Noise Contrastive Estimation-based Matching Framework for Low-Resource Security Attack Pattern Recognition.
Proceedings of the Findings of the Association for Computational Linguistics: EACL 2024, 2024
WoRMA '22: 1st Workshop on Robust Malware Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Detection of illicit cryptomining using network metadata.
EURASIP J. Inf. Secur., 2021
Machine Learning and Security of Non-Executable Files.
PhD thesis, 2017
Hidost: a static machine-learning-based detector of malicious files.
EURASIP J. Inf. Secur., 2016
Practical Evasion of a Learning-Based Classifier: A Case Study.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Evasion Attacks against Machine Learning at Test Time.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013
Detection of Malicious PDF Files Based on Hierarchical Document Structure.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Static detection of malicious JavaScript-bearing PDF documents.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
The application of a Parallel Genetic Algorithm to timetabling of elementary school classes: A coarse grained approach.
Proceedings of the XXII International Symposium on Information, 2009