We present ProvG-Searcher, a novel approach for detecting known APT beha...
Adversarial training has been empirically shown to be more prone to
over...
Adversarial training is widely acknowledged as the most effective defens...
Enterprise networks are one of the major targets for cyber attacks due t...
We introduce a new method for camera-model identification. Our approach
...
We address the problem of decoding video file fragments when the necessa...
Estimating the photo-response non-uniformity (PRNU) of an imaging sensor...