Author of the publication

Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls.

, , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 309-324 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Single Sign-on Mechanism for Distributed Computer Networks., , , and . Ad Hoc Sens. Wirel. Networks, 31 (1-4): 131-149 (2016)Determination of Planetary Boundary Layer height with Lidar Signals Using Maximum Limited Height Initialization and Range Restriction (MLHI-RR)., , , , , and . Remote. Sens., 12 (14): 2272 (2020)Applying Binary Patch Comparison to Cisco IOS., , , and . ICNCC, page 38-42. ACM, (2017)AI-Enabled Automated and Closed-Loop Optimization Algorithms for Delay-Aware Network., , , , , and . WCNC, page 806-811. IEEE, (2022)An end-to-end model for Android malware detection., , and . ISI, page 140-142. IEEE, (2017)TH-VSS: An Asymmetric Storage Virtualization System for the SAN Environment., , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 399-406. Springer, (2005)Function Recognition in Stripped Binary of Embedded Devices., , , and . IEEE Access, (2018)Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm., and . DASC/PiCom/CBDCom/CyberSciTech, page 222-229. IEEE, (2020)Improving the Universality and Learnability of Neural Programmer-Interpreters with Combinator Abstraction., , and . ICLR (Poster), OpenReview.net, (2018)Obfuscation Algorithms Based on Congruence Equation and Knapsack Problem., , , and . EIDWT, volume 29 of Lecture Notes on Data Engineering and Communications Technologies, page 128-136. Springer, (2019)