Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Privacy Information Abuse by Android Apps from API Call Logs., , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 143-157. Springer, (2018)Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes., , , , , and . J. Inf. Process., (2019)Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network., , , and . IEEE Access, (2022)Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning., , , and . IEEE Access, (2024)Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function., , , and . ICOIN, page 273-278. IEEE, (2021)A Stage-Level Recovery Scheme in Scalable Pipeline Modules for High Dependability., , and . IWIA, page 21-29. IEEE, (2010)Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition., , , and . ICISSP, page 325-332. SCITEPRESS, (2020)Malware originated HTTP traffic detection utilizing cluster appearance ratio., , , , , and . ICOIN, page 248-253. IEEE, (2017)Rogue Wireless AP Detection using Delay Fluctuation in Backbone Network., , , and . COMPSAC (1), page 936-937. IEEE, (2019)Malware Detection with Deep Neural Network Using Process Behavior., , , , and . COMPSAC Workshops, page 577-582. IEEE Computer Society, (2016)978-1-4673-8845-0.