|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 153 occurrences of 116 keywords
|
|
|
Results
Found 1157 publication records. Showing 1157 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Yang Qifeng, Feng Bin, Song Ping |
Research on Anti-Tax Evasion System based on Union-Bank Online Payment mode. |
I3E (1) |
2007 |
DBLP DOI BibTeX RDF |
|
89 | Attila Szabó, László Gulyás, István János Tóth |
Sensitivity Analysis of a Tax Evasion Model Applying Automated Design of Experiments. |
EPIA |
2009 |
DBLP DOI BibTeX RDF |
tax modeling, tax evasion, agent-based simulation, Agent-based computational economics |
76 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
68 | Jonathan Annas, Jing Xiao 0001 |
Intelligent pursuit & evasion in an unknown environment. |
IROS |
2009 |
DBLP DOI BibTeX RDF |
|
68 | Richard R. Brooks, Jing-En Pang, Christopher Griffin 0001 |
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games. |
IEEE Trans. Syst. Man Cybern. Part A |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Issam Aib, Tung Tran 0002, Raouf Boutaba |
Characterization and Solution to a Stateful IDS Evasion. |
ICDCS |
2009 |
DBLP DOI BibTeX RDF |
|
54 | David L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford |
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Ze-Su Cai, Li-ning Sun, Hai-Bo Gao |
A novel hierarchical decomposition for multi-player pursuit evasion differential game with superior evaders. |
GEC Summit |
2009 |
DBLP DOI BibTeX RDF |
multi-player, pursuit evasion, coalition formation, hierarchical decomposition, differential game |
49 | Joc Cing Tay, Cheun Hou Tng, Chee Siong Chan |
Environmental effects on the coevolution of pursuit and evasion strategies. |
Genet. Program. Evolvable Mach. |
2008 |
DBLP DOI BibTeX RDF |
Pursuit and evasion, Chemical Genetic Programming, Competitive coevolution, Game of tag |
49 | Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers |
Alert Verification Evasion Through Server Response Forging. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Alert Verification, Network Intrusion Detection, Exploits, Evasion |
49 | Damien Pellier, Humbert Fiorino |
Coordinated exploration of unknown labyrinthine environments applied to the pursuit evasion problem. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
pursuit-evasion problem, coordination, multiagent systems, distributed robotics |
48 | Mythili Vutukuru, Hari Balakrishnan, Vern Paxson |
Efficient and Robust TCP Stream Normalization. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Intrusion Detection Systems, Normalization, Evasion Attacks |
41 | Gianni Antichi, Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci |
Counting bloom filters for pattern matching and anti-evasion at the wire speed. |
IEEE Netw. |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Adrian Dumitrescu, Howi Kok, Ichiro Suzuki, Pawel Zylinski |
Vision-Based Pursuit-Evasion in a Grid. |
SWAT |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Warren Cheung, William S. Evans |
Pursuit-Evasion Voronoi Diagrams in ell_1. |
ISVD |
2007 |
DBLP DOI BibTeX RDF |
|
41 | David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins |
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic |
The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks. |
AICT/SAPIR/ELETE |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Jacky Baltes, Yongjoo Park |
Comparison of Several Machine Learning Techniques in Pursuit-Evasion Games. |
RoboCup |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
Model-Based Covert Timing Channels: Automated Modeling and Evasion. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
traffic modeling, evasion, covert timing channels |
35 | George Varghese, J. Andrew Fingerhut, Flavio Bonomi |
Detecting evasion attacks at high speeds without reassembly. |
SIGCOMM |
2006 |
DBLP DOI BibTeX RDF |
TCP reassembly, normalization, intrusion prevention systems, evasion attacks |
34 | Masumi Ishikawa, Kosuke Ueno |
Hierarchical Architecture with Modular Network SOM and Modular Reinforcement Learning. |
ICANN (1) |
2009 |
DBLP DOI BibTeX RDF |
Modular network SOM, modular reinforcement learning, pursuit-evasion game, hierarchical architecture |
34 | Ze-Su Cai, Li-Ning Sun, Hai-Bo Gao, Pu-Cheng Zhou, Songhao Piao, Qing-Cheng Huang |
Multi-robot Cooperative Pursuit Based on Task Bundle Auctions. |
ICIRA (1) |
2008 |
DBLP DOI BibTeX RDF |
Pursuit-Evasion game, Auction Mechanism, Case-based Reasoning, Multi-robot system |
34 | Avrim Blum, Dawn Xiaodong Song, Shobha Venkataraman |
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Random walks, Network intrusion detection, Stepping stones, Evasion, Interactive sessions |
34 | Darren Mutz, Giovanni Vigna, Richard A. Kemmerer |
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks |
34 | David A. Wagner 0001, Paolo Soto |
Mimicry attacks on host-based intrusion detection systems. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
anomaly detection, host-based intrusion detection, evasion attacks |
29 | Jiagang Zhu, Wei Zou, Zheng Zhu |
Learning Evasion Strategy in Pursuit-Evasion by Deep Q-network. |
ICPR |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Gafurjan I. Ibragimov, Shravan Luckraz |
On a Characterization of Evasion Strategies for Pursuit-Evasion Games on Graphs. |
J. Optim. Theory Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Li Xu, Zhenxin Zhan, Shouhuai Xu, Keyin Ye |
An Evasion and Counter-Evasion Study in Malicious Websites Detection. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
29 | Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye |
An evasion and counter-evasion study in malicious websites detection. |
CNS |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Ronan Pardo Soares |
Pursuit-evasion, decompositions and convexity on graphs. (Jeux de poursuite-évasion, décompositions et convexité dans les graphes). |
|
2013 |
RDF |
|
28 | Shaunak Dattaprasad Bopardikar, Francesco Bullo, João Pedro Hespanha |
On Discrete-Time Pursuit-Evasion Games With Sensing Limitations. |
IEEE Trans. Robotics |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Jianhua Yang, Byong Lee |
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson |
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Li Fan, Prithviraj Dasgupta |
A Stigmergy-Based Model for Solving Cooperative Pursuit-Evasion Games in Unknown Environments. |
SASO |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Benjamín Tovar, Steven M. LaValle |
Visibility-Based Pursuit-Evasion with Bounded Speed. |
WAFR |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Yingchun Chen, Huan Qi, Shan-Shan Wang |
Multi-agent Pursuit-Evasion Algorithm Based on Contract Net Interaction Protocol. |
ICNC (3) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Shen Hin Lim, Tomonari Furukawa, Gamini Dissanayake, Hugh F. Durrant-Whyte |
A Time-optimal Control Strategy for Pursuit-evasion Games Problems. |
ICRA |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Volkan Isler, Sampath Kannan, Sanjeev Khanna |
Randomized pursuit-evasion with limited visibility. |
SODA |
2004 |
DBLP BibTeX RDF |
|
28 | Geoff Nitschke |
Emergence of Specialized Behavior in a Pursuit-Evasion Game. |
CEEMAS |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Sang-Min Park, Jae-Ha Lee, Kyung-Yong Chwa |
Visibility-Based Pursuit-Evasion in a Polygonal Region by a Searcher. |
ICALP |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
Behavior based software theft detection. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
software plagiarism, software theft, dynamic analysis, software birthmark |
27 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone Connection Using Association Rule Mining. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Battista Biggio, Giorgio Fumera, Fabio Roli |
Multiple Classifier Systems for Adversarial Classification Tasks. |
MCS |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Lanjia Wang, Hai-Xin Duan, Xing Li 0001 |
Dynamic emulation based modeling and detection of polymorphic shellcode at the network level. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
polymorphic shellcode, CPU emulation, intrusion detection |
27 | Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang |
Anti-jamming timing channels for wireless networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
jamming, timing channel, radio interference |
27 | Abhishek Karnik, Suchandra Goswami, Ratan K. Guha |
Detecting Obfuscated Viruses Using Cosine Similarity Analysis. |
Asia International Conference on Modelling and Simulation |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Luis Antunes 0001, João Balsa, Helder Coelho |
Tax Compliance Through MABS: The Case of Indirect Taxes. |
EPIA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Luis Antunes 0001, João Balsa, Helder Coelho |
Agents that collude to evade taxes. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel |
Anomalous system call detection. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Bayesian network, anomaly detection, computer security |
27 | Wenyuan Xu 0001, Ke Ma 0004, Wade Trappe, Yanyong Zhang |
Jamming sensor networks: attack and defense strategies. |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Randy Smith, Cristian Estan, Somesh Jha |
Backtracking Algorithmic Complexity Attacks against a NIDS. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Mark Mansfield, J. J. Collins, Malachy Eaton, Thomas Collins |
N-Learning: A Reinforcement Learning Paradigm for Multiagent Systems. |
Australian Conference on Artificial Intelligence |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Nishan C. Karunatillake, Nicholas R. Jennings |
Is It Worth Arguing? |
ArgMAS |
2004 |
DBLP DOI BibTeX RDF |
Conflict Resolution, Argumentation-based Negotiation |
27 | Wenyuan Xu 0001, Timothy Wood 0001, Wade Trappe, Yanyong Zhang |
Channel surfing and spatial retreats: defenses against wireless denial of service. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
denial of service, Jamming, CSMA |
21 | Marco Ramilli, Marco Prandini |
Always the Same, Never the Same. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
Code mutation, Signature detection evasion, Computer security, Computer viruses |
21 | Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang |
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
time-jittering, chaff-perturbation, intrusion detection, Network security, manipulation, stepping-stone, evasion |
21 | Boting Yang, Yi Cao |
Standard directed search strategies and their applications. |
J. Comb. Optim. |
2009 |
DBLP DOI BibTeX RDF |
Oriented grids, Pursuit-evasion problem, Digraph, Directed search |
21 | René van den Berg, Juan Manuel Rejen, Rafael Bidarra |
Collision Avoidance between Avatars of Real and Virtual Individuals. |
MIG |
2009 |
DBLP DOI BibTeX RDF |
Trajectory modification, collision evasion, real-world integration |
21 | Simon P. Chung, Aloysius K. Mok |
Swarm Attacks against Network-Level Emulation/Analysis. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Decoder detection, network-level emulation, swarm attacks, network IDS, evasion |
21 | Fedor V. Fomin, Petr A. Golovach, Jan Kratochvíl |
On tractability of Cops and Robbers game. |
IFIP TCS |
2008 |
DBLP DOI BibTeX RDF |
Pursuit-evasion games on graphs, cliquewidth, algorithms, complexity, parameterized complexity |
21 | Boting Yang |
Strong-mixed searching and pathwidth. |
J. Comb. Optim. |
2007 |
DBLP DOI BibTeX RDF |
Node search, Edge search, Mixed search, Cops-and-robber game, Pursuit-evasion problem |
21 | Boting Yang, Yi Cao |
Monotonicity of strong searching on digraphs. |
J. Comb. Optim. |
2007 |
DBLP DOI BibTeX RDF |
Cops-and-robber game, Pursuit-and-evasion problem, NP-complete, Monotonicity, Graph searching, Digraph |
21 | Yuehai Wang, Mengmeng Zhang |
Multiple Moving Prey Pursuit Algorithm Based on the Changeable Alliance. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
Changeable Alliance, Multiple Moving Preys Cooperative Pursuit, Pursuit and Evasion Games |
21 | Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song |
Distributed Evasive Scan Techniques and Countermeasures. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
scan detection, distributed scanning, information-hiding, evasion |
21 | Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin |
Analyzing Network-Aware Active Wardens in IPv6. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
active wardens, traffic normalizers, active mappers, traffic analysis, covert channels, stateful, stateless, network-aware, evasion attacks |
21 | Rafael Murrieta-Cid, Benjamín Tovar, Seth Hutchinson 0001 |
A Sampling-Based Motion Planning Approach to Maintain Visibility of Unpredictable Targets. |
Auton. Robots |
2005 |
DBLP DOI BibTeX RDF |
pursuit-evasion, visibility, motion planning |
21 | Amir Michail, Tao Xie 0001 |
Helping users avoid bugs in GUI applications. |
ICSE |
2005 |
DBLP DOI BibTeX RDF |
bug tracking system, fault evasion, gui applications, software testing, software tools, bug prediction |
21 | Andrea S. LaPaugh |
Recontamination Does Not Help to Search a Graph. |
J. ACM |
1993 |
DBLP DOI BibTeX RDF |
pursuit and evasion, NP-completeness, graph searching |
14 | Panpan Zhou, Ben M. Chen |
Distributed Optimal Solutions for Multiagent Pursuit-Evasion Games for Capture and Formation Control. |
IEEE Trans. Ind. Electron. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Iñigo Mendialdua, Raul Orduna Urrutia |
Topological safeguard for evasion attack interpreting the neural networks' behavior. |
Pattern Recognit. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Zhixuan Zhang, Kun Zhang 0005, Xiangpeng Xie, Jiayue Sun |
Fixed-Time Zero-Sum Pursuit-Evasion Game Control of Multisatellite via Adaptive Dynamic Programming. |
IEEE Trans. Aerosp. Electron. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Manu J. Pillai, S. Remya, V. Devika, Somula Ramasubbareddy, Yongyun Cho |
Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jae Woo Seo, Jong Sung Lee, Hyunwoo Kim, Joonghwan Lee, Seongwon Han, Jungil Cho, Choong-Hoon Lee |
On-Device Smishing Classifier Resistant to Text Evasion Attack. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xiangru Chen, Dipal Halder, Kazi Mejbaul Islam, Sandip Ray |
Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ubaldo Ruiz 0001 |
Surveillance evasion between two identical differential drive robots. |
Eur. J. Control |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Tian Hua Wang, Haiping Shao, Bingqiang Zhao, Hong Lin Zhai |
Molecular Insights into the Variability in Infection and Immune Evasion Capabilities of SARS-CoV-2 Variants: A Sequence and Structural Investigation of the RBD Domain. |
J. Chem. Inf. Model. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Filipe E. P. Rodrigues, Tamis Darbre, Miguel Machuqueiro |
High Charge Density in Peptide Dendrimers is Required to Destabilize Membranes: Insights into Endosome Evasion. |
J. Chem. Inf. Model. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Mayank Baranwal, Param Budhraja, Vishal Raj, Ashish R. Hota |
Generalized Gradient Flows With Provable Fixed-Time Convergence and Fast Evasion of Non-Degenerate Saddle Points. |
IEEE Trans. Autom. Control. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh |
Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Dipankar Maity, Alexander Von Moll, Daigo Shishika, Michael R. Dorothy |
Optimal Evasion from a Sensing-Limited Pursuer. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Lorenzo Cascioli, Laurens Devos, Ondrej Kuzelka, Jesse Davis |
Faster Repeated Evasion Attacks in Tree Ensembles. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Saurabh Kumar, Shashi Ranjan Kumar, Abhinav Sinha |
Cooperative Nonlinear Guidance Strategies for Guaranteed Pursuit-Evasion. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Edvards Scukins, Markus Klein, Lars Kroon, Petter Ögren |
Deep Learning Based Situation Awareness for Multiple Missiles Evasion. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Dejan Milutinovic, Alexander Von Moll, Satyanarayana G. Manyam, David W. Casbeer, Isaac E. Weintraub, Meir Pachter |
Pursuit-Evasion on a Sphere and When It Can Be Considered Flat. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Iñigo Mendialdua, Raul Orduna Urrutia |
Topological safeguard for evasion attack interpreting the neural networks' behavior. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq |
Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection. |
Future Gener. Comput. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Nuo Chen, Linjing Li, Wenji Mao |
Equilibrium Strategy of the Pursuit-Evasion Game in Three-Dimensional Space. |
IEEE CAA J. Autom. Sinica |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Jiaxuan Geng, Junfeng Wang 0003, Zhiyang Fang, Yingjie Zhou, Di Wu, Wenhan Ge |
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Andrew Gard |
Equal-speed pursuit and evasion on manifolds. |
Int. J. Game Theory |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Nikolaos-Marios T. Kokolakis, Kyriakos G. Vamvoudakis |
Safety-Aware Pursuit-Evasion Games in Unknown Environments Using Gaussian Processes and Finite-Time Convergent Reinforcement Learning. |
IEEE Trans. Neural Networks Learn. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin 0001 |
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. |
IEEE Trans. Dependable Secur. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Deqiang Li, Shicheng Cui, Yun Li 0009, Jia Xu 0003, Fu Xiao 0001, Shouhuai Xu |
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Wei Li, Wenhao Yan, Huaguang Shi, Si Li, Yi Zhou 0004 |
Multi-Robot Cooperative Pursuit-Evasion Control: A DeepReinforcement Learning Approach based on Prioritized Experience Replay. |
CCEAI |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Shuzhi Cao, Jianfei Ruan, Bo Dong 0001, Bin Shi, Qinghua Zheng |
RR-PU: A Synergistic Two-Stage Positive and Unlabeled Learning Framework for Robust Tax Evasion Detection. |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Ahmed T. El-Toukhy, Mohamed Mahmoud 0001, Atef H. Bondok, Mostafa M. Fouda, Maazen Alsabaan |
Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach. |
CCNC |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Islam Elgarhy, Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed Mahmoud 0001, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy |
Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. |
CCNC |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Binghui Wang, Minhua Lin, Tianxiang Zhou, Pan Zhou, Ang Li 0005, Meng Pang, Hai Helen Li, Yiran Chen 0001 |
Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function. |
WSDM |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Pengdeng Li, Shuxin Li, Xinrun Wang, Jakub Cerný, Youzhi Zhang 0001, Stephen McAleer, Hau Chan, Bo An 0001 |
Grasper: A Generalist Pursuer for Pursuit-Evasion Problems. |
AAMAS |
2024 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 1157 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|