Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges and pitfalls in malware research., , , , and . Comput. Secur., (2021)Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles., , , , , , , , , and 4 other author(s). IEEE Trans. Biom. Behav. Identity Sci., 4 (3): 412-423 (2022)D-Box: DMA-enabled Compartmentalization for Embedded Applications., , , , and . NDSS, The Internet Society, (2022)Accurate detection of SNPs using base-specific cleavage and mass spectrometry., , , , , , and . BIBM, page 1-4. IEEE Computer Society, (2012)"Ghost" and Attention in Binary Neural Network., , and . IEEE Access, (2022)ShadowNet: A Secure and Efficient System for On-device Model Inference., , , and . CoRR, (2020)Leveraging Uncertainty for Effective Malware Mitigation., , , , , , , and . CoRR, (2018)Sparse Reconstruction of Sound Field Using Bayesian Compressive Sensing and Equivalent Source Method., , , , and . Sensors, 23 (12): 5666 (2023)Learning Fast and Slow: Propedeutica for Real-Time Malware Detection., , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 33 (6): 2518-2529 (2022)A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 353-369 (2022)