Author of the publication

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers.

, , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mechanism Analysis of Wind Turbine Var Oscillations., , and . IEEE Trans. Ind. Electron., 70 (10): 10750-10754 (October 2023)Data-Driven Distributed Information-Weighted Consensus Filtering in Discrete-Time Sensor Networks With Switching Topologies., , , , , and . IEEE Trans. Cybern., 53 (12): 7548-7559 (December 2023)IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps., , , , , and . APSEC, page 202-212. IEEE, (2021)A Modular Small-Signal Analysis Framework for Inverter Penetrated Power Grids: Measurement, Assembling, Aggregation, and Stability Assessment., and . CoRR, (2020)Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem., , , , , and . ICSE, page 672-684. ACM, (2022)POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning., , , , and . CCS, page 1748-1750. ACM, (2016)Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java., , , , , , , and . ESEC/SIGSOFT FSE, page 921-933. ACM, (2023)Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps., , , , and . ESEC/SIGSOFT FSE, page 1255-1267. ACM, (2023)GridSweep Simulation: Measuring Subsynchronous Impedance Spectra of Distribution Feeder., , , and . CoRR, (2024)Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach., , , , , , and . Comput. Secur., (2018)