|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 153 occurrences of 116 keywords
|
|
|
Results
Found 1157 publication records. Showing 1157 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Yang Qifeng, Feng Bin, Song Ping |
Research on Anti-Tax Evasion System based on Union-Bank Online Payment mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (1) ![In: Integration and Innovation Orient to E-Society, Volume 1, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 408-416, 2007, Springer, 978-0-387-75465-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
89 | Attila Szabó, László Gulyás, István János Tóth |
Sensitivity Analysis of a Tax Evasion Model Applying Automated Design of Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPIA ![In: Progress in Artificial Intelligence, 14th Portuguese Conference on Artificial Intelligence, EPIA 2009, Aveiro, Portugal, October 12-15, 2009. Proceedings, pp. 572-583, 2009, Springer, 978-3-642-04685-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
tax modeling, tax evasion, agent-based simulation, Agent-based computational economics |
76 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 383-397, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
68 | Jonathan Annas, Jing Xiao 0001 |
Intelligent pursuit & evasion in an unknown environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 4899-4906, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
68 | Richard R. Brooks, Jing-En Pang, Christopher Griffin 0001 |
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 38(6), pp. 1281-1294, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Issam Aib, Tung Tran 0002, Raouf Boutaba |
Characterization and Solution to a Stateful IDS Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 22-26 June 2009, Montreal, Québec, Canada, pp. 597-604, 2009, IEEE Computer Society, 978-0-7695-3659-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
54 | David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford |
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 17-35, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Ze-Su Cai, Li-ning Sun, Hai-Bo Gao |
A novel hierarchical decomposition for multi-player pursuit evasion differential game with superior evaders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEC Summit ![In: Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC Summit 2009, Shanghai, China, June 12-14, 2009, pp. 795-798, 2009, ACM, 978-1-60558-326-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-player, pursuit evasion, coalition formation, hierarchical decomposition, differential game |
49 | Joc Cing Tay, Cheun Hou Tng, Chee Siong Chan |
Environmental effects on the coevolution of pursuit and evasion strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Genet. Program. Evolvable Mach. ![In: Genet. Program. Evolvable Mach. 9(1), pp. 5-37, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pursuit and evasion, Chemical Genetic Programming, Competitive coevolution, Game of tag |
49 | Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers |
Alert Verification Evasion Through Server Response Forging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 256-275, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Alert Verification, Network Intrusion Detection, Exploits, Evasion |
49 | Damien Pellier, Humbert Fiorino |
Coordinated exploration of unknown labyrinthine environments applied to the pursuit evasion problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 895-902, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
pursuit-evasion problem, coordination, multiagent systems, distributed robotics |
48 | Mythili Vutukuru, Hari Balakrishnan, Vern Paxson |
Efficient and Robust TCP Stream Normalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 96-110, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Normalization, Evasion Attacks |
41 | Gianni Antichi, Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci |
Counting bloom filters for pattern matching and anti-evasion at the wire speed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 23(1), pp. 30-35, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Adrian Dumitrescu, Howi Kok, Ichiro Suzuki, Pawel Zylinski |
Vision-Based Pursuit-Evasion in a Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWAT ![In: Algorithm Theory - SWAT 2008, 11th Scandinavian Workshop on Algorithm Theory, Gothenburg, Sweden, July 2-4, 2008, Proceedings, pp. 53-64, 2008, Springer, 978-3-540-69900-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Warren Cheung, William S. Evans |
Pursuit-Evasion Voronoi Diagrams in ell_1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVD ![In: Proceedings of the 4th International Symposium on Voronoi Diagrams in Science and Engineering, ISVD 2007, Pontypridd, Wales, UK, July 9-12, 2007, pp. 58-65, 2007, IEEE Computer Society, 0-7695-2869-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins |
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(6), pp. 36-43, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 477-486, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic |
The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT/SAPIR/ELETE ![In: Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 17-22 July 2005, Lisbon, Portugal, pp. 78-82, 2005, IEEE Computer Society, 0-7695-2388-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Jacky Baltes, Yongjoo Park |
Comparison of Several Machine Learning Techniques in Pursuit-Evasion Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoboCup ![In: RoboCup 2001: Robot Soccer World Cup V, pp. 269-274, 2001, Springer, 3-540-43912-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
Model-Based Covert Timing Channels: Automated Modeling and Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 211-230, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
traffic modeling, evasion, covert timing channels |
35 | George Varghese, J. Andrew Fingerhut, Flavio Bonomi |
Detecting evasion attacks at high speeds without reassembly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006, pp. 327-338, 2006, ACM, 1-59593-308-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
TCP reassembly, normalization, intrusion prevention systems, evasion attacks |
34 | Masumi Ishikawa, Kosuke Ueno |
Hierarchical Architecture with Modular Network SOM and Modular Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (1) ![In: Artificial Neural Networks - ICANN 2009, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, Proceedings, Part I, pp. 546-556, 2009, Springer, 978-3-642-04273-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Modular network SOM, modular reinforcement learning, pursuit-evasion game, hierarchical architecture |
34 | Ze-Su Cai, Li-Ning Sun, Hai-Bo Gao, Pu-Cheng Zhou, Songhao Piao, Qing-Cheng Huang |
Multi-robot Cooperative Pursuit Based on Task Bundle Auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIRA (1) ![In: Intelligent Robotics and Applications, First International Conference, ICIRA 2008, Wuhan, China, October 15-17, 2008 Proceedings, Part I, pp. 235-244, 2008, Springer, 978-3-540-88512-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pursuit-Evasion game, Auction Mechanism, Case-based Reasoning, Multi-robot system |
34 | Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman |
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 258-277, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions |
34 | Darren Mutz, Giovanni Vigna, Richard A. Kemmerer |
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 374-383, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks |
34 | David A. Wagner 0001, Paolo Soto |
Mimicry attacks on host-based intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 255-264, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anomaly detection, host-based intrusion detection, evasion attacks |
29 | Jiagang Zhu, Wei Zou, Zheng Zhu |
Learning Evasion Strategy in Pursuit-Evasion by Deep Q-network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 24th International Conference on Pattern Recognition, ICPR 2018, Beijing, China, August 20-24, 2018, pp. 67-72, 2018, IEEE Computer Society, 978-1-5386-3788-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Gafurjan I. Ibragimov, Shravan Luckraz |
On a Characterization of Evasion Strategies for Pursuit-Evasion Games on Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Optim. Theory Appl. ![In: J. Optim. Theory Appl. 175(2), pp. 590-596, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Li Xu, Zhenxin Zhan, Shouhuai Xu, Keyin Ye |
An Evasion and Counter-Evasion Study in Malicious Websites Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1408.1993, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
29 | Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye |
An evasion and counter-evasion study in malicious websites detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2014, San Francisco, CA, USA, October 29-31, 2014, pp. 265-273, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Ronan Pardo Soares |
Pursuit-evasion, decompositions and convexity on graphs. (Jeux de poursuite-évasion, décompositions et convexité dans les graphes). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
28 | Shaunak Dattaprasad Bopardikar, Francesco Bullo, João Pedro Hespanha |
On Discrete-Time Pursuit-Evasion Games With Sensing Limitations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Robotics ![In: IEEE Trans. Robotics 24(6), pp. 1429-1439, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Jianhua Yang, Byong Lee |
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 2-12, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson |
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 267-278, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Li Fan, Prithviraj Dasgupta |
A Stigmergy-Based Model for Solving Cooperative Pursuit-Evasion Games in Unknown Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASO ![In: Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2008, 20-24 October 2008, Venice, Italy, pp. 467-468, 2008, IEEE Computer Society, 978-0-7695-3404-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Benjamín Tovar, Steven M. LaValle |
Visibility-Based Pursuit-Evasion with Bounded Speed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAFR ![In: Algorithmic Foundation of Robotics VII, Selected Contributions of the Seventh International Workshop on the Algorithmic Foundations of Robotics, WAFR 2006, July 16-18, 2006, New York, NY, USA, pp. 475-489, 2006, Springer, 978-3-540-68404-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Yingchun Chen, Huan Qi, Shan-Shan Wang |
Multi-agent Pursuit-Evasion Algorithm Based on Contract Net Interaction Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (3) ![In: Advances in Natural Computation, First International Conference, ICNC 2005, Changsha, China, August 27-29, 2005, Proceedings, Part III, pp. 482-489, 2005, Springer, 3-540-28320-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Shen Hin Lim, Tomonari Furukawa, Gamini Dissanayake, Hugh F. Durrant-Whyte |
A Time-optimal Control Strategy for Pursuit-evasion Games Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: Proceedings of the 2004 IEEE International Conference on Robotics and Automation, ICRA 2004, April 26 - May 1, 2004, New Orleans, LA, USA, pp. 3962-3967, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Volkan Isler, Sampath Kannan, Sanjeev Khanna |
Randomized pursuit-evasion with limited visibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2004, New Orleans, Louisiana, USA, January 11-14, 2004, pp. 1060-1069, 2004, SIAM, 0-89871-558-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
28 | Geoff Nitschke |
Emergence of Specialized Behavior in a Pursuit-Evasion Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEEMAS ![In: Multi-Agent Systems and Applications III, 3rd International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003, Prague, Czech Republic, June 16-18, 2003, Proceedings, pp. 324-334, 2003, Springer, 3-540-40450-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Sang-Min Park, Jae-Ha Lee, Kyung-Yong Chwa |
Visibility-Based Pursuit-Evasion in a Polygonal Region by a Searcher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 28th International Colloquium, ICALP 2001, Crete, Greece, July 8-12, 2001, Proceedings, pp. 456-468, 2001, Springer, 3-540-42287-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
Behavior based software theft detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 280-290, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software plagiarism, software theft, dynamic analysis, software birthmark |
27 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone Connection Using Association Rule Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 90-97, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Battista Biggio, Giorgio Fumera, Fabio Roli |
Multiple Classifier Systems for Adversarial Classification Tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCS ![In: Multiple Classifier Systems, 8th International Workshop, MCS 2009, Reykjavik, Iceland, June 10-12, 2009. Proceedings, pp. 132-141, 2009, Springer, 978-3-642-02325-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Lanjia Wang, Hai-Xin Duan, Xing Li 0001 |
Dynamic emulation based modeling and detection of polymorphic shellcode at the network level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(11), pp. 1883-1897, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
polymorphic shellcode, CPU emulation, intrusion detection |
27 | Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang |
Anti-jamming timing channels for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 203-213, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
jamming, timing channel, radio interference |
27 | Abhishek Karnik, Suchandra Goswami, Ratan K. Guha |
Detecting Obfuscated Viruses Using Cosine Similarity Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: First Asia International Conference on Modelling and Simulation, AMS 2007, Phuket, Thailand, March 27-30, 2007, pp. 165-170, 2007, IEEE Computer Society, 978-0-7695-2845-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Luis Antunes 0001, João Balsa, Helder Coelho |
Tax Compliance Through MABS: The Case of Indirect Taxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPIA Workshops ![In: Progress in Artificial Intelligence, 13th Portuguese Conference on Aritficial Intelligence, EPIA 2007, Workshops: GAIW, AIASTS, ALEA, AMITA, BAOSW, BI, CMBSB, IROBOT, MASTA, STCS, and TEMA, Guimarães, Portugal, December 3-7, 2007, Proceedings, pp. 605-617, 2007, Springer, 978-3-540-77000-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Luis Antunes 0001, João Balsa, Helder Coelho |
Agents that collude to evade taxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 212, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel |
Anomalous system call detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(1), pp. 61-93, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian network, anomaly detection, computer security |
27 | Wenyuan Xu 0001, Ke Ma 0004, Wade Trappe, Yanyong Zhang |
Jamming sensor networks: attack and defense strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 20(3), pp. 41-47, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Randy Smith, Cristian Estan, Somesh Jha |
Backtracking Algorithmic Complexity Attacks against a NIDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 89-98, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Mark Mansfield, J. J. Collins, Malachy Eaton, Thomas Collins |
N-Learning: A Reinforcement Learning Paradigm for Multiagent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2005: Advances in Artificial Intelligence, 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005, Proceedings, pp. 684-694, 2005, Springer, 3-540-30462-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Nishan C. Karunatillake, Nicholas R. Jennings |
Is It Worth Arguing? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ArgMAS ![In: Argumentation in Multi-Agent Systems, First International Workshop, ArgMAS 2004, New York, NY, USA, July 19, 2004, Revised Selected and Invited Papers, pp. 234-250, 2004, Springer, 3-540-24526-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Conflict Resolution, Argumentation-based Negotiation |
27 | Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang |
Channel surfing and spatial retreats: defenses against wireless denial of service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 80-89, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
denial of service, Jamming, CSMA |
21 | Marco Ramilli, Marco Prandini |
Always the Same, Never the Same. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 8(2), pp. 73-75, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Code mutation, Signature detection evasion, Computer security, Computer viruses |
21 | Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang |
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 1101-1107, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
time-jittering, chaff-perturbation, intrusion detection, Network security, manipulation, stepping-stone, evasion |
21 | Boting Yang, Yi Cao |
Standard directed search strategies and their applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 17(4), pp. 378-399, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Oriented grids, Pursuit-evasion problem, Digraph, Directed search |
21 | René van den Berg, Juan Manuel Rejen, Rafael Bidarra |
Collision Avoidance between Avatars of Real and Virtual Individuals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIG ![In: Motion in Games, Second International Workshop, MIG 2009, Zeist, The Netherlands, November 21-24, 2009. Proceedings, pp. 1-12, 2009, Springer, 978-3-642-10346-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Trajectory modification, collision evasion, real-world integration |
21 | Simon P. Chung, Aloysius K. Mok |
Swarm Attacks against Network-Level Emulation/Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 175-190, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Decoder detection, network-level emulation, swarm attacks, network IDS, evasion |
21 | Fedor V. Fomin, Petr A. Golovach, Jan Kratochvíl |
On tractability of Cops and Robbers game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP TCS ![In: Fifth IFIP International Conference On Theoretical Computer Science - TCS 2008, IFIP 20th World Computer Congress, TC 1, Foundations of Computer Science, September 7-10, 2008, Milano, Italy, pp. 171-185, 2008, Springer, 978-0-387-09679-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pursuit-evasion games on graphs, cliquewidth, algorithms, complexity, parameterized complexity |
21 | Boting Yang |
Strong-mixed searching and pathwidth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 13(1), pp. 47-59, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Node search, Edge search, Mixed search, Cops-and-robber game, Pursuit-evasion problem |
21 | Boting Yang, Yi Cao |
Monotonicity of strong searching on digraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 14(4), pp. 411-425, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cops-and-robber game, Pursuit-and-evasion problem, NP-complete, Monotonicity, Graph searching, Digraph |
21 | Yuehai Wang, Mengmeng Zhang |
Multiple Moving Prey Pursuit Algorithm Based on the Changeable Alliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 658-662, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Changeable Alliance, Multiple Moving Preys Cooperative Pursuit, Pursuit and Evasion Games |
21 | Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song |
Distributed Evasive Scan Techniques and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 157-174, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
scan detection, distributed scanning, information-hiding, evasion |
21 | Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin |
Analyzing Network-Aware Active Wardens in IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 58-77, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
active wardens, traffic normalizers, active mappers, traffic analysis, covert channels, stateful, stateless, network-aware, evasion attacks |
21 | Rafael Murrieta-Cid, Benjamín Tovar, Seth Hutchinson 0001 |
A Sampling-Based Motion Planning Approach to Maintain Visibility of Unpredictable Targets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Robots ![In: Auton. Robots 19(3), pp. 285-300, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
pursuit-evasion, visibility, motion planning |
21 | Amir Michail, Tao Xie 0001 |
Helping users avoid bugs in GUI applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 107-116, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
bug tracking system, fault evasion, gui applications, software testing, software tools, bug prediction |
21 | Andrea S. LaPaugh |
Recontamination Does Not Help to Search a Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 40(2), pp. 224-245, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
pursuit and evasion, NP-completeness, graph searching |
14 | Panpan Zhou, Ben M. Chen |
Distributed Optimal Solutions for Multiagent Pursuit-Evasion Games for Capture and Formation Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Electron. ![In: IEEE Trans. Ind. Electron. 71(5), pp. 5224-5234, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Iñigo Mendialdua, Raul Orduna Urrutia |
Topological safeguard for evasion attack interpreting the neural networks' behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. ![In: Pattern Recognit. 147, pp. 110130, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zhixuan Zhang, Kun Zhang 0005, Xiangpeng Xie, Jiayue Sun |
Fixed-Time Zero-Sum Pursuit-Evasion Game Control of Multisatellite via Adaptive Dynamic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Aerosp. Electron. Syst. ![In: IEEE Trans. Aerosp. Electron. Syst. 60(2), pp. 2224-2235, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Manu J. Pillai, S. Remya, V. Devika, Somula Ramasubbareddy, Yongyun Cho |
Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 19375-19387, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jae Woo Seo, Jong Sung Lee, Hyunwoo Kim, Joonghwan Lee, Seongwon Han, Jungil Cho, Choong-Hoon Lee |
On-Device Smishing Classifier Resistant to Text Evasion Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 4762-4779, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xiangru Chen, Dipal Halder, Kazi Mejbaul Islam, Sandip Ray |
Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(6), pp. 9382-9391, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ubaldo Ruiz 0001 |
Surveillance evasion between two identical differential drive robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Control ![In: Eur. J. Control 75, pp. 100935, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Tian Hua Wang, Haiping Shao, Bingqiang Zhao, Hong Lin Zhai |
Molecular Insights into the Variability in Infection and Immune Evasion Capabilities of SARS-CoV-2 Variants: A Sequence and Structural Investigation of the RBD Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Chem. Inf. Model. ![In: J. Chem. Inf. Model. 64(8), pp. 3503-3523, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Filipe E. P. Rodrigues, Tamis Darbre, Miguel Machuqueiro |
High Charge Density in Peptide Dendrimers is Required to Destabilize Membranes: Insights into Endosome Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Chem. Inf. Model. ![In: J. Chem. Inf. Model. 64(8), pp. 3430-3442, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Mayank Baranwal, Param Budhraja, Vishal Raj, Ashish R. Hota |
Generalized Gradient Flows With Provable Fixed-Time Convergence and Fast Evasion of Non-Degenerate Saddle Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 69(4), pp. 2281-2293, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh |
Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.06428, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Dipankar Maity, Alexander Von Moll, Daigo Shishika, Michael R. Dorothy |
Optimal Evasion from a Sensing-Limited Pursuer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.12848, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Lorenzo Cascioli, Laurens Devos, Ondrej Kuzelka, Jesse Davis |
Faster Repeated Evasion Attacks in Tree Ensembles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.08586, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Saurabh Kumar, Shashi Ranjan Kumar, Abhinav Sinha |
Cooperative Nonlinear Guidance Strategies for Guaranteed Pursuit-Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.06176, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Edvards Scukins, Markus Klein, Lars Kroon, Petter Ögren |
Deep Learning Based Situation Awareness for Multiple Missiles Evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.10101, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Dejan Milutinovic, Alexander Von Moll, Satyanarayana G. Manyam, David W. Casbeer, Isaac E. Weintraub, Meir Pachter |
Pursuit-Evasion on a Sphere and When It Can Be Considered Flat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.15188, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Iñigo Mendialdua, Raul Orduna Urrutia |
Topological safeguard for evasion attack interpreting the neural networks' behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.07480, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq |
Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 150, pp. 294-302, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Nuo Chen, Linjing Li, Wenji Mao |
Equilibrium Strategy of the Pursuit-Evasion Game in Three-Dimensional Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CAA J. Autom. Sinica ![In: IEEE CAA J. Autom. Sinica 11(2), pp. 446-458, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jiaxuan Geng, Junfeng Wang 0003, Zhiyang Fang, Yingjie Zhou, Di Wu, Wenhan Ge |
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 137, pp. 103595, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Andrew Gard |
Equal-speed pursuit and evasion on manifolds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Game Theory ![In: Int. J. Game Theory 53(1), pp. 197-210, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Nikolaos-Marios T. Kokolakis, Kyriakos G. Vamvoudakis |
Safety-Aware Pursuit-Evasion Games in Unknown Environments Using Gaussian Processes and Finite-Time Convergent Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks Learn. Syst. ![In: IEEE Trans. Neural Networks Learn. Syst. 35(3), pp. 3130-3143, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin 0001 |
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 21(1), pp. 153-167, January - February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Deqiang Li, Shicheng Cui, Yun Li 0009, Jia Xu 0003, Fu Xiao 0001, Shouhuai Xu |
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 21(2), pp. 920-936, March - April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Wei Li, Wenhao Yan, Huaguang Shi, Si Li, Yi Zhou 0004 |
Multi-Robot Cooperative Pursuit-Evasion Control: A DeepReinforcement Learning Approach based on Prioritized Experience Replay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCEAI ![In: 2024 8th International Conference on Control Engineering and Artificial Intelligence, CCEAI 2024, Shanghai, China, January 26-28, 2024, pp. 120-127, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Shuzhi Cao, Jianfei Ruan, Bo Dong 0001, Bin Shi, Qinghua Zheng |
RR-PU: A Synergistic Two-Stage Positive and Unlabeled Learning Framework for Robust Tax Evasion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 8246-8254, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ahmed T. El-Toukhy, Mohamed Mahmoud 0001, Atef H. Bondok, Mostafa M. Fouda, Maazen Alsabaan |
Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024, pp. 708-713, 2024, IEEE, 979-8-3503-0457-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Islam Elgarhy, Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed Mahmoud 0001, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy |
Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024, pp. 333-338, 2024, IEEE, 979-8-3503-0457-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Binghui Wang, Minhua Lin, Tianxiang Zhou, Pan Zhou, Ang Li 0005, Meng Pang, Hai Helen Li, Yiran Chen 0001 |
Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSDM ![In: Proceedings of the 17th ACM International Conference on Web Search and Data Mining, WSDM 2024, Merida, Mexico, March 4-8, 2024, pp. 693-701, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Pengdeng Li, Shuxin Li, Xinrun Wang, Jakub Cerný, Youzhi Zhang 0001, Stephen McAleer, Hau Chan, Bo An 0001 |
Grasper: A Generalist Pursuer for Pursuit-Evasion Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2024, Auckland, New Zealand, May 6-10, 2024, pp. 1147-1155, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 1157 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|