From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Texception: A Character/Word-Level Deep Learning Model for Phishing URL Detection., , и . ICASSP, стр. 2857-2861. IEEE, (2020)Robust scareware image detection., , , , и . ICASSP, стр. 2920-2924. IEEE, (2013)Finding Similar Failures Using Callstack Similarity., , , , , , и . SysML, USENIX Association, (2008)PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud., , , , , , и . NSDI, стр. 797-815. USENIX Association, (2020)Designing Media Provenance Indicators to Combat Fake Media., , и . RAID, стр. 324-339. ACM, (2021)A large-scale study of automated web search traffic., , и . AIRWeb, стр. 1-8. (2008)I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation., , , , , и . MILCOM, стр. 442-449. IEEE, (2022)AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks., , , , , , , и . CoRR, (2024)Robust Neural Malware Detection Models for Emulation Sequence Learning., , , и . MILCOM, стр. 1-8. IEEE, (2018)Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption., , , , , и . ICASSP, стр. 2792-2796. IEEE, (2020)