​
Login / Signup
Ke Kong
ORCID
Publication Activity (10 Years)
Years Active: 2009-2024
Publications (10 Years): 5
Top Topics
Malware Detection
Security Analysis
Detection Method
Top Venues
Future Gener. Comput. Syst.
Comput. Secur.
J. Exp. Theor. Artif. Intell.
IET Inf. Secur.
</>
Publications
</>
Ke Kong
,
Luhua Wang
,
Zhaoxin Zhang
,
Yikang Li
,
Dong Zhao
,
Junkai Huang
KFFPDet: Android malicious application detection system with assisted detection of adversarial samples.
Expert Syst. Appl.
252 (2024)
Xiangjun Li
,
Ke Kong
,
Hua Shen
,
Zhixiang Wei
,
Xiaofeng Liao
Intrusion detection method based on imbalanced learning classification.
J. Exp. Theor. Artif. Intell.
36 (5) (2024)
Ke Kong
,
Zhaoxin Zhang
,
Changyong Guo
,
Jideng Han
,
Gang Long
PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis.
Future Gener. Comput. Syst.
137 (2022)
Ke Kong
,
Zhichao Zhang
,
Ziyuan Yang
,
Zhaoxin Zhang
FCSCNN: Feature centralized Siamese CNN-based android malware identification.
Comput. Secur.
112 (2022)
Xiangjun Li
,
Ke Kong
,
Su Xu
,
Pengtao Qin
,
Daojing He
Feature selection-based android malware adversarial sample generation and detection method.
IET Inf. Secur.
15 (6) (2021)
ShenMing Zhang
,
ZhengHe Xu
,
Ke Kong
Simulation and Analysis on Flow and Pollutant of Jinan Queshan Reservoir.
CSISE (2)
(2011)
Ke Kong
,
Shaobo Wang
,
Jiancang Xie
,
Fan Sun
Application of Advanced Particle Swarm Optimization Algorithm Based on SA in Multi-tiers Hydropower Stations Optimization.
ICNC (3)
(2009)