Author of the publication

MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors.

, , , , , and . IEEE Trans. Computers, 73 (4): 980-993 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Maximal Clique Enumeration for Real-World Graphs., , , , and . DASFAA (1), volume 11446 of Lecture Notes in Computer Science, page 641-658. Springer, (2019)Consensus in Wireless Blockchain System., , , , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 568-579. Springer, (2020)Distributed Core Decomposition in Probabilistic Graphs., , , , , and . Asia Pac. J. Oper. Res., 38 (5): 2140008:1-2140008:23 (2021)Offline and online algorithms for single-minded selling problem., , , , , and . Theor. Comput. Sci., (2020)Decentralized Parallel SGD Based on Weight-Balancing for Intelligent IoV., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 15740-15751 (December 2023)CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA., , , , , and . IEEE Trans. Computers, 71 (12): 3242-3253 (2022)A GPU-Enabled Real-Time Framework for Compressing and Rendering Volumetric Videos., , , , , and . IEEE Trans. Computers, 73 (3): 789-800 (March 2024)Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations., , , , , and . IEEE Trans. Computers, 72 (11): 3231-3244 (November 2023)A nearly optimal distributed algorithm for computing the weighted girth., , , , and . Sci. China Inf. Sci., (2021)zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs., , , , , and . IPCCC, page 57-64. IEEE, (2022)