Author of the publication

LSGAN-AT: enhancing malware detector robustness against adversarial examples.

, , , , and . Cybersecur., 4 (1): 38 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts., , , and . ICC, page 1835-1839. IEEE, (2008)Modeling and Analysis of High Availability Techniques in a Virtualized System., , , and . Comput. J., 61 (2): 180-198 (2018)Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System., , , and . ICCCN, page 1-6. IEEE, (2018)A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism., , , and . IEEE Internet Things J., 10 (13): 11440-11452 (July 2023)Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC., , , , , and . IEEE Trans. Computers, 73 (4): 1138-1151 (April 2024)An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus., , , and . IEEE Trans. Netw. Serv. Manag., 21 (1): 507-516 (February 2024)Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis., , , , , and . CoRR, (2023)Towards interpreting ML-based automated malware detection models: a survey., and . CoRR, (2021)PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning., , , , , and . CoRR, (2023)Towards Semi-Markov Model-based Dependability Evaluation of VM-based Multi-Domain Service Function Chain., , , , , and . CoRR, (2023)