Author of the publication

Feature selection-based android malware adversarial sample generation and detection method.

, , , , and . IET Inf. Secur., 15 (6): 401-416 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path Planning for Autonomous Underwater Vehicle in Presence of Moving Obstacle Based on Three Inputs Fuzzy Logic., , , and . ACIRS, page 265-268. IEEE, (2019)Computer-Controlled Variable Structure Systems: The State-of-the-Art., , and . IEEE Trans. Ind. Informatics, 8 (2): 197-205 (2012)SamEn-SVR: using sample entropy and support vector regression for bug number prediction., , , , and . IET Softw., 12 (3): 183-189 (2018)A hybrid recommendation algorithm based on user comment sentiment and matrix decomposition., , , , and . Inf. Syst., (July 2023)Design of DNA Storage Coding with Enhanced Constraints., , and . Entropy, 24 (8): 1151 (2022)Integrated Deep Implicit CSI Feedback and Beamforming Design for FDD mmWave Massive MIMO Systems., , , , and . IEEE Wirel. Commun. Lett., 12 (1): 119-123 (2023)Forensics Analysis of Resampling via ConvNeXt Block., , , , , and . J. Circuits Syst. Comput., 32 (2): 2350033:1-2350033:17 (January 2023)The Application Research of Predicting Amount of Gas Gushing Based on Gray Theory and Artificial Neural Network., , , , and . CSO (2), page 385-387. IEEE Computer Society, (2009)978-0-7695-3605-7.Parallel Reducts in a Series of Decision Subsystems., , and . CSO (2), page 377-380. IEEE Computer Society, (2009)978-0-7695-3605-7.Efficient and Verifiable Privacy-Preserving Federal Learning Framework., , , and . ICISCAE, page 690-695. IEEE, (2022)