default search action
Franklin Tchakounté
Person information
- affiliation: University of Ngaoundéré, Cameroon
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Marcellin Atemkeng, Victor Osanyindoro, Rockefeller Rockefeller, Sisipho Hamlomo, Jecinta Mulongo, Theophilus Ansah-Narh, Franklin Tchakounté, Arnaud Nguembang Fadja:
Ensemble learning and deep learning-based defect detection in power generation plants. J. Intell. Syst. 33(1) (2024) - [j9]Benedict Ngaibe Mbungang, Joan Beri Ali Wacka, Franklin Tchakounté, Nikolaos Polatidis, Jean Michel Nlong II, Daniel Tieudjo:
Detecting Android Malware with Convolutional Neural Networks and Hilbert Space-Filling Curves. SN Comput. Sci. 5(7): 810 (2024) - [e1]Franklin Tchakounté, Marcellin Atemkeng, Rajeswari Pillai Rajagopalan:
Safe, Secure, Ethical, Responsible Technologies and Emerging Applications - First EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 566, Springer 2024, ISBN 978-3-031-56395-9 [contents] - 2023
- [j8]Alima Nzeket Njoya, Vanelle Laure Tchaya Ngongag, Franklin Tchakounté, Marcellin Atemkeng, Claude Fachkha:
Characterizing Mobile Money Phishing Using Reinforcement Learning. IEEE Access 11: 103839-103862 (2023) - [c6]Roger Yiran Mawoh, Franklin Tchakounté, Joan Beri Ali, Claude Fachkha:
Feature Analysis and Classification of Collusive Android App-Pairs Using DBSCAN Clustering Algorithm. SAFER-TEA 2023: 86-96 - [c5]Jean-Marie Kuate Fotso, Ismael Abbo, Franklin Tchakounté, William Shu, Claude Fachkha:
Feature Engineering Considerations in IoT: A Case Study. SAFER-TEA 2023: 97-107 - [c4]Ezekiel Olayide Tolulope, Franklin Tchakounté:
Support to Interaction Between Medical Practitioners and Patients: A Systematic Review. SAFER-TEA 2023: 380-408 - [i2]Irene Nandutu, Marcellin Atemkeng, Patrice Okouma, Nokubonga Mgqatsa, Jean Louis Ebongue Kedieng Fendji, Franklin Tchakounté:
Creating awareness about security and safety on highways to mitigate wildlife-vehicle collisions by detecting and recognizing wildlife fences using deep learning and drone technology. CoRR abs/2301.07174 (2023) - [i1]Marcellin Atemkeng, Victor Osanyindoro, Rockefeller Rockefeller, Sisipho Hamlomo, Jecinta Mulongo, Theophilus Ansah-Narh, Franklin Tchakounté, Arnaud Nguembang Fadja:
Label Assisted Autoencoder for Anomaly Detection in Power Generation Plants. CoRR abs/2302.02896 (2023) - 2022
- [j7]Franklin Tchakounté, Koudanbe Amadou Calvin, Ado Adamou Abba Ari, David Jaurès Fotsa-Mbogne:
A smart contract logic to reduce hoax propagation across social media. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 3070-3078 (2022) - [j6]Franklin Tchakounté, Jim Carlson Teukeng Ngnintedem, Irepran Damakoa, Ahmadou Faissal, Franck Arnaud Kuate Fotso:
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8888-8898 (2022) - [c3]Jean Emmanuel Ntsama, Franklin Tchakounté, Dimitri Tchakounte Tchuimi, Ahmadou Faissal, Franck Arnaud Kuate Fotso, Joseph Yves Effa, Kalum Priyanath Udagepola, Marcellin Atemkeng:
Determinants of Cybercrime Victimization: Experiences and Multi-stage Recommendations from a Survey in Cameroon. AFRICOMM 2022: 317-337 - [c2]Alima Nzeket Njoya, Franklin Tchakounté, Marcellin Atemkeng, Kalum Priyanath Udagepola, Didier Bassolé:
Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon. AFRICOMM 2022: 430-445 - 2021
- [j5]Franklin Tchakounté, Roger Corneille Ndjeumou Ngassi, Vivient Corneille Kamla, Kalum Priyanath Udagepola:
LimonDroid: a system coupling three signature-based schemes for profiling Android malware. Iran J. Comput. Sci. 4(2): 95-114 (2021) - [j4]Franklin Tchakounté, Virgile Simé Nyassi, Duplex Elvis Houpa Danga, Kalum Priyanath Udagepola, Marcellin Atemkeng:
A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies. EAI Endorsed Trans. Scalable Inf. Syst. 8(30): e5 (2021) - 2020
- [j3]Franklin Tchakounté, Athanase Esdras Yera Pagor, Jean-Claude Kamgang, Marcellin Atemkeng:
CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews. Future Internet 12(9): 145 (2020) - [j2]Franklin Tchakounté, Ahmadou Faissal, Marcellin Atemkeng, Achille Ntyam:
A Reliable Weighting Scheme for the Aggregation of Crowd Intelligence to Detect Fake News. Inf. 11(6): 319 (2020) - [j1]Franklin Tchakounté, Priva Chassem Kamdem, Jean-Claude Kamgang, Hortense Boudjou Tchapgnouo, Marcellin Atemkeng:
An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images. EAI Endorsed Trans. Ind. Networks Intell. Syst. 7(24): e2 (2020) - [c1]Didier Bassolé, Yaya Traoré, Gouayon Koala, Franklin Tchakounté, Oumarou Sié:
Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques. SoCPaR 2020: 810-822
2010 – 2019
- 2017
- [p1]Franklin Tchakounté, François Hayata:
Supervised Learning Based Detection of Malware on Android. Mobile Security and Privacy 2017: 101-154 - 2015
- [b1]Franklin Tchakounté:
A Malware Detection System For Android. University of Bremen, 2015
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint