Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , and . CoRR, (2020)"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice., , , , , and . SaTML, page 339-364. IEEE, (2023)Detecting Homoglyph Attacks with a Siamese Neural Network., , , and . IEEE Symposium on Security and Privacy Workshops, page 22-28. IEEE Computer Society, (2018)Machine Learning Model Attribution Challenge., , , , , and . CoRR, (2023)Polar sea ice mapping using SeaWinds data., and . IGARSS, page 71-73. IEEE, (2003)Reliable early classification of time series., , , and . ICASSP, page 2073-2076. IEEE, (2012)The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation., , , , , , , , , and 16 other author(s). CoRR, (2018)Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , and . AAAI, page 9386-9394. AAAI Press, (2021)DeepDGA: Adversarially-Tuned Domain Generation and Detection., , and . AISec@CCS, page 13-21. ACM, (2016)Automatic Yara Rule Generation Using Biclustering., , , , , , , and . AISec@CCS, page 71-82. ACM, (2020)