Author of the publication

Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.

, , , , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs., , , , and . SP, page 2977-2995. IEEE, (2024)Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach., , , , and . SocialSec, page 64-71. IEEE Computer Society, (2015)StyleFool: Fooling Video Classification Systems via Style Transfer., , , , , and . SP, page 1631-1648. IEEE, (2023)Detecting Union Type Confusion in Component Object Model., , , , , , , and . USENIX Security Symposium, page 4265-4281. USENIX Association, (2023)dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis., , , , , and . USENIX Security Symposium, USENIX Association, (2024)Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers., , and . ISPA/IUCC, page 1130-1137. IEEE, (2017)A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services., , , , , , , and . NDSS, The Internet Society, (2024)RAI2: Responsible Identity Audit Governing the Artificial Intelligence., , , , , and . NDSS, The Internet Society, (2023)Efficient Constrained K-center Clustering with Background Knowledge., , , , and . AAAI, page 20709-20717. AAAI Press, (2024)When program analysis meets mobile security: an industrial study of misusing Android internet sockets., , , , , and . ESEC/SIGSOFT FSE, page 842-847. ACM, (2017)