Author of the publication

Infinity-Norm Support Vector Machines Against Adversarial Label Contamination.

, , , , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 106-115. CEUR-WS.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DLLMiner: structural mining for malware detection., , , , and . Secur. Commun. Networks, 8 (18): 3311-3322 (2015)Reject option with multiple thresholds., , and . Pattern Recognit., 33 (12): 2099-2101 (2000)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , and . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)Special Issue ÄI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection"., and . Algorithms, 16 (7): 327 (July 2023)Infinity-Norm Support Vector Machines Against Adversarial Label Contamination., , , , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 106-115. CEUR-WS.org, (2017)IntelliAV: Building an Effective On-Device Android Malware Detector., , and . CoRR, (2018)Methods for Designing Multiple Classifier Systems., , and . Multiple Classifier Systems, volume 2096 of Lecture Notes in Computer Science, page 78-87. Springer, (2001)Network Intrusion Detection by Combining One-Class Classifiers., , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 58-65. Springer, (2005)Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval., and . SSPR/SPR, volume 2396 of Lecture Notes in Computer Science, page 607-616. Springer, (2002)HMM-Web: A Framework for the Detection of Attacks Against Web Applications., , and . ICC, page 1-6. IEEE, (2009)