Cited By
View all- Zhang YLuo SWu HPan L(2024)Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware DetectionIEEE Transactions on Industrial Informatics10.1109/TII.2023.332752220:3(4627-4639)Online publication date: Mar-2024
- Tian BJiang JHe ZYuan XDong LSun C(2024)Functionality-Verification Attack Framework Based on Reinforcement Learning Against Static Malware DetectorsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.345304719(8500-8514)Online publication date: 2024
- De La Cruz Alvarado APortillo S(2024)Understanding Crypter-as-a-Service in a Popular Underground Marketplace2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00016(85-90)Online publication date: 8-Jul-2024
- Show More Cited By

