Tomás Pevný

Orcid: 0000-0002-5768-9713

According to our database1, Tomás Pevný authored at least 98 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Classification with costly features in hierarchical deep sets.
Mach. Learn., July, 2024

On the Economics of Adversarial Machine Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Malicious Internet Entity Detection Using Local Graph Inference.
IEEE Trans. Inf. Forensics Secur., 2024

Deep anomaly detection on set data: Survey and comparison.
Pattern Recognit., 2024

GraphSPNs: Sum-Product Networks Benefit From Canonical Orderings.
CoRR, 2024

Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis.
CoRR, 2024

Generating Likely Counterfactuals Using Sum-Product Networks.
CoRR, 2024

Sum-Product-Set Networks: Deep Tractable Models for Tree-Structured Graphs.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

2023
The Non-Zero-Sum Game of Steganography in Heterogeneous Environments.
IEEE Trans. Inf. Forensics Secur., 2023

Improving the Validity of Decision Trees as Explanations.
CoRR, 2023

Is AUC the best measure for practical comparison of anomaly detectors?
CoRR, 2023

Leveraging Data Geometry to Mitigate CSM in Steganalysis.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Optimize Planning Heuristics to Rank, not to Estimate Cost-to-Goal.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Heuristic Search Optimisation Using Planning and Curriculum Learning Techniques.
Proceedings of the Progress in Artificial Intelligence, 2023

2022
Comparison of Anomaly Detectors: Context Matters.
IEEE Trans. Neural Networks Learn. Syst., 2022

Backpack: A Backpropagable Adversarial Embedding Scheme.
IEEE Trans. Inf. Forensics Secur., 2022

General framework for binary classification on top samples.
Optim. Methods Softw., 2022

JsonGrinder.jl: automated differentiable neural architecture for embedding arbitrary JSON data.
J. Mach. Learn. Res., 2022

A Differentiable Loss Function for Learning Heuristics in A.
CoRR, 2022

Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data.
CoRR, 2022

Using Set Covering to Generate Databases for Holistic Steganalysis.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

2021
Explicit Optimization of min max Steganographic Game.
IEEE Trans. Inf. Forensics Secur., 2021

Heuristic Search Planning with Deep Neural Networks using Imitation, Attention and Curriculum Learning.
CoRR, 2021

Fitting large mixture models using stochastic component selection.
CoRR, 2021

Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data.
CoRR, 2021

Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks.
CoRR, 2021

Optimizing Additive Approximations of Non-additive Distortion Functions.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial Examples.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

2020
Classification with costly features as a sequential decision-making problem.
Mach. Learn., 2020

Anomaly explanation with random forests.
Expert Syst. Appl., 2020

Symbolic Relational Deep Reinforcement Learning based on Graph Neural Networks.
CoRR, 2020

Nested Multiple Instance Learning in Modelling of HTTP network traffic.
CoRR, 2020

Sum-Product-Transform Networks: Exploiting Symmetries using Invertible Transformations.
Proceedings of the International Conference on Probabilistic Graphical Models, 2020

Neural Power Units.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Loss Functions for Clustering in Multi-instance Learning.
Proceedings of the 20th Conference Information Technologies, 2020

2019
Joint detection of malicious domains and infected clients.
Mach. Learn., 2019

Rodent: Relevance determination in ODE.
CoRR, 2019

Deep Reinforcement Learning with Explicitly Represented Knowledge and Variable State and Action Spaces.
CoRR, 2019

Approximation capability of neural networks on spaces of probability measures and tree-structured domains.
CoRR, 2019

Anomaly scores for generative models.
CoRR, 2019

Exploiting Adversarial Embeddings for Better Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Classification with Costly Features Using Deep Reinforcement Learning.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test.
IEEE Trans. Inf. Forensics Secur., 2018

Multiple instance learning for malware classification.
Expert Syst. Appl., 2018

Are generative deep models for novelty detection truly better?
CoRR, 2018

Algorithms for solving optimization problems arising from deep neural net models: nonsmooth problems.
CoRR, 2018

Algorithms for solving optimization problems arising from deep neural net models: smooth problems.
CoRR, 2018

Probabilistic analysis of dynamic malware traces.
Comput. Secur., 2018

Exploring Non-Additive Distortion in Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing.
J. Comput. Syst. Sci., 2017

Malware Detection by Analysing Network Traffic with Neural Networks.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Malware Discovery Using Behaviour-Based Exploration of Network Traffic.
Proceedings of the Similarity Search and Applications - 10th International Conference, 2017

Malware Detection by Analysing Encrypted Network Traffic with Neural Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Using Neural Network Formalism to Solve Multiple-Instance Problems.
Proceedings of the Advances in Neural Networks - ISNN 2017 - 14th International Symposium, 2017

Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Loda: Lightweight on-line detector of anomalies.
Mach. Learn., 2016

Using Behavioral Similarity for Botnet Command-and-Control Discovery.
IEEE Intell. Syst., 2016

Learning combination of anomaly detectors for security domain.
Comput. Networks, 2016

Passive NAT detection using HTTP access logs.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce.
Proceedings of the Similarity Search and Applications - 9th International Conference, 2016

k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach.
Proceedings of the Intelligence and Security Informatics - 11th Pacific Asia Workshop, 2016

Malicons: Detecting Payload in Favicons.
Proceedings of the Media Watermarking, 2016

Rethinking Optimal Embedding.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Discriminative Models for Multi-instance Problems with Tree Structure.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Optimizing pooling function for pooled steganalysis.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Towards dependable steganalysis.
Proceedings of the Media Watermarking, 2015

Automatic discovery of web servers hosting similar applications.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Unsupervised detection of malware in persistent web traffic.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
The Steganographer is the Outlier: Realistic Large-Scale Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2014

Randomized Operating Point Selection in Adversarial Classification.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014

A mishmash of methods for mitigating the model mismatch mess.
Proceedings of the Media Watermarking, 2014

Steganographic key leakage through payload metadata.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

2013
The challenges of rich features in universal steganalysis.
Proceedings of the Media Watermarking, 2013

Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Attacking the IDS learning processes.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
From Blind to Quantitative Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2012

Detecting anomalous network hosts by means of PCA.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Batch steganography in the real world.
Proceedings of the Multimedia and Security Workshop, 2012

Co-occurrence steganalysis in high dimensions.
Proceedings of the Media Watermarking, 2012

Identifying a steganographer in realistic and heterogeneous data sets.
Proceedings of the Media Watermarking, 2012

2011
Detecting messages of unknown length.
Proceedings of the Media Watermarking, 2011

A new paradigm for steganalysis via clustering.
Proceedings of the Media Watermarking, 2011

"Break Our Steganographic System": The Ins and Outs of Organizing BOSS.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Steganalysis by subtractive pixel adjacency matrix.
IEEE Trans. Inf. Forensics Secur., 2010

Modern steganalysis can detect YASS.
Proceedings of the Media Forensics and Security II, 2010

Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010

2008
Multiclass Detector of Current Steganographic Methods for JPEG Format.
IEEE Trans. Inf. Forensics Secur., 2008

Detection of Double-Compression in JPEG Images for Applications in Steganography.
IEEE Trans. Inf. Forensics Secur., 2008

Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images.
Proceedings of the Security, 2008

Novelty detection in blind steganalysis.
Proceedings of the 10th workshop on Multimedia & Security, 2008

The square root law of steganographic capacity.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Benchmarking for Steganography.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
Merging Markov and DCT features for multi-class JPEG steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.
Proceedings of the 9th workshop on Multimedia & Security, 2007

2006
Multi-class blind steganalysis for JPEG images.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

2005
Towards Multi-class Blind Steganalyzer for JPEG Images.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005


  Loading...