Author of the publication

Adversary Resistant Deep Neural Networks with an Application to Malware Detection.

, , , , , , and . KDD, page 1145-1153. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust saliency maps with decoy-enhanced saliency score., , , and . CoRR, (2020)PATROL: Provable Defense against Adversarial Policy in Two-player Games., , , , and . USENIX Security Symposium, page 3943-3960. USENIX Association, (2023)CADE: Detecting and Explaining Concept Drift Samples for Security Applications., , , , , , and . USENIX Security Symposium, page 2327-2344. USENIX Association, (2021)Impact of Imperfect Time Synchronization on Cooperative Jamming Assisted Slow FH Systems., , , and . GLOBECOM, page 1-6. IEEE, (2020)Target Tracking via Two-Branch Spatio-Temporal Regularized Correlation Filter Network., , and . PRCV (1), volume 11857 of Lecture Notes in Computer Science, page 86-97. Springer, (2019)EDGE: Explaining Deep Reinforcement Learning Policies., , , and . NeurIPS, page 12222-12236. (2021)An Empirical Study of Malicious Code In PyPI Ecosystem., , , , , and . ASE, page 166-177. IEEE, (2023)Impacts of Attenuators on Analog Self-Interference Cancellation in Full Duplex Radios., , , , and . GLOBECOM Workshops, page 1-5. IEEE, (2016)Hybrid digital-analog coding scheme for overlay cognitive radio network with correlated sources., , , and . WCNC, page 1-5. IEEE, (2016)Defending Against Adversarial Samples Without Security through Obscurity., , , , , , , , and . ICDM, page 137-146. IEEE Computer Society, (2018)