Author of the publication

Malware Detection Systems Based on API Log Data Mining.

, , , and . COMPSAC Workshops, page 255-260. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Date attachable electronic cash., , and . Comput. Commun., 23 (4): 425-428 (2000)Randomization enhanced Chaum's blind signature scheme., , and . Comput. Commun., 23 (17): 1677-1680 (2000)Risk of Bitcoin Addresses to be Identified from Features of Output Addresses., , and . DSC, page 1-6. IEEE, (2018)Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments., , , , and . MobiQuitous (Adjunct Proceedings), page 88-93. ACM, (2016)Active One-Time Password Mechanism for User Authentication., , , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 464-471. Springer, (2013)Attribute-Based Encryption from Identity-Based Encryption., , and . IACR Cryptology ePrint Archive, (2017)Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol., , and . IACR Cryptology ePrint Archive, (2005)Buyer-seller watermarking protocols with off-line trusted third parties., , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (1): 36-43 (2009)WeisoEvent: A Ming-Weiso Event Analytics Tool with Named Entity Markup and Spatial-Temporal Information Linking., , , , , and . DH, Alliance of Digital Humanities Organizations (ADHO), (2017)Automatic Labeled Data Generation for Person Named Entity Disambiguation on the Ming Shilu., , , and . DH, (2020)