Search for persons
X
?
HCI International 2024 Posters; Communications in Computer and Information Science ,
1
Evaluation of Adversarial Examples Based on Original Defini..:
, In:
?
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems ,
2
MEGEX: Data-Free Model Extraction Attack Against Gradient-B..:
, In:
?
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC) ,
3
Noisy Label Detection for Multi-labeled Malware:
, In:
?
Network Science; Lecture Notes in Computer Science ,
4
Competitive Information Spreading on Modular Networks:
, In:
?
ICC 2022 - IEEE International Conference on Communications ,
5
Objection!: Identifying Misclassified Malicious Activities ..:
, In:
?
Advances in Information and Computer Security; Lecture Notes in Computer Science ,
6
Understanding Update of Machine-Learning-Based Malware Dete..:
, In:
?
Advances in Information and Computer Security; Lecture Notes in Computer Science ,
7
Timing Attack on Random Forests for Generating Adversarial ..:
, In:
?
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) ,
8
Detecting Malware-infected Hosts Using Templates of Multipl..:
, In:
?
GLOBECOM 2020 - 2020 IEEE Global Communications Conference ,
9
Sybil Detection as Graph Filtering:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
10
Special-Purpose Model Extraction Attacks: Stealing Coarse M..:
, In:
?
Machine Learning and Knowledge Discovery in Databases; Lecture Notes in Computer Science ,
11
Graph Signal Processing for Directed Graphs Based on the He..:
, In:
?
Proceedings of the ACM Workshop on Automotive Cybersecurity ,
12
Anomaly Detection for Mixed Transmission CAN Messages Using..:
, In:
?
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security ,
13
Cross-Vendor Knowledge Transfer for Managed Security Servic..:
, In:
?
Proceedings of the 14th International Conference on Mining Software Repositories ,
14
Understanding the origins of mobile app vulnerabilities ..:
, In:
?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ,
15