301 of IFIP Advances in Information and Communication Technology, page 122-134. Springer, (2009)