Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models., , , , and . CoRR, (2017)Robust Neural Malware Detection Models for Emulation Sequence Learning., , , and . MILCOM, page 1-8. IEEE, (2018)Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption., , , , , and . ICASSP, page 2792-2796. IEEE, (2020)Designing Indicators to Combat Fake Media., , and . CoRR, (2020)Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback., , , , , , and . ICASSP, page 2872-2876. IEEE, (2019)Malware classification with LSTM and GRU language models and a character-level CNN., and . ICASSP, page 2482-2486. IEEE, (2017)Neural Sequential Malware Detection with Parameters., , , and . ICASSP, page 2656-2660. IEEE, (2018)Detection of Prevalent Malware Families with Deep Learning., , , and . MILCOM, page 1-8. IEEE, (2019)Classification of Automated Search Traffic., , , and . Weaving Services and People on the World Wide Web, page 3-26. Springer, (2008)Normalized Double-Talk Detection Based on Microphone and AEC Error Cross-Correlation., , and . ICME, page 360-363. IEEE Computer Society, (2007)