Author of the publication

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.

, , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach., , , , , , , , and . ICDM (Workshops), page 488-495. IEEE, (2020)Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model., , , , and . CoRR, (2020)Benchmarking the Robustness of Phishing Email Detection Systems., , , , and . AMCIS, Association for Information Systems, (2023)Large Language Models for Conducting Advanced Text Analytics Information Systems Research., , , and . CoRR, (2023)Multi-view Representation Learning from Malware to Defend Against Adversarial Variants., , , , and . ICDM (Workshops), page 1-8. IEEE, (2022)Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces., , , , and . SP (Workshops), page 85-91. IEEE, (2021)Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach., , and . ISI, page 1-6. IEEE, (2021)Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach., , , , , and . CoRR, (2024)Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach., , , , , and . ICDM, page 101-109. IEEE, (2023)Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web., , , , , , , , and . ISI, page 1-6. IEEE, (2020)