From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Android Malicious Application Classification Using Clustering., , , и . ISDA (2), том 941 из Advances in Intelligent Systems and Computing, стр. 659-667. Springer, (2018)DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS., , и . CoRR, (2020)Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses., , , и . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301511 (марта 2023)DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems., , и . CoRR, (2021)Designing Adversarial Attack and Defence for Robust Android Malware Detection Models., , , и . DSN (Supplements), стр. 29-32. IEEE, (2021)Are CNN based Malware Detection Models Robust?: Developing Superior Models using Adversarial Attack and Defense., , , и . SenSys, стр. 355-356. ACM, (2021)Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection., , и . Inf. Syst. Frontiers, 25 (2): 589-611 (апреля 2023)DRo: A data-scarce mechanism to revolutionize the performance of DL-based Security Systems., , и . LCN, стр. 581-588. IEEE, (2021)Malware Detection using Machine Learning and Deep Learning., , , и . CoRR, (2019)Identification of Significant Permissions for Efficient Android Malware Detection., , , и . CoRR, (2021)