Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing software modularization via semantic outliers filtration and label propagation., , , , and . Inf. Softw. Technol., (2022)MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price., , , and . IJCNN, page 1-8. IEEE, (2021)Feature Selection for Malware Detection Based on Reinforcement Learning., , , and . IEEE Access, (2019)Evading Anti-Malware Engines With Deep Reinforcement Learning., , , , , and . IEEE Access, (2019)A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack., , , , , and . Comput. Secur., (February 2024)Web-Based Software Reliability Analysis and Measurement System., , , and . ICAIC (4), volume 227 of Communications in Computer and Information Science, page 664-670. Springer, (2011)LMTracker: Lateral movement path detection based on heterogeneous graph embedding., , , and . Neurocomputing, (2022)A Systematic Overview of Android Malware Detection., , , , , , , and . Appl. Artif. Intell., (2022)DroidRL: Reinforcement Learning Driven Feature Selection for Android Malware Detection., , , , , , and . CoRR, (2022)DroidRL: Feature selection for android malware detection with reinforcement learning., , , , , , and . Comput. Secur., (May 2023)