Author of the publication

MalDroid: Secure DL-enabled intelligent malware detection framework.

, , , and . IET Commun., 16 (10): 1160-1171 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling of Local False Data Injection Attacks With Reduced Network Information., , , and . IEEE Trans. Smart Grid, 6 (4): 1686-1696 (2015)Transmission Line Rating Attack in Two-Settlement Electricity Markets., , , and . IEEE Trans. Smart Grid, 7 (3): 1346-1355 (2016)Image registration algorithm based on point features of sub-pixel., , and . IGARSS, page 501-504. IEEE, (2015)Informed dynamic scheduling strategies for novel majority-logic decoding of non-binary LDPC codes., and . ICSPCS, page 1-6. IEEE, (2015)Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption., , and . INCoS, page 8-14. IEEE, (2012)Design of a software-defined resilient virtualized networking environment., , , and . DRCN, page 111-114. IEEE, (2015)Specific, Non-Invasive, and Magnetically Directed Targeting of Magnetic Erythrocytes in Blood Vessels of Mice., , , , , , , , , and . IEEE Trans. Biomed. Eng., 67 (8): 2276-2285 (2020)DuReader: a Chinese Machine Reading Comprehension Dataset from Real-world Applications, , , , , , , , , and 3 other author(s). (2017)cite arxiv:1711.05073Comment: 10 pages, ACL 2018 MRQA Workshop camera-ready version.Revealing Impacts of Cyber Attacks on Power Grids Vulnerability to Cascading Failures., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 66-II (6): 1058-1062 (2019)Coordinated False Data Injection Attacks in AGC System and Its Countermeasure., , and . IEEE Access, (2020)