From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers., , , , , и . CoRR, (2020)Emulating emulation-resistant malware., , , , и . VMSec@CCS, стр. 11-22. ACM, (2009)DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly., , , и . USENIX Security Symposium, стр. 2709-2725. USENIX Association, (2022)HookFinder: Identifying and Understanding Malware Hooking Behaviors., , и . NDSS, The Internet Society, (2008)TransBlocker: Transforming and Taming Privacy-Breaching Android Applications., и . NDSS, The Internet Society, (2013)vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries., , и . NDSS, The Internet Society, (2015)SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets., , , , , , и . NDSS, The Internet Society, (2021)MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware., , , , , и . AsiaCCS, стр. 990-1003. ACM, (2022)OS-Sommelier: memory-only operating system fingerprinting in the cloud., , , , и . SoCC, стр. 5. ACM, (2012)Enforcing system-wide control flow integrity for exploit detection and diagnosis., , и . AsiaCCS, стр. 311-322. ACM, (2013)