Author of the publication

ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification.

, , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward the identification of DSLR lenses by chromatic aberration., , and . Media Forensics and Security, volume 7880 of SPIE Proceedings, page 788010. SPIE, (2011)Protocols for data hiding in pseudo-random state., , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540W. SPIE, (2009)A Hands-On Mobile Device Forensics Course in Cybersecurity Education.. TALE, page 1-5. IEEE, (2021)Capacity Limits of Pseudorandom Channels in Deception Problems., , and . IEEE Trans. Inf. Forensics Secur., 10 (9): 1824-1834 (2015)Enhancing Teaching Effectiveness in Mobile Application Development with Structured Practice., and . TALE, page 1-5. IEEE, (2019)A supraliminal channel in a wireless phone application., and . MM&Sec, page 151-154. ACM, (2009)ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Robust Image Steganography: Hiding Messages in Frequency Coefficients., , , , and . AAAI, page 14955-14963. AAAI Press, (2023)Robust data hiding for JPEG images with invertible neural network., , , , and . Neural Networks, (2023)A Supraliminal Channel in a Videoconferencing Application., , , and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 283-293. Springer, (2008)