相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT
Han Qiu et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)
Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things
Han Qiu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Selective encryption on ECG data in body sensor network based on supervised machine learning
Han Qiu et al.
INFORMATION FUSION (2020)
Malware Visualization for Fine-Grained Classification
Jianwen Fu et al.
IEEE ACCESS (2018)
A Shellcode Detection Method Based on Full Native API Sequence and Support Vector Machine
Yixuan Cheng et al.
2017 3RD INTERNATIONAL CONFERENCE ON APPLIED MATERIALS AND MANUFACTURING TECHNOLOGY (ICAMMT 2017) (2017)
A Survey on Malware Detection Using Data Mining Techniques
Yanfang Ye et al.
ACM COMPUTING SURVEYS (2017)
A comparison of static, dynamic, and hybrid analysis for malware detection
Anusha Damodaran et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2017)
A Survey on Automated Dynamic Malware-Analysis Techniques and Tools
Manuel Egele et al.
ACM COMPUTING SURVEYS (2012)
Using entropy analysis to find encrypted and packed malware
Robert Lyda et al.
IEEE SECURITY & PRIVACY (2007)