Cited By
View all- Laudanna SDi Sorbo AVinod PVisaggio CCanfora G(2025)Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?International Journal of Information Security10.1007/s10207-024-00934-924:1Online publication date: 1-Feb-2025
- Gupta RSharma KGarg R(2024)Innovative Approach to Android Malware Detection: Prioritizing Critical Features Using Rough Set TheoryElectronics10.3390/electronics1303048213:3(482)Online publication date: 23-Jan-2024
- Wajahat AHe JZhu NMahmood TNazir AUllah FQureshi SOsman M(2024)An effective deep learning scheme for android malware detection leveraging performance metrics and computational resourcesIntelligent Decision Technologies10.3233/IDT-23028418:1(33-55)Online publication date: 1-Jan-2024
- Show More Cited By