Author of the publication

The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning.

, and . ESORICS (4), volume 14347 of Lecture Notes in Computer Science, page 44-64. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Counteracting Concept Drift by Learning with Future Malware Predictions., , , , , and . CoRR, (2024)Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments., , , and . CoRR, (2023)A Survey of Privacy Attacks in Machine Learning., and . ACM Comput. Surv., 56 (4): 101:1-101:34 (April 2024)A Survey of Privacy Attacks in Machine Learning., and . CoRR, (2020)Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments., , , and . ICAART (3), page 774-781. SCITEPRESS, (2024)Attacker Profiling Through Analysis of Attack Patterns in Geographically Distributed Honeypots., , and . CoRR, (2023)The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning., and . ESORICS (4), volume 14347 of Lecture Notes in Computer Science, page 44-64. Springer, (2023)Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection., and . IEEE Symposium on Security and Privacy Workshops, page 70-75. IEEE Computer Society, (2018)Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG., , , , , , , , , and 11 other author(s). CoRR, (2018)Stealing and evading malware classifiers and antivirus at low false positive conditions., and . Comput. Secur., (June 2023)