Author of the publication

Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.

, , , , , and . AISec@CCS, page 209-220. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure-by-Design Framework for Automotive On-board Network Risk Analysis., , , and . VNC, page 1-8. IEEE, (2019)CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks., , , , and . CSCML, volume 13914 of Lecture Notes in Computer Science, page 135-150. Springer, (2023)FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds., , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 211-233. Springer, (2018)A Supervised Auto-Tuning Approach for a Banking Fraud Detection System., , and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 215-233. Springer, (2017)Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection., , , , and . VTC Spring, page 1-7. IEEE, (2024)BankSealer: An Online Banking Fraud Analysis and Decision Support System., , , , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 380-394. Springer, (2014)Security Evaluation of a Banking Fraud Analysis System., , , , , and . ACM Trans. Priv. Secur., 21 (3): 11:1-11:31 (2018)Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems., , , , , , and . ACSAC, page 480-495. ACM, (2020)A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications., , , , , , , , , and . CoRR, (2024)You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence., , , , and . RAID, page 368-383. ACM, (2024)