Author of the publication

Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?

, , , and . CANDAR, page 337-343. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of MRB Garbage Collection on Parallel Logic Programming Architectures., , , and . ICLP, page 83-95. MIT Press, (1990)KL1 Execution Model for PIM Cluster with Shared Memory., , , , and . ICLP, page 338-355. MIT Press, (1987)Research and Development of the Parallel Inference System in the Intermediate Stage of the FGCS Project., , , , and . FGCS, page 16-36. OHMSHA Ltd. Tokyo and Springer-Verlag, (1988)Analysis of malware download sites by focusing on time series variation of malware., and . ISCC, page 173-179. IEEE Computer Society, (2016)Suspicious FQDN Evaluation based on Variations in Malware Download URLs., and . ASONAM, page 811-818. ACM, (2017)Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?, , , and . CANDAR, page 337-343. IEEE Computer Society, (2017)Lazy Reference Counting: An Incremental Garbage Collection Method for Parallel Inference Machines., , , and . ICLP/SLP, page 1241-1256. MIT Press, (1988)Monitoring Dynamic Modification of Routing Information in OpenFlow Networks., , , , and . IMCOM, page 27:1-27:7. ACM, (2016)Review of National Cybersecurity Policies., and . PACIS, page 335. (2018)Towards a High Performance Parallel Inference Machine - The Intermediate Stage Plan of PIM., and . Future Parallel Computers, volume 272 of Lecture Notes in Computer Science, page 299-320. Springer, (1986)