Author of the publication

Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses.

, , , and . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301511 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Advanced Malware by Machine Learning Techniques., , and . CoRR, (2019)Secure and Energy-Efficient Key-Agreement Protocol for Multi-server Architecture., and . SKM, volume 1186 of Communications in Computer and Information Science, page 82-97. Springer, (2019)GreenForensics: Deep hybrid edge-cloud detection and forensics system for battery-performance-balance conscious devices., , and . Digit. Investig., 43 (Supplement): 301445 (2022)Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses., , , and . Digit. Investig., (2021)DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware., , and . CoRR, (2021)Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering., , , and . BROADNETS, volume 355 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 109-128. Springer, (2020)MalEfficient10%: A Novel Feature Reduction Approach for Android Malware Detection., , , , , and . BROADNETS, volume 511 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 72-92. Springer, (2022)Android Malware Detection Based on Static Analysis and Data Mining Techniques: A Systematic Literature Review., , , , and . BROADNETS, volume 511 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-71. Springer, (2022)Identification of Significant Permissions for Efficient Android Malware Detection., , , and . BROADNETS, volume 355 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 33-52. Springer, (2020)ADVERSARIALuscator: An Adversarial-DRL based Obfuscator and Metamorphic Malware Swarm Generator., , and . IJCNN, page 1-9. IEEE, (2021)