Author of the publication

Neural Network Fragile watermarking With No Model Performance Degradation.

, , and . ICIP, page 3958-3962. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers., , , , , and . CoRR, (2020)Emulating emulation-resistant malware., , , , and . VMSec@CCS, page 11-22. ACM, (2009)DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly., , , and . USENIX Security Symposium, page 2709-2725. USENIX Association, (2022)HookFinder: Identifying and Understanding Malware Hooking Behaviors., , and . NDSS, The Internet Society, (2008)TransBlocker: Transforming and Taming Privacy-Breaching Android Applications., and . NDSS, The Internet Society, (2013)vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries., , and . NDSS, The Internet Society, (2015)SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets., , , , , , and . NDSS, The Internet Society, (2021)MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware., , , , , and . AsiaCCS, page 990-1003. ACM, (2022)OS-Sommelier: memory-only operating system fingerprinting in the cloud., , , , and . SoCC, page 5. ACM, (2012)Enforcing system-wide control flow integrity for exploit detection and diagnosis., , and . AsiaCCS, page 311-322. ACM, (2013)