Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection., , , , and . CODASPY, page 353-364. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Generating sparse explanations for malicious Android opcode sequences using hierarchical LIME., , and . Comput. Secur., (February 2024)Automated Monitoring of Ear Biting in Pigs by Tracking Individuals and Events., , and . WACV, page 7080-7088. IEEE, (2024)Illumination invariant facial recognition using a piecewise-constant lighting model., , and . ICASSP, page 1537-1540. IEEE, (2012)Data Augmentation for Opcode Sequence Based Malware Detection., and . CoRR, (2021)Deep Android Malware Detection., , , , , , , , , and 1 other author(s). CODASPY, page 301-308. ACM, (2017)UnLearning from Experience to Avoid Spurious Correlations., , and . CoRR, (2024)Towards Explainable CNNs for Android Malware Detection., , , and . ANT/EDI40, volume 184 of Procedia Computer Science, page 959-965. Elsevier, (2021)Enhancing Linear Programming with Motion Modeling for Multi-target Tracking., , and . WACV, page 71-77. IEEE Computer Society, (2015)Recurrent Convolutional Network for Video-Based Person Re-identification., , and . CVPR, page 1325-1334. IEEE Computer Society, (2016)