Search for persons
X
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
1
Tarallo: Evading Behavioral Malware Detectors in the Proble..:
, In:
?
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security ,
4
Lookin' Out My Backdoor! Investigating Backdooring Attacks ..:
, In:
?
Lecture Notes in Computer Science; Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track ,
5
Advancing Fraud Detection Systems Through Online Learning:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
7
Untangle: Aiding Global Function Pointer Hijacking for Post..:
, In:
?
Advances in Information and Computer Security; Lecture Notes in Computer Science ,
8
The Good, the Bad, and the Binary: An LSTM-Based Method for..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
12
CANflict : Exploiting Peripheral Conflicts for Data-Link..:
, In:
?
24th International Symposium on Research in Attacks, Intrusions and Defenses ,
14
SyML: Guiding Symbolic Execution Toward Vulnerable States T..:
, In:
?
Annual Computer Security Applications Conference ,
15