The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for evasion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1996 (16) 1997-2001 (24) 2002-2003 (27) 2004-2005 (32) 2006 (27) 2007 (39) 2008 (37) 2009 (37) 2010 (40) 2011 (29) 2012 (33) 2013 (26) 2014 (48) 2015 (41) 2016 (56) 2017 (60) 2018 (52) 2019 (75) 2020 (105) 2021 (95) 2022 (111) 2023 (117) 2024 (30)
Publication types (Num. hits)
article(541) book(1) incollection(3) inproceedings(601) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(170) ICRA(39) CDC(36) ACC(27) IROS(18) IEEE Access(14) RAID(13) AAAI(11) Autom. Remote. Control.(11) AAMAS(10) CCS(10) Dyn. Games Appl.(9) IEEE Trans. Aerosp. Electron. ...(9) IGTR(9) IJCAI(8) USENIX Security Symposium(8) More (+10 of total 520)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 153 occurrences of 116 keywords

Results
Found 1157 publication records. Showing 1157 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Yang Qifeng, Feng Bin, Song Ping Research on Anti-Tax Evasion System based on Union-Bank Online Payment mode. Search on Bibsonomy I3E (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
89Attila Szabó, László Gulyás, István János Tóth Sensitivity Analysis of a Tax Evasion Model Applying Automated Design of Experiments. Search on Bibsonomy EPIA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tax modeling, tax evasion, agent-based simulation, Agent-based computational economics
76Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang Resistance Analysis to Intruders' Evasion of Detecting Intrusion. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion
68Jonathan Annas, Jing Xiao 0001 Intelligent pursuit & evasion in an unknown environment. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
68Richard R. Brooks, Jing-En Pang, Christopher Griffin 0001 Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Sherif M. Khattab, Daniel Mossé, Rami G. Melhem Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Issam Aib, Tung Tran 0002, Raouf Boutaba Characterization and Solution to a Stateful IDS Evasion. Search on Bibsonomy ICDCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Ze-Su Cai, Li-ning Sun, Hai-Bo Gao A novel hierarchical decomposition for multi-player pursuit evasion differential game with superior evaders. Search on Bibsonomy GEC Summit The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-player, pursuit evasion, coalition formation, hierarchical decomposition, differential game
49Joc Cing Tay, Cheun Hou Tng, Chee Siong Chan Environmental effects on the coevolution of pursuit and evasion strategies. Search on Bibsonomy Genet. Program. Evolvable Mach. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pursuit and evasion, Chemical Genetic Programming, Competitive coevolution, Game of tag
49Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers Alert Verification Evasion Through Server Response Forging. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alert Verification, Network Intrusion Detection, Exploits, Evasion
49Damien Pellier, Humbert Fiorino Coordinated exploration of unknown labyrinthine environments applied to the pursuit evasion problem. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF pursuit-evasion problem, coordination, multiagent systems, distributed robotics
48Mythili Vutukuru, Hari Balakrishnan, Vern Paxson Efficient and Robust TCP Stream Normalization. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Normalization, Evasion Attacks
41Gianni Antichi, Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci Counting bloom filters for pattern matching and anti-evasion at the wire speed. Search on Bibsonomy IEEE Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Adrian Dumitrescu, Howi Kok, Ichiro Suzuki, Pawel Zylinski Vision-Based Pursuit-Evasion in a Grid. Search on Bibsonomy SWAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Warren Cheung, William S. Evans Pursuit-Evasion Voronoi Diagrams in ell_1. Search on Bibsonomy ISVD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Yongzhong Zhang, Jianhua Yang, Chunming Ye Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks. Search on Bibsonomy AICT/SAPIR/ELETE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Jacky Baltes, Yongjoo Park Comparison of Several Machine Learning Techniques in Pursuit-Evasion Games. Search on Bibsonomy RoboCup The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia Model-Based Covert Timing Channels: Automated Modeling and Evasion. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF traffic modeling, evasion, covert timing channels
35George Varghese, J. Andrew Fingerhut, Flavio Bonomi Detecting evasion attacks at high speeds without reassembly. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP reassembly, normalization, intrusion prevention systems, evasion attacks
34Masumi Ishikawa, Kosuke Ueno Hierarchical Architecture with Modular Network SOM and Modular Reinforcement Learning. Search on Bibsonomy ICANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Modular network SOM, modular reinforcement learning, pursuit-evasion game, hierarchical architecture
34Ze-Su Cai, Li-Ning Sun, Hai-Bo Gao, Pu-Cheng Zhou, Songhao Piao, Qing-Cheng Huang Multi-robot Cooperative Pursuit Based on Task Bundle Auctions. Search on Bibsonomy ICIRA (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pursuit-Evasion game, Auction Mechanism, Case-based Reasoning, Multi-robot system
34Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions
34Darren Mutz, Giovanni Vigna, Richard A. Kemmerer An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks
34David A. Wagner 0001, Paolo Soto Mimicry attacks on host-based intrusion detection systems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detection, host-based intrusion detection, evasion attacks
29Jiagang Zhu, Wei Zou, Zheng Zhu Learning Evasion Strategy in Pursuit-Evasion by Deep Q-network. Search on Bibsonomy ICPR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Gafurjan I. Ibragimov, Shravan Luckraz On a Characterization of Evasion Strategies for Pursuit-Evasion Games on Graphs. Search on Bibsonomy J. Optim. Theory Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Li Xu, Zhenxin Zhan, Shouhuai Xu, Keyin Ye An Evasion and Counter-Evasion Study in Malicious Websites Detection. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
29Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye An evasion and counter-evasion study in malicious websites detection. Search on Bibsonomy CNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Ronan Pardo Soares Pursuit-evasion, decompositions and convexity on graphs. (Jeux de poursuite-évasion, décompositions et convexité dans les graphes). Search on Bibsonomy 2013   RDF
28Shaunak Dattaprasad Bopardikar, Francesco Bullo, João Pedro Hespanha On Discrete-Time Pursuit-Evasion Games With Sensing Limitations. Search on Bibsonomy IEEE Trans. Robotics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Jianhua Yang, Byong Lee Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Li Fan, Prithviraj Dasgupta A Stigmergy-Based Model for Solving Cooperative Pursuit-Evasion Games in Unknown Environments. Search on Bibsonomy SASO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Benjamín Tovar, Steven M. LaValle Visibility-Based Pursuit-Evasion with Bounded Speed. Search on Bibsonomy WAFR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Yingchun Chen, Huan Qi, Shan-Shan Wang Multi-agent Pursuit-Evasion Algorithm Based on Contract Net Interaction Protocol. Search on Bibsonomy ICNC (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Shen Hin Lim, Tomonari Furukawa, Gamini Dissanayake, Hugh F. Durrant-Whyte A Time-optimal Control Strategy for Pursuit-evasion Games Problems. Search on Bibsonomy ICRA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Volkan Isler, Sampath Kannan, Sanjeev Khanna Randomized pursuit-evasion with limited visibility. Search on Bibsonomy SODA The full citation details ... 2004 DBLP  BibTeX  RDF
28Geoff Nitschke Emergence of Specialized Behavior in a Pursuit-Evasion Game. Search on Bibsonomy CEEMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Sang-Min Park, Jae-Ha Lee, Kyung-Yong Chwa Visibility-Based Pursuit-Evasion in a Polygonal Region by a Searcher. Search on Bibsonomy ICALP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 Behavior based software theft detection. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software plagiarism, software theft, dynamic analysis, software birthmark
27Ying-Wei Kuo, Shou-Hsuan Stephen Huang Detecting Stepping-Stone Connection Using Association Rule Mining. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Battista Biggio, Giorgio Fumera, Fabio Roli Multiple Classifier Systems for Adversarial Classification Tasks. Search on Bibsonomy MCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Lanjia Wang, Hai-Xin Duan, Xing Li 0001 Dynamic emulation based modeling and detection of polymorphic shellcode at the network level. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF polymorphic shellcode, CPU emulation, intrusion detection
27Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang Anti-jamming timing channels for wireless networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF jamming, timing channel, radio interference
27Abhishek Karnik, Suchandra Goswami, Ratan K. Guha Detecting Obfuscated Viruses Using Cosine Similarity Analysis. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Luis Antunes 0001, João Balsa, Helder Coelho Tax Compliance Through MABS: The Case of Indirect Taxes. Search on Bibsonomy EPIA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Luis Antunes 0001, João Balsa, Helder Coelho Agents that collude to evade taxes. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel Anomalous system call detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection, Bayesian network, anomaly detection, computer security
27Wenyuan Xu 0001, Ke Ma 0004, Wade Trappe, Yanyong Zhang Jamming sensor networks: attack and defense strategies. Search on Bibsonomy IEEE Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Randy Smith, Cristian Estan, Somesh Jha Backtracking Algorithmic Complexity Attacks against a NIDS. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Mark Mansfield, J. J. Collins, Malachy Eaton, Thomas Collins N-Learning: A Reinforcement Learning Paradigm for Multiagent Systems. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Nishan C. Karunatillake, Nicholas R. Jennings Is It Worth Arguing? Search on Bibsonomy ArgMAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Conflict Resolution, Argumentation-based Negotiation
27Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang Channel surfing and spatial retreats: defenses against wireless denial of service. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF denial of service, Jamming, CSMA
21Marco Ramilli, Marco Prandini Always the Same, Never the Same. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Code mutation, Signature detection evasion, Computer security, Computer viruses
21Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF time-jittering, chaff-perturbation, intrusion detection, Network security, manipulation, stepping-stone, evasion
21Boting Yang, Yi Cao Standard directed search strategies and their applications. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Oriented grids, Pursuit-evasion problem, Digraph, Directed search
21René van den Berg, Juan Manuel Rejen, Rafael Bidarra Collision Avoidance between Avatars of Real and Virtual Individuals. Search on Bibsonomy MIG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trajectory modification, collision evasion, real-world integration
21Simon P. Chung, Aloysius K. Mok Swarm Attacks against Network-Level Emulation/Analysis. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Decoder detection, network-level emulation, swarm attacks, network IDS, evasion
21Fedor V. Fomin, Petr A. Golovach, Jan Kratochvíl On tractability of Cops and Robbers game. Search on Bibsonomy IFIP TCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pursuit-evasion games on graphs, cliquewidth, algorithms, complexity, parameterized complexity
21Boting Yang Strong-mixed searching and pathwidth. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Node search, Edge search, Mixed search, Cops-and-robber game, Pursuit-evasion problem
21Boting Yang, Yi Cao Monotonicity of strong searching on digraphs. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cops-and-robber game, Pursuit-and-evasion problem, NP-complete, Monotonicity, Graph searching, Digraph
21Yuehai Wang, Mengmeng Zhang Multiple Moving Prey Pursuit Algorithm Based on the Changeable Alliance. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Changeable Alliance, Multiple Moving Preys Cooperative Pursuit, Pursuit and Evasion Games
21Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song Distributed Evasive Scan Techniques and Countermeasures. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF scan detection, distributed scanning, information-hiding, evasion
21Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin Analyzing Network-Aware Active Wardens in IPv6. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF active wardens, traffic normalizers, active mappers, traffic analysis, covert channels, stateful, stateless, network-aware, evasion attacks
21Rafael Murrieta-Cid, Benjamín Tovar, Seth Hutchinson 0001 A Sampling-Based Motion Planning Approach to Maintain Visibility of Unpredictable Targets. Search on Bibsonomy Auton. Robots The full citation details ... 2005 DBLP  DOI  BibTeX  RDF pursuit-evasion, visibility, motion planning
21Amir Michail, Tao Xie 0001 Helping users avoid bugs in GUI applications. Search on Bibsonomy ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bug tracking system, fault evasion, gui applications, software testing, software tools, bug prediction
21Andrea S. LaPaugh Recontamination Does Not Help to Search a Graph. Search on Bibsonomy J. ACM The full citation details ... 1993 DBLP  DOI  BibTeX  RDF pursuit and evasion, NP-completeness, graph searching
14Panpan Zhou, Ben M. Chen Distributed Optimal Solutions for Multiagent Pursuit-Evasion Games for Capture and Formation Control. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Iñigo Mendialdua, Raul Orduna Urrutia Topological safeguard for evasion attack interpreting the neural networks' behavior. Search on Bibsonomy Pattern Recognit. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Zhixuan Zhang, Kun Zhang 0005, Xiangpeng Xie, Jiayue Sun Fixed-Time Zero-Sum Pursuit-Evasion Game Control of Multisatellite via Adaptive Dynamic Programming. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Manu J. Pillai, S. Remya, V. Devika, Somula Ramasubbareddy, Yongyun Cho Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jae Woo Seo, Jong Sung Lee, Hyunwoo Kim, Joonghwan Lee, Seongwon Han, Jungil Cho, Choong-Hoon Lee On-Device Smishing Classifier Resistant to Text Evasion Attack. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xiangru Chen, Dipal Halder, Kazi Mejbaul Islam, Sandip Ray Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ubaldo Ruiz 0001 Surveillance evasion between two identical differential drive robots. Search on Bibsonomy Eur. J. Control The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Tian Hua Wang, Haiping Shao, Bingqiang Zhao, Hong Lin Zhai Molecular Insights into the Variability in Infection and Immune Evasion Capabilities of SARS-CoV-2 Variants: A Sequence and Structural Investigation of the RBD Domain. Search on Bibsonomy J. Chem. Inf. Model. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Filipe E. P. Rodrigues, Tamis Darbre, Miguel Machuqueiro High Charge Density in Peptide Dendrimers is Required to Destabilize Membranes: Insights into Endosome Evasion. Search on Bibsonomy J. Chem. Inf. Model. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Mayank Baranwal, Param Budhraja, Vishal Raj, Ashish R. Hota Generalized Gradient Flows With Provable Fixed-Time Convergence and Fast Evasion of Non-Degenerate Saddle Points. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Dipankar Maity, Alexander Von Moll, Daigo Shishika, Michael R. Dorothy Optimal Evasion from a Sensing-Limited Pursuer. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Lorenzo Cascioli, Laurens Devos, Ondrej Kuzelka, Jesse Davis Faster Repeated Evasion Attacks in Tree Ensembles. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Saurabh Kumar, Shashi Ranjan Kumar, Abhinav Sinha Cooperative Nonlinear Guidance Strategies for Guaranteed Pursuit-Evasion. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Edvards Scukins, Markus Klein, Lars Kroon, Petter Ögren Deep Learning Based Situation Awareness for Multiple Missiles Evasion. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Dejan Milutinovic, Alexander Von Moll, Satyanarayana G. Manyam, David W. Casbeer, Isaac E. Weintraub, Meir Pachter Pursuit-Evasion on a Sphere and When It Can Be Considered Flat. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Iñigo Mendialdua, Raul Orduna Urrutia Topological safeguard for evasion attack interpreting the neural networks' behavior. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Nuo Chen, Linjing Li, Wenji Mao Equilibrium Strategy of the Pursuit-Evasion Game in Three-Dimensional Space. Search on Bibsonomy IEEE CAA J. Autom. Sinica The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Jiaxuan Geng, Junfeng Wang 0003, Zhiyang Fang, Yingjie Zhou, Di Wu, Wenhan Ge A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Andrew Gard Equal-speed pursuit and evasion on manifolds. Search on Bibsonomy Int. J. Game Theory The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Nikolaos-Marios T. Kokolakis, Kyriakos G. Vamvoudakis Safety-Aware Pursuit-Evasion Games in Unknown Environments Using Gaussian Processes and Finite-Time Convergent Reinforcement Learning. Search on Bibsonomy IEEE Trans. Neural Networks Learn. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin 0001 Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Deqiang Li, Shicheng Cui, Yun Li 0009, Jia Xu 0003, Fu Xiao 0001, Shouhuai Xu PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Wei Li, Wenhao Yan, Huaguang Shi, Si Li, Yi Zhou 0004 Multi-Robot Cooperative Pursuit-Evasion Control: A DeepReinforcement Learning Approach based on Prioritized Experience Replay. Search on Bibsonomy CCEAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Shuzhi Cao, Jianfei Ruan, Bo Dong 0001, Bin Shi, Qinghua Zheng RR-PU: A Synergistic Two-Stage Positive and Unlabeled Learning Framework for Robust Tax Evasion Detection. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ahmed T. El-Toukhy, Mohamed Mahmoud 0001, Atef H. Bondok, Mostafa M. Fouda, Maazen Alsabaan Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Islam Elgarhy, Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed Mahmoud 0001, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Binghui Wang, Minhua Lin, Tianxiang Zhou, Pan Zhou, Ang Li 0005, Meng Pang, Hai Helen Li, Yiran Chen 0001 Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function. Search on Bibsonomy WSDM The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Pengdeng Li, Shuxin Li, Xinrun Wang, Jakub Cerný, Youzhi Zhang 0001, Stephen McAleer, Hau Chan, Bo An 0001 Grasper: A Generalist Pursuer for Pursuit-Evasion Problems. Search on Bibsonomy AAMAS The full citation details ... 2024 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 1157 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license