Author of the publication

A Transparent and Multimodal Malware Detection Method for Android Apps.

, , , , , and . MSWiM, page 51-60. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Indoor localization based on subcarrier parameter estimation of LoS with wi-fi., , , , and . MobiQuitous, page 80-89. ACM, (2019)Trusted access in wireless network on mutual interactive authentication mechanism., , , and . ChinaCom, page 776-781. IEEE Computer Society, (2015)A Novel Approach based on Improved Naive Bayes for 5G Air Interface DDoS Detection., , , and . WCNC, page 1-6. IEEE, (2023)Fusion of Wireless Signal and Computer Vision for Identification and Tracking., , and . ICT, page 1-7. IEEE, (2021)A Novel Caching Strategy in Social Content-Centric Networking with Mobile Edge Computing., , , , , , , and . ISCC, page 1-6. IEEE, (2020)DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data., , , , and . ISCC, page 438-443. IEEE Computer Society, (2017)RAP-Net: A Resource Access Pattern Network for Insider Threat Detection., , , , , and . IJCNN, page 1-8. IEEE, (2022)Direct-path based fingerprint extraction algorithm for indoor localization., , , and . MobiQuitous, page 11-18. ACM, (2018)TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps., , , , , , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 541-556. Springer, (2022)Dynamic PBFT with Active Removal., , , and . ISCC, page 1235-1241. IEEE, (2023)