Author of the publication

Adversary Resistant Deep Neural Networks with an Application to Malware Detection.

, , , , , , and . KDD, page 1145-1153. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Interrogating Discriminative Machine Learning Models., , , , and . CoRR, (2017)Random Feature Nullification for Adversary Resistant Deep Architecture., , , , , and . CoRR, (2016)Adversary Resistant Deep Neural Networks with an Application to Malware Detection., , , , , , and . KDD, page 1145-1153. ACM, (2017)Differentiable hierarchical and surrogate gradient search for spiking neural networks., , , , , , , and . NeurIPS, (2022)Lightweight Comprehensive Evaluation Method for Wireless User Perception Based on Random Forest., , , and . VTC Spring, page 1-5. IEEE, (2020)A high performance real-time edge detection system with NEON., , , , , , and . ASICON, page 847-850. IEEE, (2017)Verification of Recurrent Neural Networks Through Rule Extraction., , , and . CoRR, (2018)4D Time Density of Trajectories: Discovering Spatiotemporal Patterns in Movement Data., , , , and . ISPRS Int. J. Geo Inf., 7 (6): 212 (2018)Cell Scene Division and Visualization Based on Autoencoder and K-Means Algorithm., , , , , and . IEEE Access, (2019)Efficient Deep Spiking Multi-Layer Perceptrons with Multiplication-Free Inference., , , , , , and . CoRR, (2023)