Author of the publication

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers.

, , , , , , and . ICDCS, page 888-898. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction., , , and . Comput. Networks, (April 2023)Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description., , , and . CCS, page 3537-3539. ACM, (2023)Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality., , , and . CCS, page 988-1005. ACM, (2021)Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications., , , and . CoRR, (2022)SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals., , and . WPES@CCS, page 209-221. ACM, (2021)Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation., and . WWW (Companion Volume), page 860-867. ACM, (2022)Understanding the Privacy Dimension of Wearables through Machine Learning-enabled Inferences.. SNTA@HPDC, page 1. ACM, (2023)Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers., , , , , , and . ICDCS, page 888-898. IEEE, (2020)Do Content Management Systems Impact the Security of Free Content Websites?, , , , , and . CSoNet, volume 13831 of Lecture Notes in Computer Science, page 141-154. Springer, (2022)The Infrastructure Utilization of Free Contents Websites Reveal Their Security Characteristics., and . CSoNet, volume 14479 of Lecture Notes in Computer Science, page 255-267. Springer, (2023)