Franklin Tchakounté

Orcid: 0000-0003-0723-2640

Affiliations:
  • University of Ngaoundéré, Cameroon


According to our database1, Franklin Tchakounté authored at least 20 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Android Malware with Convolutional Neural Networks and Hilbert Space-Filling Curves.
SN Comput. Sci., October, 2024

Ensemble learning and deep learning-based defect detection in power generation plants.
J. Intell. Syst., February, 2024

2023
Label Assisted Autoencoder for Anomaly Detection in Power Generation Plants.
CoRR, 2023

Creating awareness about security and safety on highways to mitigate wildlife-vehicle collisions by detecting and recognizing wildlife fences using deep learning and drone technology.
CoRR, 2023

Characterizing Mobile Money Phishing Using Reinforcement Learning.
IEEE Access, 2023

Support to Interaction Between Medical Practitioners and Patients: A Systematic Review.
Proceedings of the Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, 2023

Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm.
Proceedings of the Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, 2023

Feature Engineering Considerations in IoT: A Case Study.
Proceedings of the Safe, Secure, Ethical, Responsible Technologies and Emerging Applications, 2023

2022
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism.
J. King Saud Univ. Comput. Inf. Sci., 2022

A smart contract logic to reduce hoax propagation across social media.
J. King Saud Univ. Comput. Inf. Sci., 2022

Determinants of Cybercrime Victimization: Experiences and Multi-stage Recommendations from a Survey in Cameroon.
Proceedings of the Towards new e-Infrastructure and e-Services for Developing Countries, 2022

Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon.
Proceedings of the Towards new e-Infrastructure and e-Services for Developing Countries, 2022

2021
A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies.
EAI Endorsed Trans. Scalable Inf. Syst., 2021

LimonDroid: a system coupling three signature-based schemes for profiling Android malware.
Iran J. Comput. Sci., 2021

2020
An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2020

A Reliable Weighting Scheme for the Aggregation of Crowd Intelligence to Detect Fake News.
Inf., 2020

CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews.
Future Internet, 2020

Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2017
Supervised Learning Based Detection of Malware on Android.
Proceedings of the Mobile Security and Privacy, 2017

2015
A Malware Detection System For Android.
PhD thesis, 2015


  Loading...