Daniel Arp
Orcid: 0000-0003-3628-794XAffiliations:
- Braunschweig University of Technology, Germany (PhD 2019)
- University of Göttingen, Germany
- TU Berlin, Germany
According to our database1,
Daniel Arp
authored at least 31 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version).
CoRR, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
2023
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
2020
Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification.
CoRR, 2020
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
Proceedings of the Ausgezeichnete Informatikdissertationen 2019., 2019
PhD thesis, 2019
IEEE Trans. Dependable Secur. Comput., 2019
CoRR, 2019
2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
CoRR, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques.
Int. J. Inf. Sec., 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
A close look on <i>n</i>-grams in intrusion detection: anomaly detection vs. classification.
Proceedings of the AISec'13, 2013
Proceedings of the AISec'13, 2013
2012
Real-Time Multi-human Tracking Using a Probability Hypothesis Density Filter and Multiple Detectors.
Proceedings of the Ninth IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2012