Quan Le

Orcid: 0000-0001-6513-8340

According to our database1, Quan Le authored at least 23 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Robust Defense against Adversarial Attacks on Deep Learning-based Malware Detectors via (De)Randomized Smoothing.
CoRR, 2024

2023
Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks.
CoRR, 2023

American Stories: A Large-Scale Structured Text Dataset of Historical U.S. Newspapers.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Towards a Framework for the Global Assessment of Sensitive Attribute Bias Within Binary Classification Algorithms.
Proceedings of the 2nd European Workshop on Algorithmic Fairness, 2023

A Wolf in Sheep's Clothing: Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized Smoothing.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Certified Robustness of Static Deep Learning-based Malware Detectors against Patch and Append Attacks.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
Fusing feature engineering and deep learning: A case study for malware classification.
Expert Syst. Appl., 2022

Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning.
Comput. Secur., 2022

2021
Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis.
Digit. Investig., 2021

2020
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
Using Text Classification Methods to Detect Malware.
Proceedings of the Proceedings for the 27th AIAI Irish Conference on Artificial Intelligence and Cognitive Science, 2019

2018
Deep learning at the shallow end: Malware classification for non-domain experts.
Digit. Investig., 2018

2017
Protein multiple sequence alignment benchmarking through secondary structure prediction.
Bioinform., 2017

2009
An Optical Transimpedance Amplifier Using an Inductive Buffer Stage Technique.
IEICE Trans. Commun., 2009

2008
Energy-Efficient Low-Complexity CMOS Pulse Generator for Multiband UWB Impulse Radio.
IEEE Trans. Circuits Syst. I Regul. Pap., 2008

Burst-mode optical transmitter with DC-coupled burst-enable signal for 2.5-Gb/s GPON system.
Microelectron. J., 2008

2007
A CMOS Burst-Mode TIA with Step AGC and Selective Internally Created Reset for 1.25Gb/s EPON.
Proceedings of the 2007 IEEE International Solid-State Circuits Conference, 2007

2006
A 95-dB linear low-power variable gain amplifier.
IEEE Trans. Circuits Syst. I Regul. Pap., 2006

2005
A CMOS burst-mode optical transmitter for 1.25-Gb/s ethernet PON applications.
IEEE Trans. Circuits Syst. II Express Briefs, 2005

2004
A burst-mode receiver for 1.25-Gb/s ethernet PON with AGC and internally created reset signal.
IEEE J. Solid State Circuits, 2004

Burst-mode transmitter for 1.25Gb/s Ethernet PON applications [passive optical networks].
Proceedings of the 33rd European Solid-State Circuits Conference, 2004

2003
Client Dependent GMM-SVM Models for Speaker Verification.
Proceedings of the Artificial Neural Networks and Neural Information Processing, 2003


  Loading...