Search for persons
X
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Broadband Communications, Networks, and Systems ,
1
Deep CounterStrike: Counter Adversarial Deep Reinforcement ..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Broadband Communications, Networks, and Systems ,
4
Android Malware Detection Based on Static Analysis and Data..:
, In:
?
Computational Science – ICCS 2023; Lecture Notes in Computer Science ,
5
RL-MAGE: Strengthening Malware Detectors Against Smart Adve..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Broadband Communications, Networks, and Systems ,
6
MalEfficient10%: A Novel Feature Reduction Approach for And..:
, In:
?
Computational Science – ICCS 2023; Lecture Notes in Computer Science ,
7
Breaking the Anti-malware: EvoAAttack Based on Genetic Algo..:
, In:
?
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) ,
10
Are Malware Detection Models Adversarial Robust Against Eva..:
, In:
?
Secure Knowledge Management In The Artificial Intelligence Era; Communications in Computer and Information Science ,
11
Adversarial Robustness of Image Based Android Malware Detec..:
, In:
?
14
Secure Knowledge Management In The Artificial Intelligence ..
Communications in Computer and Information Science, 1549