Author of the publication

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.

, , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Commanding Model of Counterwork Simulation System Based on Value Driving Decision-Making., , , and . AsiaSim (1), volume 323 of Communications in Computer and Information Science, page 13-19. Springer, (2012)Identifying High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model., , and . ICIS, Association for Information Systems, (2016)Deep neural network-based bottleneck feature and denoising autoencoder-based dereverberation for distant-talking speaker identification., , , , , and . EURASIP J. Audio Speech Music. Process., (2015)Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks., , , , , , and . Inf. Sci., (2016)Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers., , , and . IEEE Access, (2019)Face recognition with local contourlet combined patterns., , , , and . ICASSP, page 1273-1277. IEEE, (2016)A liver fibrosis staging method using cross-contrast network., , , , , , and . Expert Syst. Appl., (2019)Keyword-specific normalization based keyword spotting for spontaneous speech., and . ISCSLP, page 233-237. IEEE, (2012)Multifarious distances, cameras and illuminations face database., , , , and . APSIPA, page 873-876. IEEE, (2015)An interpretable wide and deep model for online disinformation detection., , , , , and . Expert Syst. Appl., 237 (Part B): 121588 (March 2024)