Folgen
Ke Kong
Ke Kong
Bestätigte E-Mail-Adresse bei stu.hit.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
FCSCNN: Feature centralized Siamese CNN-based android malware identification
K Kong, Z Zhang, ZY Yang, Z Zhang
Computers & Security 112, 102514, 2022
212022
Feature selection‐based android malware adversarial sample generation and detection method
X Li, K Kong, S Xu, P Qin, D He
IET Information Security 15 (6), 401-416, 2021
132021
PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis
K Kong, Z Zhang, C Guo, J Han, G Long
Future Generation Computer Systems 137, 349-362, 2022
102022
Intrusion detection method based on imbalanced learning classification
X Li, K Kong, H Shen, Z Wei, X Liao
Journal of Experimental & Theoretical Artificial Intelligence, 1-21, 2022
62022
KFFPDet: Android malicious application detection system with assisted detection of adversarial samples
K Kong, L Wang, Z Zhang, Y Li, D Zhao, J Huang
Expert Systems with Applications, 124095, 2024
2024
A multi-factor coordinated formal description method for network attacks
W Wang, K Kong, H Yang, T Chen, G Long, J Han
Third International Conference on Computer Communication and Network …, 2022
2022
基于 Deep-IndRNN 的 DGA 域名检测方法.
刘伯成, 王浩宇, 李向军, 肖聚鑫, 肖楚霁, 孔珂
Journal of Nanchang University (Natural Science) 44 (6), 2020
2020
面向 Android 恶意应用静态检测的特征频数差异增强算法
李向军, 孔珂, 魏智翔, 王科选, 肖聚鑫
计算机工程与科学 42 (6), 993-1002, 2020
2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–8