Cited By
View all- Koch LBegoli E(2025)Adversarial Binaries: AI-guided Instrumentation Methods for Malware Detection EvasionACM Computing Surveys10.1145/370657357:5(1-36)Online publication date: 9-Jan-2025
- Qu ZLing XWang TChen XJi SWu C(2024)AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-ServiceIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335091119(2623-2638)Online publication date: 2024
- Mwangi MCheng S(2024)An Adversarial Attack on ML-Based IoT Malware Detection Using Binary Diversification TechniquesIEEE Access10.1109/ACCESS.2024.3513713(1-1)Online publication date: 2024
- Show More Cited By