Author of the publication

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.

, , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing., , , , , and . IEEE Expert, 9 (6): 21-27 (1994)Affect Intensity Analysis of Dark Web Forums., and . ISI, page 282-288. IEEE, (2007)Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement., , and . ISI, page 7-12. IEEE, (2008)Dark Web - Exploring and Data Mining the Dark Side of the Web. Springer, (2012)Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums., , and . ACM Trans. Inf. Syst., 26 (3): 12:1-12:34 (2008)Automatic Concept Classification of Text from Electronic Meetings., , , , and . Commun. ACM, 37 (10): 56-73 (1994)Automatically detecting deceptive criminal identities., , and . Commun. ACM, 47 (3): 70-76 (2004)A Spatio Temporal Visualizer for Law Enforcement., , , , , , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 181-194. Springer, (2003)Mapping Dark Web Geolocation., and . EuroISI, volume 5376 of Lecture Notes in Computer Science, page 97-107. Springer, (2008)Homeland Security Data Mining Using Social Network Analysis.. EuroISI, volume 5376 of Lecture Notes in Computer Science, page 4. Springer, (2008)