Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Deceptive Reviews Using Generative Adversarial Networks., , , , and . IEEE Symposium on Security and Privacy Workshops, page 89-95. IEEE Computer Society, (2018)Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability., , , , and . CoRR, (2020)Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , and . WWW, page 3108-3115. ACM, (2019)Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , and . WWW (Companion Volume), page 1288-1289. ACM, (2019)Integrating evolutionary game theory into an agent-based model of ductal carcinoma in situ: Role of gap junctions in cancer progression., , , and . Comput. Methods Programs Biomed., (2016)Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms., , , , , , , and . AsiaCCS, page 731-743. ACM, (2021)DEEPCASE: Semi-Supervised Contextual Analysis of Security Events., , , , , , , , , and . SP, page 522-539. IEEE, (2022)VENOMAVE: Clean-Label Poisoning Against Speech Recognition., , , , , , and . CoRR, (2020)When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features., , , , , , , and . NDSS, The Internet Society, (2020)Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability., , , , and . EuroS&P, page 159-178. IEEE, (2021)