Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel intelligent cognitive computing-based APT malware detection for Endpoint systems., , and . J. Intell. Fuzzy Syst., 43 (3): 3527-3547 (2022)INSIDE INFLUENCER - Die neuen Markenbotschafter und was sie bewegt, , and . (2018)Language-driven Scene Synthesis using Multi-conditional Diffusion Model., , , , , , and . NeurIPS, (2023)Detect Malware in Android Firmware Based on Distributed Network Environment., , , , and . ICCT, page 1566-1570. IEEE, (2019)Smartwatches Locking Methods: A Comparative Study., and . SOUPS, USENIX Association, (2017)Efficient Fine-Tuning Large Language Models for Knowledge-Aware Response Planning., , , , and . ECML/PKDD (2), volume 14170 of Lecture Notes in Computer Science, page 593-611. Springer, (2023)Detecting DGA Botnet based on Malware Behavior Analysis., , , , , and . SoICT, page 158-164. ACM, (2022)Crossing Linguistic Horizons: Finetuning and Comprehensive Evaluation of Vietnamese Large Language Models., , , , , , and . CoRR, (2024)Dynamic Resilient Workflows for Collaborative Design., and . CDVE, volume 5738 of Lecture Notes in Computer Science, page 341-350. Springer, (2009)Local-network database., and . Comput. Commun., 4 (4): 165-168 (1981)