Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malware classification with recurrent networks., , , , and . ICASSP, page 1916-1920. IEEE, (2015)Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models., , , , and . MILCOM, page 1-8. IEEE, (2018)Attention in Recurrent Neural Networks for Ransomware Detection., , , and . ICASSP, page 3222-3226. IEEE, (2019)Actor Critic Deep Reinforcement Learning for Neural Malware Control., , and . AAAI, page 1005-1012. AAAI Press, (2020)Neural Malware Control with Deep Reinforcement Learning., , and . MILCOM, page 1-8. IEEE, (2019)Using File Relationships in Malware Classification., , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 1-20. Springer, (2012)Scalable Telemetry Classification for Automated Malware Detection., , , , , , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 788-805. Springer, (2012)Neural Sequential Malware Detection with Parameters., , , and . ICASSP, page 2656-2660. IEEE, (2018)Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models., , , , and . CoRR, (2017)Robust Neural Malware Detection Models for Emulation Sequence Learning., , , and . MILCOM, page 1-8. IEEE, (2018)