Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models., and . CoRR, (2018)Channel-Robust Classifiers., , , and . IEEE Trans. Signal Processing, 59 (4): 1421-1434 (2011)Detecting Homoglyph Attacks with a Siamese Neural Network., , , and . IEEE Symposium on Security and Privacy Workshops, page 22-28. IEEE Computer Society, (2018)Reliable early classification of time series., , , and . ICASSP, page 2073-2076. IEEE, (2012)Subjective evaluations of example-based, total variation, and joint regularization for image processing., , and . Computational Imaging, volume 8296 of SPIE Proceedings, page 82960S. IS&T/SPIE, (2012)Sea ice mapping method for SeaWinds., and . IEEE Trans. Geoscience and Remote Sensing, 43 (3): 647-657 (2005)Robust sequential classification of tracks., , and . FUSION, page 1-8. IEEE, (2010)The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation., , , , , , , , , and 16 other author(s). CoRR, (2018)DeepDGA: Adversarially-Tuned Domain Generation and Detection., , and . AISec@CCS, page 13-21. ACM, (2016)Sparse imaging for fast electron microscopy., , , , and . Computational Imaging, volume 8657 of SPIE Proceedings, page 86570C. IS&T/SPIE, (2013)