Author of the publication

Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning.

, , , , and . Comput. Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mateu, Carles
add a person with the name Mateu, Carles
 

Other publications of authors with the same name

Generating Hard SAT/CSP Instances Using Expander Graphs., , , and . AAAI, page 1442-1443. AAAI Press, (2008)Using convolutional neural networks for classification of malware represented as images., , , and . J. Computer Virology and Hacking Techniques, 15 (1): 15-28 (2019)Approximate dynamic programming for automated vacuum waste collection systems., , , and . Environmental Modelling and Software, (2015)An End-to-End Deep Learning Architecture for Classification of Malware's Binary Content., , and . ICANN (3), volume 11141 of Lecture Notes in Computer Science, page 383-391. Springer, (2018)Weighted argumentation for analysis of discussions in Twitter., , , , , and . Int. J. Approx. Reasoning, (2017)Solving Routing and Wavelength Assignment Problem with Conflict-Driven ASP Solvers., , , and . CCIA, volume 256 of Frontiers in Artificial Intelligence and Applications, page 60-63. IOS Press, (2013)On 2SAT-MaxOnes with Unbalanced Polarity: from Easy Problems to Hard MaxClique Problems., , , and . CCIA, volume 232 of Frontiers in Artificial Intelligence and Applications, page 21-30. IOS Press, (2011)The Sudoku completion problem with rectangular hole pattern is NP-complete., , , and . Discrete Mathematics, 312 (22): 3306-3315 (2012)Generating highly balanced sudoku problems as hard problems., , , , and . J. Heuristics, 17 (5): 589-614 (2011)Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning., , , , and . Comput. Secur., (2022)