Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Applying Machine Learning Techniques for Behavioral Awareness., , , , , and . State of the Art in AI Applied to Ambient Intelligence, volume 298 of Frontiers in Artificial Intelligence and Applications, IOS Press, (2017)Automated Feature Extraction for Website Fingerprinting through Deep Learning., , , , and . CoRR, (2017)Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study., , and . SP (Workshops), page 7-12. IEEE, (2021)Position Paper: On Advancing Adversarial Malware Generation Using Dynamic Features., , , , and . WoRMA@AsiaCCS, page 15-20. ACM, (2022)Fishy Faces: Crafting Adversarial Images to Poison Face Authentication., , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2018)Automated Website Fingerprinting through Deep Learning., , , , and . NDSS, The Internet Society, (2018)Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor., , , , , and . Proc. Priv. Enhancing Technol., 2022 (3): 314-335 (2022)Open-World Network Intrusion Detection., , , , and . Security and Artificial Intelligence, (2022)Intelligent Malware Defenses., , , and . Security and Artificial Intelligence, (2022)Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses., , , , , and . CoRR, (2023)