Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption., , , , , and . ICASSP, page 2792-2796. IEEE, (2020)Designing Indicators to Combat Fake Media., , and . CoRR, (2020)Neural Sequential Malware Detection with Parameters., , , and . ICASSP, page 2656-2660. IEEE, (2018)Malware classification with LSTM and GRU language models and a character-level CNN., and . ICASSP, page 2482-2486. IEEE, (2017)Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback., , , , , , and . ICASSP, page 2872-2876. IEEE, (2019)Detection of Prevalent Malware Families with Deep Learning., , , and . MILCOM, page 1-8. IEEE, (2019)Robust Neural Malware Detection Models for Emulation Sequence Learning., , , and . MILCOM, page 1-8. IEEE, (2018)Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models., , , , and . CoRR, (2017)Classification of Automated Search Traffic., , , and . Weaving Services and People on the World Wide Web, page 3-26. Springer, (2008)Normalized Double-Talk Detection Based on Microphone and AEC Error Cross-Correlation., , and . ICME, page 360-363. IEEE Computer Society, (2007)