Author of the publication

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites.

, , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 117-132. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme., , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 369-382. Springer, (2019)Toward machine intelligence that learns to fingerprint polymorphic worms in IoT., , , , , and . Int. J. Intell. Syst., 37 (10): 7058-7078 (2022)Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites., , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 117-132. Springer, (2020)A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs., , and . LOD (2), volume 13811 of Lecture Notes in Computer Science, page 32-46. Springer, (2022)Evolutionary Based Transfer Learning Approach to Improving Classification of Metamorphic Malware., and . EvoApplications@EvoStar, volume 13989 of Lecture Notes in Computer Science, page 161-176. Springer, (2023)A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling., , and . DSC, page 1-9. IEEE, (2022)Image Forgery Detection Using Cryptography and Deep Learning., and . BDTA, volume 555 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 62-78. Springer, (2023)Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples., , and . CEC, page 1-7. IEEE, (2020)Can Federated Models Be Rectified Through Learning Negative Gradients?, , and . BDTA, volume 555 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-32. Springer, (2023)An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware., and . GECCO Companion, page 1753-1759. ACM, (2023)