Author of the publication

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.

, , , , , , and . ICDCS, page 888-898. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster., , , , and . WiSec, page 286-287. ACM, (2019)Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers., , , , , , and . ICDCS, page 888-898. IEEE, (2020)Systemically Evaluating the Robustness of ML-based IoT Malware Detectors., , , , , , and . DSN (Supplements), page 3-4. IEEE, (2021)Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems., , , , , , and . RAID, page 308-320. ACM, (2022)Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study., , , , , and . ICCCN, page 1-10. IEEE, (2023)Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n., , , and . ICDCS, page 2515-2520. IEEE Computer Society, (2017)InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows., , , , and . ICDCS, page 2047-2056. IEEE, (2019)Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study., , , , , and . CySSS@AsiaCCS, page 19-25. ACM, (2022)A Robust Counting Sketch for Data Plane Intrusion Detection., , , , and . NDSS, The Internet Society, (2023)Highly-accurate rogue access point detection using intentional channel interference: poster., , , and . WISEC, page 277-278. ACM, (2017)