Olivier Y. de Vel

Orcid: 0000-0001-5179-3707

According to our database1, Olivier Y. de Vel authored at least 61 papers between 1988 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bayesian Learned Models Can Detect Adversarial Malware for Free.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation.
IEEE Trans. Dependable Secur. Comput., 2022

Transferable Graph Backdoor Attack.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2021
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases.
IEEE Trans. Dependable Secur. Comput., 2021

Information-theoretic Source Code Vulnerability Highlighting.
Proceedings of the International Joint Conference on Neural Networks, 2021

Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Towards Understanding Pixel Vulnerability under Adversarial Attacks for Images.
CoRR, 2020

Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Deep Cost-Sensitive Kernel Machine for Binary Software Vulnerability Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Code Action Network for Binary Function Scope Identification.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Code Pointer Network for Binary Function Scope Identification.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Improving Adversarial Robustness by Enforcing Local and Global Compactness.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions.
CoRR, 2019

Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019

Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs.
IEEE Access, 2019

Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation.
Proceedings of the Network and System Security - 13th International Conference, 2019

Deep Domain Adaptation for Vulnerable Code Function Identification.
Proceedings of the International Joint Conference on Neural Networks, 2019

Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection.
Proceedings of the 7th International Conference on Learning Representations, 2019

2018
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Ind. Informatics, 2018

Detecting and Preventing Cyber Insider Threats: A Survey.
IEEE Commun. Surv. Tutorials, 2018

Anomaly-Based Insider Threat Detection Using Deep Autoencoders.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Reinforcement Learning for Autonomous Defence in Software-Defined Networking.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2008
A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics.
Proceedings of the Intelligence and Security Informatics, 2008

A latent semantic indexing and WordNet based information retrieval model for digital forensics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks.
Proceedings of the AI 2008: Advances in Artificial Intelligence, 2008

2006
Learning Semi-Structured Document Categorization Using Bounded-Length Spectrum Sub-Sequence Kernels.
Data Min. Knowl. Discov., 2006

Automated recognition of event scenarios for digital forensics.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.
Proceedings of the Intelligence and Security Informatics, 2006

2005
Design of a Digital Forensics Image Mining System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
File classification using byte sub-stream kernels.
Digit. Investig., 2004

2003
Unification and extension of weighted finite automata applicable to image compression.
Theor. Comput. Sci., 2003

2002
Investigative Profiling with Computer Forensic Log Data and Association Rules.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

Investigative Profile Analysis With Computer Forensic Log Data Using Attribute Generalisation.
Proceedings of the 15th Australian Joint Conference on Artificial Intelligence 2002, 2002

Gender-Preferential Text Mining of E-mail Discourse.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

E-Mail Authorship Attribution for Computer Forensics.
Proceedings of the Applications of Data Mining in Computer Security, 2002

2001
Mining Email Content for Author Identification Forensics.
SIGMOD Rec., 2001

An Inference Implementation Based on Extended Weighted Finite Automata.
Proceedings of the 24th Australasian Computer Science Conference (ACSC 2001), 29 January, 2001

2000
New Fast Algorithms for Error Rate-Based Stepwise Variable Selection in Discriminant Analysis.
SIAM J. Sci. Comput., 2000

Object recognition using random image-lines.
Image Vis. Comput., 2000

Similarity Enrichment in Image Compression through Weighted Finite Automata.
Proceedings of the Computing and Combinatorics, 6th Annual International Conference, 2000

1999
Line-Based Face Recognition under Varying Pose.
IEEE Trans. Pattern Anal. Mach. Intell., 1999

Rapid prototyping of distributed algorithms.
J. Syst. Softw., 1999

1998
On heuristics for optimal configuration of hierarchical distributed monitoring systems.
J. Syst. Softw., 1998

Feature Mining and Mapping of Collinear Data.
Proceedings of the Research and Development in Knowledge Discovery and Data Mining, 1998

View-based object recognition using image lines.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

Face recognition using multiple image view line segments.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

1997
Classification Using Adaptive Wavelets for Feature Extraction.
IEEE Trans. Pattern Anal. Mach. Intell., 1997

Learning to Recognition 3D Objects Using Sparse Depth and Intensity Information.
Int. J. Pattern Recognit. Artif. Intell., 1997

1996
Inducing complex spatial descriptions in two dimensional scenes.
Proceedings of the Learning and Reasoning with Complex Representations, 1996

1995
On Thai character recognition.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995

Non-Linear Dimensionality Reduction: A Comparative Performance Analysis.
Proceedings of the Learning from Data, 1995

1994
Comparative analysis of statistical pattern recognition methods in high dimensional settings.
Pattern Recognit., 1994

Concurrent Simulation of Systolic and Wavefront Array Processor Architectures.
Int. J. Comput. Simul., 1994

1993
Concurrent Simulation of Instruction Systolic Array Structures.
Proceedings of the MASCOTS '93, 1993

1991
Petri Net Modelling of Occam Programs for Detecting Indeterminacy, Non-termination and Deadlock Anomalies.
Proceedings of the Fourth International Workshop on Petri Nets and Performance Models, 1991

1990
Multitransputer architecture for the low-level characterization of speech spectrograms.
Microprocess. Microsystems, 1990

1988
An Iterative Pipelined Array Architecture for the Generalized Matrix Inversion.
Inf. Process. Lett., 1988


  Loading...