Author of the publication

Evading PDF Malware Classifiers with Generative Adversarial Network.

, , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 374-387. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evading PDF Malware Classifiers with Generative Adversarial Network., , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 374-387. Springer, (2019)Towards interpreting vulnerability of object detection models via adversarial distillation., , , , , , and . J. Inf. Secur. Appl., (2023)Improving the invisibility of adversarial examples with perceptually adaptive perturbation., , , , , and . Inf. Sci., (July 2023)A fault-tolerant and energy-efficient continuous data protection system., , , , , and . J. Ambient Intell. Humaniz. Comput., 10 (8): 2945-2954 (2019)Knowledge graph and behavior portrait of intelligent attack against path planning., , , , , and . Int. J. Intell. Syst., 37 (10): 7110-7123 (2022)Oscillation of second-order nonlinear delay dynamic equations on time scales., , and . Comput. Math. Appl., 61 (8): 2342-2348 (2011)Oscillation criteria for even-order half-linear functional differential equations with damping., , and . Appl. Math. Lett., 24 (10): 1709-1715 (2011)Recovering SQLite data from fragmented flash pages., , and . Ann. des Télécommunications, 74 (7-8): 451-460 (2019)A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis., , , , , and . Mob. Networks Appl., 26 (4): 1493-1502 (2021)Oscillatory behavior of third-order nonlinear delay dynamic equations on time scales., , and . J. Comput. Appl. Math., (2014)