Author of the publication

Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.

, , , , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 603-612. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware., , , , , , and . DSA, page 395-400. IEEE, (2019)A Heterogeneous High Speed Wireless Body Sensor Network Based on SC-UWB and ZIGBEE., , , , , and . GLOBECOM, page 1-5. IEEE, (2011)An Integrated Architecture for IoT Malware Analysis and Detection., , , , , , and . IoTaaS, volume 271 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 127-137. Springer, (2018)Research on Abnormal Traffic Detection of Internet of Things Based on Feature Selection., , and . CNIOT, page 576-582. ACM, (2023)VSFBS: Vulnerability Search in Firmware Based on String., , , , , , , and . DSA, page 555-563. IEEE, (2020)Grainflow: a per-bit customizable scheme for data plane innovation on programmable hardware., , , , and . StudentWorkshop@CoNEXT, page 13:1-13:2. ACM, (2011)Vulnerability Detection in Firmware Based on Clonal Selection Algorithm., , , , , , and . SSCI, page 1915-1921. IEEE, (2019)Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement., , , , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 603-612. Springer, (2022)Knowledge Enhanced GAN for IoT Traffic Generation., , , , , , and . WWW, page 3336-3346. ACM, (2022)IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares., , , , , and . IPCCC, page 1-8. IEEE Computer Society, (2017)