Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory forensics using virtual machine introspection for Malware analysis., , , and . DSC, page 518-519. IEEE, (2017)ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family., , , , , and . PRDC, page 257-262. IEEE, (2018)The Symmetric NAT and its Traversal Method., and . International Conference on Internet Computing, page 44-48. CSREA Press, (2010)A scalable and accurate feature representation method for identifying malicious mobile applications., , , , , and . SAC, page 1182-1189. ACM, (2019)The 2-Rainbow Domination of Sierpiński Graphs and Extended Sierpiński Graphs., , and . Theory Comput. Syst., 61 (3): 893-906 (2017)Using Machine Learning and Internet of Things Framework to Analyze Eggs Hatching., , , , and . SGIoT, volume 354 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 14-19. Springer, (2020)The Weighted Independent Domination Problem in Series-Parallel Graphs., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 77-84. IOS Press, (2014)Application of Optimization Technique for GPS Navigation Kalman Filter Adaptation., and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 227-234. Springer, (2008)A consistency analysis on an acoustic module for Mandarin text-to-speech., , and . Speech Commun., 55 (2): 266-277 (2013)Early load: Hiding load latency in deep pipeline processor., , , and . ACSAC, page 1-8. IEEE Computer Society, (2008)