Feng, Pengbin
86  Ergebnisse:
Personensuche X
?
 
?
3

BejaGNN: behavior-based Java malware detection via graph ne..:

Feng, Pengbin ; Yang, Li ; Lu, Di..
The Journal of Supercomputing.  79 (2023)  14 - p. 15390-15414 , 2023
 
?
4

Comparative effectiveness and safety of bolus vs. continuou..:

Weng, Haoyu ; Li, Yuxi ; Nie, Xiaolu...
The American Journal of the Medical Sciences.  365 (2023)  4 - p. 353-360 , 2023
 
?
5

ACDroid: Detecting Collusion Applications on Smart Devices:

, In: Science of Cyber Security; Lecture Notes in Computer Science,
Xi, Ning ; He, Yihuan ; Zhang, Yuchen.. - p. 3-22 , 2023
 
?
7

BinProv: Binary Code Provenance Identification without Disa..:

, In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses,
He, Xu ; Wang, Shu ; Xing, Yunlong... - p. 350-363 , 2022
 
?
8

Consistency is All I Ask: Attacks and Countermeasures on th..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
Liu, Songsong ; Feng, Pengbin ; Cao, Jiahao... - p. 197-217 , 2022
 
?
9

Android Malware Detection via Graph Representation Learning:

Feng, Pengbin ; Ma, Jianfeng ; Li, Teng...
Mobile Information Systems.  2021 (2021)  - p. 1-14 , 2021
 
?
10

UBER: Combating Sandbox Evasion via User Behavior Emulators:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Feng, Pengbin ; Sun, Jianhua ; Liu, Songsong. - p. 34-50 , 2020
 
?
11

Compositional Information Flow Verification for Inter Appli..:

, In: Machine Learning for Cyber Security; Lecture Notes in Computer Science,
Rao, Xue ; Xi, Ning ; Lv, Jing. - p. 239-252 , 2019
 
?
12

CatraDroid: A Call Trace Driven Detection of Malicious Beha..:

, In: Machine Learning for Cyber Security; Lecture Notes in Computer Science,
Sun, Cong ; Chen, Jun ; Feng, Pengbin. - p. 63-77 , 2019
 
?
 
?
14

A note on Monge–Kantorovich problem:

Feng, Pengbin ; Peng, Xuhui
Statistics & Probability Letters.  84 (2014)  - p. 204-211 , 2014
 
?
15

Lightweight Security Authentication Mechanism Towards UAV N..:

, In: 2019 International Conference on Networking and Network Applications (NaNA),
Teng, Li ; Jianfeng, Ma ; Pengbin, Feng... - p. 379-384 , 2019
 
1-15