Search for persons
X
?
2023 IEEE Symposium on Security and Privacy (SP) ,
1
From Grim Reality to Practical Solution: Malware Classifica..:
, In:
?
Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data ,
2
Elastic Machine Learning Algorithms in Amazon SageMaker:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
3
Forecasting Suspicious Account Activity at Large-Scale Onli..:
, In:
?
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security ,
4
CADENCE : Conditional Anomaly Detection for Events Using..:
, In:
?
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management ,
6
Nationality Classification Using Name Embeddings:
, In:
?
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security ,
7
Generating Look-alike Names For Security Challenges:
, In:
?
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security ,
8
An Early Warning System for Suspicious Accounts:
, In:
?
Proceedings of the 2016 New Security Paradigms Workshop ,
9
Harvesting the low-hanging fruits : defending against au..:
, In:
?
Proceedings of the 29th Annual Computer Security Applications Conference ,
10
Discovery of emergent malicious campaigns in cellular netwo..:
, In:
?
Proceedings of the 2013 New Security Paradigms Workshop ,
11
Detecting hidden enemy lines in IP address space:
, In:
?
Proceedings of the second international workshop on Mobile cloud computing and services ,
12
VPMN : virtual private mobile network towards mobility-a..:
, In:
?
Proceedings of the 26th Annual Computer Security Applications Conference ,
13