Author of the publication

A Method for Efficient Malicious Code Detection Based on Feature Codes.

, , , and . J. Softw., 11 (9): 952-959 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Product Quality Assessment Based on Online Reviews., , and . IJDSST, 11 (3): 81-97 (2019)Construction and Assessment Analysis of Virtual Simulation Online Teaching Course for Children with Sensory Integration Disorder., , and . ICIEAI, page 964-968. ACM, (2023)sWMF: Separable weighted median filter for efficient large-disparity stereo matching., , , and . ISCAS, page 1-4. IEEE, (2017)A Method for Efficient Malicious Code Detection Based on Feature Codes., , , and . J. Softw., 11 (9): 952-959 (2016)Research on Double Edge Detection Method of Midsole Based on Improved Otsu Method., , and . IEEE Access, (2020)Image encryption algorithms based on two-dimensional discrete hyperchaotic systems and parallel compressive sensing., , and . Multim. Tools Appl., 83 (19): 57139-57161 (2024)Image selective restoration using multi-scale variational decomposition., , , and . J. Vis. Commun. Image Represent., (2016)An Improved H/α Unsupervised Classification Method for Circular PolSAR Images., , , , and . IEEE Access, (2018)A digital image encryption algorithm based on bit-planes and an improved logistic map., , , and . Multim. Tools Appl., 77 (8): 10217-10233 (2018)Thermal Responses of the Largest Freshwater Lake in the Tibetan Plateau and Its Nearby Saline Lake to Climate Change., , , , , , , and . Remote. Sens., 14 (8): 1774 (2022)