Author of the publication

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware Detector.

, and . BigDataSecurity/HPSC/IDS, page 194-199. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MobiRFPose: Portable RF-Based 3D Human Pose Camera., , , , , , and . IEEE Trans. Multim., (2024)A hybrid evolutionary algorithm for finding low conductance of large graphs., , and . Future Gener. Comput. Syst., (2020)1st MICCAI workshop on deep learning in medical image analysis., , , , , , , and . Comput. methods Biomech. Biomed. Eng. Imaging Vis., 6 (3): 241-242 (2018)Stagnation-aware breakout tabu search for the minimum conductance graph partitioning problem., , and . Comput. Oper. Res., (2019)Strategies of Knowledge Pricing and the Impact on Firms' New Product Development Performance., , , , and . KSII Trans. Internet Inf. Syst., 15 (8): 3068-3085 (2021)Multiclass boosting SVM using different texture features in HEp-2 cell staining pattern classification., , , , , and . ICPR, page 170-173. IEEE Computer Society, (2012)Sampling for Approximate Maximum Search in Factorized Tensor., , and . IJCAI, page 2400-2406. ijcai.org, (2017)Research on 5G Network Capacity and Expansion., , , , , , , , and . TrustCom, page 1473-1478. IEEE, (2022)Automated Nucleus and Cytoplasm Segmentation of Overlapping Cervical Cells., , and . MICCAI (1), volume 8149 of Lecture Notes in Computer Science, page 452-460. Springer, (2013)A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location., , , , , and . ICDF2C (2), volume 571 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 63-78. Springer, (2023)