Author of the publication

Feature representation and selection in malicious code detection methods based on static system calls.

, , , , and . Comput. Secur., 30 (6-7): 514-524 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ranking algorithm based on relational topic model., , , and . IJCNN, page 1-8. IEEE, (2015)Object retrival based on visual word pairs., , , and . ICIP, page 1929-1932. IEEE, (2012)Genre identification of Chinese finance text using machine learning method., , , and . SMC, page 455-459. IEEE, (2008)A Denoising Framework for Image Caption., , , and . DASC/PiCom/DataCom/CyberSciTech, page 825-832. IEEE, (2019)A fast malware detection algorithm based on objective-oriented association mining., , , , and . Comput. Secur., (2013)The Gift of Feedback: Improving ASR Model Quality by Learning from User Corrections Through Federated Learning., , , , , , , and . ASRU, page 1-7. IEEE, (2023)Android Malware Detection Method Based on Function Call Graphs., , and . ICONIP (4), volume 9950 of Lecture Notes in Computer Science, page 70-77. (2016)Source Detection Method Based on Propagation Probability., , , and . ICCC, volume 10971 of Lecture Notes in Computer Science, page 179-186. Springer, (2018)An Airborne Software FMEA Application Method Based on ARP4761., , , , , and . ICMSS, page 32-38. ACM, (2019)A Malware Family Classification Method Based on the Point Cloud Model DGCNN., , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 210-221. Springer, (2021)