Author of the publication

A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning.

, , , , and . Secur. Commun. Networks, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved differential evolution to continuous domains and its convergence., , and . GEC Summit, page 1061-1064. ACM, (2009)MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters., , and . Int. J. Secur. Networks, 18 (3): 133-142 (2023)Self-supervised pairwise-sample resistance model for few-shot classification., , , and . Appl. Intell., 53 (18): 20661-20674 (September 2023)An Energy Efficient and QoS Aware Routing Algorithm Based on Data Classification for Industrial Wireless Sensor Networks., , , , and . IEEE Access, (2018)A Scheduling Model of Isochronous Frame Generation on Self-similar Traffic of AOS Multiplexing., and . Int. J. Online Eng., 14 (7): 15-29 (2018)MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization., , , and . Secur. Commun. Networks, (2019)The Research of Reconfiguration Technology in Mobile Ad Hoc Network., , and . FGCN (2), page 173-177. IEEE Computer Society, (2008)978-0-7695-3431-2.An Enhanced Grey Wolf Algorithm Based on Equalization Mechanism., , and . ISMSI, page 123-128. ACM, (2020)An Improved Ant Colony Algorithm for Path Planning in One Scenic Area With Many Spots., , , and . IEEE Access, (2017)A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning., , , , and . Secur. Commun. Networks, (2019)