Author of the publication

Challenges and Trends of Android Malware Detection in the Era of Deep Learning.

, , , , , and . iSCI, page 37-43. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A PSO-Based Virtual Network Mapping Algorithm with Crossover Operator., , , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 527-536. Springer, (2016)Virtual network embedding with pre-transformation and incentive convergence mechanism., , , , , and . Concurr. Comput. Pract. Exp., (2017)Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating., , , , , and . IEEE Internet Things J., 9 (20): 20681-20692 (2022)Influence analysis in social networks: A survey., , , , , and . J. Netw. Comput. Appl., (2018)Aspect-level sentiment analysis using context and aspect memory network., , , , , , and . Neurocomputing, (2021)Co-attention Networks for Aspect-Level Sentiment Analysis., , , , and . NLPCC (2), volume 11839 of Lecture Notes in Computer Science, page 200-209. Springer, (2019)New deep learning method to detect code injection attacks on hybrid applications., , , , and . J. Syst. Softw., (2018)Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks., , , , and . IEICE Trans. Inf. Syst., 93-D (3): 510-517 (2010)Propagation model of smartphone worms based on semi-Markov process and social relationship graph., , , and . Comput. Secur., (2014)A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks., , , , , , and . Sensors, 18 (8): 2487 (2018)