Author of the publication

Malware classification using word embeddings algorithms and long-short term memory networks.

, , , and . Comput. Intell., 38 (5): 1802-1830 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Construction of Real-World Datasets for 3D Object Localization using Two Cameras., , , and . CoRR, (2017)Combining pretrained CNN feature extractors to enhance clustering of complex natural images., , , , and . CoRR, (2021)Unifying Evaluation of Machine Learning Safety Monitors., , , and . ISSRE, page 414-422. IEEE, (2022)Certifying Emergency Landing for Safe Urban UAV., , and . DSN Workshops, page 55-62. IEEE, (2021)A Model Based on LSTM Neural Networks to Identify Five Different Types of Malware., , , , and . KES, volume 159 of Procedia Computer Science, page 182-191. Elsevier, (2019)Unsupervised robotic sorting: Towards autonomous decision making robots., , , and . CoRR, (2018)Semantically Meaningful View Selection., , , , and . IROS, page 1061-1066. IEEE, (2018)Automatic Construction of Real-World Datasets for 3D Object Localization Using Two Cameras., , , , and . IECON, page 3655-3658. IEEE, (2018)Learning local trajectories for high precision robotic tasks: Application to KUKA LBR iiwa Cartesian positioning., , , and . IECON, page 5316-5321. IEEE, (2016)Robust Detection of Objects under Periodic Motion with Gaussian Process Filtering., , and . ICMLA, page 685-692. IEEE, (2020)