Author of the publication

LSGAN-AT: enhancing malware detector robustness against adversarial examples.

, , , , and . Cybersecur., 4 (1): 38 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-Based Vulnerability Assessment of Self-Adaptive Protection Systems., and . IDC, volume 616 of Studies in Computational Intelligence, page 439-449. Springer, (2015)AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples., , , , and . J. Inf. Secur. Appl., (2022)Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review., , and . IEEE Access, (2022)On synergies of cyber and physical security modelling in vulnerability assessment of railway systems., , , , and . Comput. Electr. Eng., (2015)MOSTO: A toolkit to facilitate security auditing of ICS devices using Modbus/TCP., , , and . Comput. Secur., (September 2023)Pre-processing memory dumps to improve similarity score of Windows modules., , and . Comput. Secur., (2021)Towards a Testbed for Critical Industrial Systems: SunSpec Protocol on DER Systems as a Case Study., , and . ETFA, page 1-4. IEEE, (2022)Quantifying Paging on Recoverable Data from Windows User-Space Modules., and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-19. Springer, (2021)A Petri net tool for software performance estimation based on upper throughput bounds.. Autom. Softw. Eng., 24 (1): 73-99 (2017)On Throughput Approximation of Resource-Allocation Systems by Bottleneck Regrowing., and . IEEE Trans. Contr. Sys. Techn., 27 (1): 370-377 (2019)