Author of the publication

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.

, , , , , and . ICDM, page 101-109. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Involuntary Embarrassing Exposures in Online Social Networks: A Replication Study., and . AIS Trans. Replication Res., (2019)Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity., , , and . CoRR, (2022)Multi-view Representation Learning from Malware to Defend Against Adversarial Variants., , , , and . ICDM (Workshops), page 1-8. IEEE, (2022)Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach., , and . ISI, page 1-6. IEEE, (2021)Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach., , , and . SP (Workshops), page 20-26. IEEE, (2020)Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces., , , , and . SP (Workshops), page 85-91. IEEE, (2021)Sequential Gradient Coding For Straggler Mitigation., , and . ICLR, OpenReview.net, (2023)Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach., , , , , and . ISI, page 110-115. IEEE, (2019)Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool., , , , , , and . ISI, page 92-97. IEEE, (2019)Time-Resolved fMRI Shared Response Model using Gaussian Process Factor Analysis., , , , , and . CoRR, (2020)