Author of the publication

DeepAM: a heterogeneous deep learning framework for intelligent malware detection.

, , , , and . Knowl. Inf. Syst., 54 (2): 265-285 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding., , , , and . Expert Syst. Appl., 238 (Part B): 121865 (March 2024)Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection., , and . SDM, page 693-701. SIAM, (2022)Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy., , and . ACM Trans. Knowl. Discov. Data, 18 (2): 46:1-46:24 (February 2024)iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow., , , , , and . ASONAM, page 1097-1104. ACM, (2019)Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks., , , , and . IJCNN, page 1-8. IEEE, (2021)Automatic Detection of Helmet Uses for Construction Safety., , , , , , and . WI Workshops, page 135-142. IEEE Computer Society, (2016)A coherence-improved and mass-balanced inflow turbulence generation method for large eddy simulation., , , , and . J. Comput. Phys., (February 2024)CVII: Enhancing Interpretability in Intelligent Sensor Systems via Computer Vision Interpretability Index., , and . Sensors, 23 (24): 9893 (December 2023)AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection., , , , , , , and . CoRR, (2018)Distilling Knowledge on Text Graph for Social Media Attribute Inference., , , and . SIGIR, page 2024-2028. ACM, (2022)