Author of the publication

Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach.

, , , and . ISI, page 85-90. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-view Representation Learning from Malware to Defend Against Adversarial Variants., , , , and . ICDM (Workshops), page 1-8. IEEE, (2022)Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach., , and . ISI, page 1-6. IEEE, (2021)Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach., , , and . SP (Workshops), page 20-26. IEEE, (2020)Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces., , , , and . SP (Workshops), page 85-91. IEEE, (2021)Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach., , , , , and . ISI, page 110-115. IEEE, (2019)Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool., , , , , , and . ISI, page 92-97. IEEE, (2019)Sequential Gradient Coding For Straggler Mitigation., , and . ICLR, OpenReview.net, (2023)Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective., , , and . ACM Trans. Manag. Inf. Syst., 13 (1): 10:1-10:24 (2022)Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web., , , , , , , , and . ISI, page 1-6. IEEE, (2020)Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs., , , , , , , , , and 1 other author(s). ISI, page 70-75. IEEE, (2018)