Author of the publication

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware Detector.

, and . BigDataSecurity/HPSC/IDS, page 194-199. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opportunistic Piggyback Marking for IP Traceback., , , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 273-288 (2016)Accurate in-network file-type classification., , and . SG-CRC, volume 14 of Cryptology and Information Security Series, page 139-146. IOS Press, (2016)A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification., and . SG-CRC, volume 15 of Cryptology and Information Security Series, page 57-69. IOS Press, (2017)Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection., and . ITNAC, page 110-117. IEEE, (2023)A Novel Inequality-Based Fragmented File Carving Technique., and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 28-39. Springer, (2010)A Generalized Links and Text Properties Based Forum Crawler., , and . Web Intelligence, page 113-120. IEEE Computer Society, (2012)Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving., , and . CIS, page 793-797. IEEE Computer Society, (2011)Using Low Level Gradient Channels for Computationally Efficient Object Detection and Its Application in Logo Detection., and . ISM, page 229-232. IEEE Computer Society, (2012)An Improved Double Compression Detection Method for JPEG Image Forensics., , and . ISM, page 290-297. IEEE Computer Society, (2012)Privacy preserving layer partitioning for Deep Neural Network models., , , and . CoRR, (2024)