All Papers
0 / 0 papers shown
Title |
|---|
Title |
|---|

Title |
|---|
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural NetworksIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2025 |
![]() MASKDROID: Robust Android Malware Detection with Masked Graph
RepresentationsInternational Conference on Automated Software Engineering (ASE), 2024 |
![]() Survey of Malware Analysis through Control Flow Graph using Machine
LearningInternational Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023 |
![]() A Survey on Malware Detection with Graph Representation LearningACM Computing Surveys (ACM Comput. Surv.), 2023 |
![]() Edge Deep Learning Model Protection via Neuron AuthorizationIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023 |
![]() ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using
Reinforcement LearningConference on Computer and Communications Security (CCS), 2022 |
![]() Trustworthy Graph Neural Networks: Aspects, Methods and TrendsProceedings of the IEEE (Proc. IEEE), 2022 |