Author of the publication

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach.

, , , , , and . ICDM, page 101-109. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Commanding Model of Counterwork Simulation System Based on Value Driving Decision-Making., , , and . AsiaSim (1), volume 323 of Communications in Computer and Information Science, page 13-19. Springer, (2012)Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers., , , and . IEEE Access, (2019)Multigrid Bilateral Filtering., , , and . IEICE Trans. Inf. Syst., 97-D (10): 2748-2759 (2014)Deep neural network-based bottleneck feature and denoising autoencoder-based dereverberation for distant-talking speaker identification., , , , , and . EURASIP J. Audio Speech Music. Process., (2015)A liver fibrosis staging method using cross-contrast network., , , , , , and . Expert Syst. Appl., (2019)Multifarious distances, cameras and illuminations face database., , , , and . APSIPA, page 873-876. IEEE, (2015)Keyword-specific normalization based keyword spotting for spontaneous speech., and . ISCSLP, page 233-237. IEEE, (2012)Face recognition with local contourlet combined patterns., , , , and . ICASSP, page 1273-1277. IEEE, (2016)Binarized features with discriminant manifold filters for robust single-sample face recognition., , , , , and . Signal Process. Image Commun., (2018)Multiple Regression of Log Spectra for In-Car Speech Recognition Using Multiple Distributed Microphones., , , , , , , and . IEICE Trans. Inf. Syst., 88-D (3): 384-390 (2005)