Author of the publication

MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors.

, , , , , and . IEEE Trans. Computers, 73 (4): 980-993 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Attribute & Network Coding-Based Secure Multicast Protocol for Firmware Updates in Smart Grid AMI Networks., , , and . ICCCN, page 1-9. IEEE, (2017)Impact of a Deterministic Delay in the DCA Protocol., , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 134-144. Springer, (2015)Cooperative Spectrum and Infrastructure Leasing on TV Bands., , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 623-633. Springer, (2015)Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks., , , and . MobiCom, page 15-26. ACM, (2007)EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks., , , , and . IWCMC, page 1159-1164. IEEE, (2012)Statistical Comparisons of Multiple Classifiers., and . MLMTA, page 97-101. CSREA Press, (2003)Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks., , , , , and . ICC, page 7609-7614. IEEE, (2015)Distributed Core Decomposition in Probabilistic Graphs., , , , , , and . CSoNet, volume 11917 of Lecture Notes in Computer Science, page 16-32. Springer, (2019)A game theoretic analysis on block withholding attacks using the zero-determinant strategy., , and . IWQoS, page 41:1-41:10. ACM, (2019)Fault tolerant target tracking in sensor networks., and . MobiHoc, page 125-134. ACM, (2009)