Personensuche
X
?
2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD) ,
1
CAFE: Robust Detection of Malicious Macro based on Cross-mo..:
, In:
?
Computational Science – ICCS 2024; Lecture Notes in Computer Science ,
2
A Framework for Intelligent Generation of Intrusion Detecti..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
4
PackGenome: Automatically Generating Robust YARA Rules for ..:
, In:
?
GLOBECOM 2023 - 2023 IEEE Global Communications Conference ,
5
Towards Open-Set APT Malware Classification under Few-Shot ..:
, In:
?
Science of Cyber Security; Lecture Notes in Computer Science ,
8
AST2Vec: A Robust Neural Code Representation for Malicious ..:
, In:
?
Computational Science – ICCS 2023; Lecture Notes in Computer Science ,
9
Payload Level Graph Attention Network for Web Attack Traffi..:
, In:
?
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) ,
10
High-Efficient and Few-shot Adaptive Encrypted Traffic Clas..:
, In:
?
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys) ,
12
A Glimpse of the Whole: Detecting Few-shot Android Malware ..:
, In:
?
Computational Science – ICCS 2022; Lecture Notes in Computer Science ,
13
AMDetector: Detecting Large-Scale and Novel Android Malware..:
, In:
?
Science of Cyber Security; Lecture Notes in Computer Science ,
14
Mining Trojan Detection Based on Multi-dimensional Static F..:
, In:
?
Computational Science – ICCS 2021; Lecture Notes in Computer Science ,
15