Author of the publication

Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites.

, , and . EvoApplications, volume 12104 of Lecture Notes in Computer Science, page 117-132. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PFARS: Enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme., , , , , and . Int. J. Commun. Syst., (2019)Enhancing Big Data Security with Collaborative Intrusion Detection., , , , , , and . IEEE Cloud Comput., 1 (3): 27-33 (2014)On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 4 (5): 641-652 (2020)RePIDS: A multi tier Real-time Payload-based Intrusion Detection System., , , , and . Comput. Networks, 57 (3): 811-824 (2013)Toward machine intelligence that learns to fingerprint polymorphic worms in IoT., , , , , and . Int. J. Intell. Syst., 37 (10): 7058-7078 (2022)Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment., , , , , , and . IEEE Internet Things J., 8 (5): 3211-3223 (2021)An omnidirectional approach to touch-based continuous authentication., , , and . Comput. Secur., (May 2023)Special Issue on Adversarial AI to IoT Security and Privacy Protection: Attacks and Defenses., and . Comput. J., 65 (11): 2847-2848 (2022)Deep Learning in Mobile Computing: Architecture, Applications, and Future Challenges., , and . Mob. Inf. Syst., (2021)Detection of Denial-of-Service Attacks Based on Computer Vision Techniques., , , , , and . IEEE Trans. Computers, 64 (9): 2519-2533 (2015)