Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Picking on the family: Disrupting android malware triage by forcing misclassification., , , , and . Expert Syst. Appl., (2018)The arms race: Adversarial search defeats entropy used to detect malware., , , and . Expert Syst. Appl., (2019)Enumeration of (16, 4, 16, 4) Relative Difference Sets., and . Electron. J. Comb., 20 (1): 72 (2013)Accuracy Evaluation of Calibrating Magnetic Tensor Gradiometers From Total-Field Gradient Measurements in Aeromagnetic Survey., , , , and . IEEE Trans. Instrum. Meas., (2021)From the Newsstand.. IEEE Internet Comput., 8 (5): 10-13 (2004)Elsewhere: Networking.. IEEE Internet Comput., 6 (2): 16-19 (2002)Software robustness: a survey, a theory, and prospects., , and . ESEC/SIGSOFT FSE, page 1475-1478. ACM, (2021)Genetically Improved Software with fewer Data Cache Misses., , , and . GECCO Companion, page 799-802. ACM, (2023)cuQuantum SDK: A High-Performance Library for Accelerating Quantum Science., , , , , , , , , and 12 other author(s). QCE, page 1050-1061. IEEE, (2023)Constructing Search Spaces for Search-Based Software Testing Using Neural Networks., and . SSBSE, volume 11664 of Lecture Notes in Computer Science, page 27-41. Springer, (2019)