Cited By
View all- Celik ZMcDaniel PIzmailov RPapernot NSheatsley RAlvarez RSwami AKim JAhn GKim SKim YLopez JKim T(2018)Detection under Privileged InformationProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196502(199-206)Online publication date: 29-May-2018
- Celik ZMcDaniel P(2018)Extending Detection with Privileged Information via Generalized Distillation2018 IEEE Security and Privacy Workshops (SPW)10.1109/SPW.2018.00021(83-88)Online publication date: May-2018
- Celik ZMcDaniel PBowen T(2017)Malware modeling and experimentation through parameterized behaviorThe Journal of Defense Modeling and Simulation: Applications, Methodology, Technology10.1177/154851291772175515:1(31-48)Online publication date: 7-Aug-2017
- Show More Cited By