From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers., , , , , и . CoRR, (2020)DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly., , , и . USENIX Security Symposium, стр. 2709-2725. USENIX Association, (2022)SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets., , , , , , и . NDSS, The Internet Society, (2021)HookFinder: Identifying and Understanding Malware Hooking Behaviors., , и . NDSS, The Internet Society, (2008)TransBlocker: Transforming and Taming Privacy-Breaching Android Applications., и . NDSS, The Internet Society, (2013)vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries., , и . NDSS, The Internet Society, (2015)Emulating emulation-resistant malware., , , , и . VMSec@CCS, стр. 11-22. ACM, (2009)MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware., , , , , и . AsiaCCS, стр. 990-1003. ACM, (2022)Enforcing system-wide control flow integrity for exploit detection and diagnosis., , и . AsiaCCS, стр. 311-322. ACM, (2013)Polyglot: automatic extraction of protocol message format using dynamic binary analysis., , , и . CCS, стр. 317-329. ACM, (2007)