Author of the publication

A graph theoretic approach to fast and accurate malware detection.

, and . Networking, page 1-9. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measurement and Early Detection of Third-Party Application Abuse on Twitter., and . WWW, page 448-458. ACM, (2019)WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking., , , , and . CoRR, (2021)Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective., , and . SP, page 364-381. IEEE, (2023)Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors., , and . SP, page 1143-1161. IEEE, (2021)TrackerSift: untangling mixed tracking and functional web resources., , , , and . Internet Measurement Conference, page 569-576. ACM, (2021)A Girl Has A Name: Detecting Authorship Obfuscation., , and . ACL, page 2235-2245. Association for Computational Linguistics, (2020)Multipath TCP traffic diversion attacks and countermeasures., , , , and . ICNP, page 1-10. IEEE Computer Society, (2017)DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices., , , , , and . EuroS&P, page 337-355. IEEE, (2022)HARPO: Learning to Subvert Online Behavioral Advertising., , , and . NDSS, The Internet Society, (2022)WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking., , , , and . USENIX Security Symposium, page 2875-2892. USENIX Association, (2022)