From post

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits.

, , и . USENIX Security Symposium, стр. 1041-1056. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits., , и . USENIX Security Symposium, стр. 1041-1056. USENIX Association, (2015)Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits., , , , и . USENIX Security Symposium, стр. 377-394. USENIX Association, (2022)When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks., , , , и . USENIX Security Symposium, стр. 1299-1316. USENIX Association, (2018)Data-Driven Techniques For Vulnerability Assessments.. University of Maryland, College Park, MD, USA, (2021)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/28370).Exploring Adversarial Examples in Malware Detection., , и . AAAI Fall Symposium: ALEC, том 2269 из CEUR Workshop Proceedings, стр. 11-16. CEUR-WS.org, (2018)Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks., , , , , , и . NeurIPS, стр. 6106-6116. (2018)Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning., , , , , и . CoRR, (2017)Exploring Adversarial Examples in Malware Detection., , и . IEEE Symposium on Security and Privacy Workshops, стр. 8-14. IEEE, (2019)Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System., , , и . Security Protocols Workshop, том 11286 из Lecture Notes in Computer Science, стр. 150-162. Springer, (2018)