Author of the publication

Obfusifier: Obfuscation-Resistant Android Malware Detection System.

, , , , and . SecureComm (1), volume 304 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 214-234. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combinatorial online high-order interactive feature selection based on dynamic graph convolution network., , , , and . Signal Process., (November 2023)Compliant encryption scheme for JPEG 2000 image code streams., and . J. Electronic Imaging, 15 (4): 043013 (2006)Ubiquitous System Capabilities and User Readiness: an Activity Perspective.. PACIS, page 112. (2016)An efficient flicker noise reduction method for single images., , , , and . Color Imaging: Displaying, Processing, Hardcopy, and Applications, volume 8652 of SPIE Proceedings, page 86520B. SPIE, (2013)HAIL: a language for easy and correct device access., , , and . EMSOFT, page 1-9. ACM, (2005)Tactical Network Integration Test Framework., , , , , , , and . MILCOM, page 2158-2163. IEEE, (2011)Pedestrian Recognition Based on SVM., and . IMECS, page 60-63. Newswood Limited, (2006)Wavelet image coding based on directional dilation., , and . VCIP, volume 4671 of Proceedings of SPIE, page 1175-1184. SPIE, (2002)An improved quantum-behaved particle swarm optimization for multi-peak optimization problems., , , and . Int. J. Comput. Math., 88 (3): 517-532 (2011)Multilevel Thresholding for Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Algorithm., , , and . IEEE Trans. Instrumentation and Measurement, 59 (4): 934-946 (2010)