Author of the publication

A System-call Behavior Language System for Malware Detection Using A Sensitivity-based LSTM Model.

, , , and . CSSE, page 112-118. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint., , , and . WoWMoM, page 450-456. IEEE, (2022)A New Trust Framework Based on Reputation for Unstructured P2P Networks., , , and . IPCCC, page 209-216. IEEE Computer Society, (2008)An effective behavior-based Android malware detection system., , and . Secur. Commun. Networks, 8 (12): 2079-2089 (2015)Relax, but Do Not Sleep: A new perspective on Green Wireless Networking., , , , , and . INFOCOM, page 907-915. IEEE, (2014)Traffic assignment algorithm for multi-path routing in Cognitive Radio Ad Hoc Networks., , and . WCNC, page 1168-1173. IEEE, (2013)A fuzzy-based algorithm to remove clock skew and reset from one-way delay measurement Internet end-to-end performance measurement., , , , and . GLOBECOM, page 1425-1430. IEEE, (2004)An Enhanced Energy Saving Scheme in Mobile Broadband Wireless Access Systems., , , and . WASA, volume 4138 of Lecture Notes in Computer Science, page 81-92. Springer, (2006)A System-call Behavior Language System for Malware Detection Using A Sensitivity-based LSTM Model., , , and . CSSE, page 112-118. ACM, (2020)CrowdHB: A Decentralized Location Privacy-Preserving Crowdsensing System Based on a Hybrid Blockchain Network., , , , and . IEEE Internet Things J., 9 (16): 14803-14817 (2022)A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT., , , , , , and . IEEE Internet Things J., 10 (16): 14896-14907 (August 2023)