From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malware classification with recurrent networks., , , , и . ICASSP, стр. 1916-1920. IEEE, (2015)Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models., , , , и . MILCOM, стр. 1-8. IEEE, (2018)Attention in Recurrent Neural Networks for Ransomware Detection., , , и . ICASSP, стр. 3222-3226. IEEE, (2019)Actor Critic Deep Reinforcement Learning for Neural Malware Control., , и . AAAI, стр. 1005-1012. AAAI Press, (2020)Neural Malware Control with Deep Reinforcement Learning., , и . MILCOM, стр. 1-8. IEEE, (2019)Scalable Telemetry Classification for Automated Malware Detection., , , , , , , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 788-805. Springer, (2012)Using File Relationships in Malware Classification., , , и . DIMVA, том 7591 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2012)Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models., , , , и . CoRR, (2017)Robust Neural Malware Detection Models for Emulation Sequence Learning., , , и . MILCOM, стр. 1-8. IEEE, (2018)Neural Sequential Malware Detection with Parameters., , , и . ICASSP, стр. 2656-2660. IEEE, (2018)