Author of the publication

Asking for a second opinion: Re-querying of noisy multi-class labels.

, , and . ICASSP, page 2329-2333. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A large-scale study of automated web search traffic., , and . AIRWeb, page 1-8. (2008)Robust scareware image detection., , , , and . ICASSP, page 2920-2924. IEEE, (2013)Texception: A Character/Word-Level Deep Learning Model for Phishing URL Detection., , and . ICASSP, page 2857-2861. IEEE, (2020)PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud., , , , , , and . NSDI, page 797-815. USENIX Association, (2020)Finding Similar Failures Using Callstack Similarity., , , , , , and . SysML, USENIX Association, (2008)MART: Targeted attack detection on a compromised network., , , and . MILCOM, page 988-997. IEEE, (2016)Neural Classification of Malicious Scripts: A study with JavaScript and VBScript., , and . CoRR, (2018)WebCop: Locating Neighborhoods of Malware on the Web., , , and . LEET, USENIX Association, (2010)Malware classification with recurrent networks., , , , and . ICASSP, page 1916-1920. IEEE, (2015)Large-scale malware classification using random projections and neural networks., , , and . ICASSP, page 3422-3426. IEEE, (2013)