Author of the publication

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.

, , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sports knowledge management and data mining., , and . Annu. Rev. Inf. Sci. Technol., 44 (1): 115-157 (2010)Digital Libraries: Technological Advances and Social Impacts (Guest Editors' Introduction)., and . Computer, 32 (2): 45-50 (1999)A Discrete Stock Price Prediction Engine Based on Financial News., and . Computer, 43 (1): 51-56 (2010)A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study., , and . J. Comput. Mediat. Commun., 16 (1): 48-70 (2010)Modeling knowledge diffusion in scientific innovation networks: an institutional comparison between China and US with illustration for nanotechnology., , , , and . Scientometrics, 105 (3): 1953-1984 (2015)Automatic Concept Classification of Text from Electronic Meetings., , , , and . Commun. ACM, 37 (10): 56-73 (1994)Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums., , and . ACM Trans. Inf. Syst., 26 (3): 12:1-12:34 (2008)Automatically detecting deceptive criminal identities., , and . Commun. ACM, 47 (3): 70-76 (2004)Dark Web - Exploring and Data Mining the Dark Side of the Web. Springer, (2012)A Spatio Temporal Visualizer for Law Enforcement., , , , , , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 181-194. Springer, (2003)