Author of the publication

Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.

, , , , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 603-612. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bistatic forward-looking SAR interferometry., , and . IGARSS, page 6488-6491. IEEE, (2016)Mechanisms and Main Regularities of Biomass Liquefaction with Alcoholic Solvents, , , , , and . Energy & Fuels, 23 (10): 5213-5218 (2009)Study on velocity measurement of AT-INSAR in the cluster micro-satellite system., and . IGARSS, page 1496-1499. IEEE, (2005)SAR deception jamming target recognition based on the shadow feature., , , , and . EUSIPCO, page 2491-2495. IEEE, (2017)A New Method for Achieving Flexibility in Hierarchical Multilevel System Design., , , , and . Concurrent Engineering: R&A, 19 (2): 187-196 (2011)Annular Array 3-D Sar: Resolution Analysis and Data Processing., , , and . IGARSS, page 565-568. IEEE, (2018)A multiple-subapertures autofocusing algorithm for circular SAR imaging., , and . IGARSS, page 2441-2444. IEEE, (2015)Efficient Registration for InSAR Large-Scale Image Using Quadtree Segmentation., , , , and . IGARSS, page 4435-4438. IEEE, (2018)Ground Moving Target 2-D Velocity Estimation and Refocusing for Multichannel Maneuvering SAR with Fixed Acceleration., , , , and . Sensors, 19 (17): 3695 (2019)A new general algebraic method with symbolic computation and its application to two nonlinear differential equations with nonlinear terms of any order., , , and . Appl. Math. Comput., 182 (2): 1330-1340 (2006)