From post

BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning.

, , , и . ESORICS (2), том 11736 из Lecture Notes in Computer Science, стр. 47-67. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Good, The Bad, and The Ugly About Insta Shopping: A Qualitative Study., , и . IEEE Trans. Comput. Soc. Syst., 10 (5): 2786-2796 (октября 2023)Boosting Students and Teachers Cybersecurity Awareness During COVID-19 Pandemic., и . EDUCON, стр. 726-731. IEEE, (2021)Efforts and Suggestions for Improving Cybersecurity Education., , и . EDUCON, стр. 1161-1168. IEEE, (2022)An Efficient Strategy for Deploying Deception Technology., , и . FABULOUS, том 542 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 177-194. Springer, (2023)A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features., , и . ACM Comput. Surv., 55 (2): 19:1-19:41 (2023)Using AI to Detect Android Malware Families., , , , , и . DRCN, стр. 1-8. IEEE, (2024)Convergence of IoT and Cognitive Radio Networks: A Survey of Applications, Techniques, and Challenges., , , , и . IEEE Access, (2023)A Deep Learning Approach to Discover Router Firmware Vulnerabilities., , , , и . IEEE Trans. Ind. Informatics, 20 (1): 691-702 (января 2024)AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks., , , , и . EDUCON, стр. 1-6. IEEE, (2023)AI Techniques for Software Vulnerability Detection and Mitigation., , , , , и . DSC, стр. 1-10. IEEE, (2023)