Author of the publication

Adversary Resistant Deep Neural Networks with an Application to Malware Detection.

, , , , , , and . KDD, page 1145-1153. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random Feature Nullification for Adversary Resistant Deep Architecture., , , , , and . CoRR, (2016)Towards Interrogating Discriminative Machine Learning Models., , , , and . CoRR, (2017)Adversary Resistant Deep Neural Networks with an Application to Malware Detection., , , , , , and . KDD, page 1145-1153. ACM, (2017)Lightweight Comprehensive Evaluation Method for Wireless User Perception Based on Random Forest., , , and . VTC Spring, page 1-5. IEEE, (2020)A high performance real-time edge detection system with NEON., , , , , , and . ASICON, page 847-850. IEEE, (2017)Differentiable hierarchical and surrogate gradient search for spiking neural networks., , , , , , , and . NeurIPS, (2022)Shapley Homology: Topological Analysis of Sample Influence for Neural Networks., , , and . Neural Comput., 32 (7): 1355-1378 (2020)Machine Learning Based Quantitative Association Rule Mining Method for Evaluating Cellular Network Performance., , , , , and . IEEE Access, (2019)WeUp: Wireless User Perception Based on Dimensional Reduction and Semi-Supervised Clustering., , , , , and . IEEE Access, (2019)Resilient control for T-S fuzzy systems with multiple transmission channels under asynchronous denial-of-Service attacks., , , and . J. Frankl. Inst., 360 (3): 2215-2233 (February 2023)