Follow
Nedim Šrndić
Nedim Šrndić
Huawei Munich Research Center
Verified email at huawei.com
Title
Cited by
Cited by
Year
Evasion attacks against machine learning at test time
B Biggio, I Corona, D Maiorca, B Nelson, N Šrndić, P Laskov, G Giacinto, ...
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2013
17402013
Practical Evasion of a Learning-Based Classifier: A Case Study
N Šrndić, P Laskov
2014 IEEE Symposium on Security and Privacy (SP), 197 - 211, 2014
4702014
Static Detection of Malicious JavaScript-Bearing PDF Documents
P Laskov, N Šrndić
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
2522011
Detection of Malicious PDF Files Based on Hierarchical Document Structure
N Šrndić, P Laskov
Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013
2492013
Hidost: A Static Machine-Learning-Based Detector of Malicious Files
N Šrndić, P Laskov
EURASIP Journal on Information Security 2016 (1), 22, 2016
1152016
Detection of Illicit Cryptomining using Network Metadata
M Russo, N Šrndić, P Laskov
EURASIP Journal on Information Security 2021 (1), 2021
182021
The Application of a Parallel Genetic Algorithm to Timetabling of Elementary School Classes: a Coarse-Grained Approach
N Šrndić, E Pandžo, M Dervišević, S Konjicija
Information, Communication and Automation Technologies, 2009. ICAT 2009 …, 2009
182009
Noise Contrastive Estimation-based Matching Framework for Low-Resource Security Attack Pattern Recognition
T Nguyen, N Šrndić, A Neth
Findings of the Association for Computational Linguistics: EACL 2024, 355--373, 2024
2024
3.8 A semantic gap in malware analysis
N Šrndić
Security of Machine Learning, 52, 2022
2022
Machine Learning and Security of Non-Executable Files
N Šrndić
Universität Tübingen, 2017
2017
Introducing The Unified E-Book Format And A Hybrid Library 2.0 Application Model Based On It
T Eterović, N Šrndić
Review of the National Center for Digitization, 43-52, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–11