Author of the publication

Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection.

, , , , , , and . ICLR (Poster), OpenReview.net, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Fast Algorithms for Error Rate-Based Stepwise Variable Selection in Discriminant Analysis., , and . SIAM J. Sci. Comput., 22 (3): 1036-1052 (2000)Learning Semi-Structured Document Categorization Using Bounded-Length Spectrum Sub-Sequence Kernels.. Data Min. Knowl. Discov., 13 (3): 309-334 (2006)An Embedded Bayesian Network Hidden Markov Model for Digital Forensics., , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 459-465. Springer, (2006)Code Action Network for Binary Function Scope Identification., , , , , , , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 712-725. Springer, (2020)Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence., , , , , , , , and . IJCNN, page 1-8. IEEE, (2020)Face recognition using multiple image view line segments., and . ICPR, page 1198-1200. IEEE Computer Society, (1998)View-based object recognition using image lines., and . ICPR, page 805-807. IEEE Computer Society, (1998)Transferable Graph Backdoor Attack., , , , , , , and . RAID, page 321-332. ACM, (2022)Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection., , , , , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 699-711. Springer, (2020)A Data-driven Attack against Support Vectors of SVM., , , , , and . AsiaCCS, page 723-734. ACM, (2018)