Author of the publication

Understanding the spread of malicious mobile-phone programs and their damage potential.

, , , and . Int. J. Inf. Sec., 12 (5): 383-392 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Component Library Design of 3D Industrial Configuration Software., , and . ICAIC (2), volume 225 of Communications in Computer and Information Science, page 324-329. Springer, (2011)Research on Application of Improved Smart Data Aggregation Algorithm in Wireless Sensor Network., , and . J. Networks, 9 (7): 1875-1882 (2014)Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic., , , , , and . CNS, page 1-7. IEEE, (2019)Advantages of the coherent state compared with squeezed state in unidimensional continuous variable quantum key distribution., , , and . Quantum Inf. Process., 17 (12): 344 (2018)Multiantenna-Assisted Spectrum Sensing for Cognitive Radio., , , and . IEEE Trans. Veh. Technol., 59 (4): 1791-1800 (2010)Performance of Cooperative Relay With Binary Modulation in Nakagami- Fading Channels., , and . IEEE Trans. Veh. Technol., 57 (5): 3310-3315 (2008)Point-Based Multilevel Domain Adaptation for Point Cloud Segmentation., , , , , and . IEEE Geosci. Remote. Sens. Lett., (2022)Improved Prior Construction for Probabilistic Seismic Prediction., , and . IEEE Geosci. Remote. Sens. Lett., (2022)A semi-supervised co-training model for predicting passenger flow change in expanding subways., , , , , and . Expert Syst. Appl., (2022)A Modular Multi-stage Lightweight Graph Transformer Network for Human Pose and Shape Estimation from 2D Human Pose., , , and . CoRR, (2023)