Author of the publication

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers.

, , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maintenance decision methodology of petrochemical plant based on fuzzy curvelet neural network., , , and . Appl. Soft Comput., (2018)Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers., , , , and . CoRR, (2020)ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking., , , , and . CoRR, (2019)On the conceptualization of total disturbance and its profound implications., , , , and . Sci. China Inf. Sci., 63 (2): 129201 (2020)Demystifying Performance Regressions in String Solvers., , , , , , and . IEEE Trans. Software Eng., 49 (3): 947-961 (March 2023)Predicting Entity Relations across Different Security Databases by Using Graph Attention Network., , , , , and . COMPSAC, page 834-843. IEEE, (2021)Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases., , , , , and . COMPSAC, page 1020-1025. IEEE, (2021)Talking Head Generation with Audio and Speech Related Facial Action Units., , , , and . BMVC, page 353. BMVA Press, (2021)An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms., , , , , , , , and . ASE, page 810-822. IEEE, (2019)ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications., , , , , , and . ICSE, page 1695-1707. IEEE, (2021)