Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , and . CoRR, (2020)EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models., and . CoRR, (2018)"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice., , , , , and . SaTML, page 339-364. IEEE, (2023)Machine Learning Model Attribution Challenge., , , , , and . CoRR, (2023)Polar sea ice mapping using SeaWinds data., and . IGARSS, page 71-73. IEEE, (2003)Detecting Homoglyph Attacks with a Siamese Neural Network., , , and . IEEE Symposium on Security and Privacy Workshops, page 22-28. IEEE Computer Society, (2018)Channel-Robust Classifiers., , , and . IEEE Trans. Signal Process., 59 (4): 1421-1434 (2011)Classifying with confidence from incomplete information., , , and . J. Mach. Learn. Res., 14 (1): 3561-3589 (2013)Sparse imaging for fast electron microscopy., , , , and . Computational Imaging, volume 8657 of SPIE Proceedings, page 86570C. IS&T/SPIE, (2013)Predicting Domain Generation Algorithms with Long Short-Term Memory Networks., , , and . CoRR, (2016)