default search action
Olivier Y. de Vel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Bayesian Learned Models Can Detect Adversarial Malware for Free. ESORICS (1) 2024: 45-65 - [i9]Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Bayesian Learned Models Can Detect Adversarial Malware For Free. CoRR abs/2403.18309 (2024) - 2023
- [c36]Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness. AAAI 2023: 14783-14791 - [i8]Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness. CoRR abs/2301.12680 (2023) - 2022
- [j20]Shigang Liu, Guanjun Lin, Lizhen Qu, Jun Zhang, Olivier Y. de Vel, Paul Montague, Yang Xiang:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 19(1): 438-451 (2022) - [c35]Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere:
Transferable Graph Backdoor Attack. RAID 2022: 321-332 - [i7]Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere:
Transferable Graph Backdoor Attack. CoRR abs/2207.00425 (2022) - 2021
- [j19]Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Olivier Y. de Vel, Paul Montague, Yang Xiang:
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases. IEEE Trans. Dependable Secur. Comput. 18(5): 2469-2485 (2021) - [c34]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Dinh Phung:
Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness. AAAI 2021: 6831-6839 - [c33]Van Nguyen, Trung Le, Olivier Y. de Vel, Paul Montague, John Grundy, Dinh Phung:
Information-theoretic Source Code Vulnerability Highlighting. IJCNN 2021: 1-8 - 2020
- [c32]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier Y. DeVel, Tamas Abraham, Dinh Q. Phung:
Improving Adversarial Robustness by Enforcing Local and Global Compactness. ECCV (27) 2020: 209-223 - [c31]Yi Han, David Hubczenko, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah M. Erfani:
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence. IJCNN 2020: 1-8 - [c30]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, Dinh Phung:
Code Pointer Network for Binary Function Scope Identification. IJCNN 2020: 1-7 - [c29]Tuan Nguyen, Trung Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung:
Deep Cost-Sensitive Kernel Machine for Binary Software Vulnerability Detection. PAKDD (2) 2020: 164-177 - [c28]Van Nguyen, Trung Le, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung:
Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection. PAKDD (1) 2020: 699-711 - [c27]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung:
Code Action Network for Binary Function Scope Identification. PAKDD (1) 2020: 712-725 - [c26]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. TrustCom 2020: 301-309 - [i6]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier Y. DeVel, Tamas Abraham, Dinh Phung:
Improving Adversarial Robustness by Enforcing Local and Global Compactness. CoRR abs/2007.05123 (2020) - [i5]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier Y. DeVel, Tamas Abraham, Dinh Phung:
Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness. CoRR abs/2009.09612 (2020) - [i4]He Zhao, Trung Le, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Dinh Phung:
Towards Understanding Pixel Vulnerability under Adversarial Attacks for Images. CoRR abs/2010.06131 (2020)
2010 – 2019
- 2019
- [j18]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs. IEEE Access 7: 183162-183176 (2019) - [c25]Tue Le, Tuan Nguyen, Trung Le, Dinh Q. Phung, Paul Montague, Olivier Y. de Vel, Lizhen Qu:
Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection. ICLR (Poster) 2019 - [c24]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. DeVel, Paul Montague, Lizhen Qu, Dinh Q. Phung:
Deep Domain Adaptation for Vulnerable Code Function Identification. IJCNN 2019: 1-8 - [c23]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. NSS 2019: 18-36 - [i3]Yi Han, David Hubczenko, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah M. Erfani:
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking. CoRR abs/1902.09062 (2019) - [i2]He Zhao, Trung Le, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Dinh Phung:
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions. CoRR abs/1910.01329 (2019) - 2018
- [j17]Liu Liu, Olivier Y. de Vel, Qing-Long Han, Jun Zhang, Yang Xiang:
Detecting and Preventing Cyber Insider Threats: A Survey. IEEE Commun. Surv. Tutorials 20(2): 1397-1417 (2018) - [j16]Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Yang Xiang, Olivier Y. de Vel, Paul Montague:
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery. IEEE Trans. Ind. Informatics 14(7): 3289-3297 (2018) - [c22]Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou, Yang Xiang, Olivier Y. de Vel:
A Data-driven Attack against Support Vectors of SVM. AsiaCCS 2018: 723-734 - [c21]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. GameSec 2018: 145-165 - [c20]Liu Liu, Olivier Y. de Vel, Chao Chen, Jun Zhang, Yang Xiang:
Anomaly-Based Insider Threat Detection Using Deep Autoencoders. ICDM Workshops 2018: 39-48 - [i1]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. CoRR abs/1808.05770 (2018)
2000 – 2009
- 2008
- [c19]Huidong Jin, Olivier Y. de Vel, Ke Zhang, Nianjun Liu:
Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. Australasian Conference on Artificial Intelligence 2008: 470-481 - [c18]Lan Du, Huidong Jin, Olivier Y. de Vel, Nianjun Liu:
A latent semantic indexing and WordNet based information retrieval model for digital forensics. ISI 2008: 70-75 - [c17]Phan Thien Son, Lan Du, Huidong Jin, Olivier Y. de Vel, Nianjun Liu, Terry Caelli:
A Simple WordNet-Ontology Based Email Retrieval System for Digital Forensics. ISI Workshops 2008: 217-228 - 2006
- [j15]Olivier Y. de Vel:
Learning Semi-Structured Document Categorization Using Bounded-Length Spectrum Sub-Sequence Kernels. Data Min. Knowl. Discov. 13(3): 309-334 (2006) - [c16]Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano:
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics. ISI 2006: 459-465 - [c15]Jonathon Abbott, Jim Bell, Andrew J. Clark, Olivier Y. de Vel, George M. Mohay:
Automated recognition of event scenarios for digital forensics. SAC 2006: 293-300 - 2005
- [c14]Ross Brown, Binh Pham, Olivier Y. de Vel:
Design of a Digital Forensics Image Mining System. KES (3) 2005: 395-404 - 2004
- [j14]Olivier Y. de Vel:
File classification using byte sub-stream kernels. Digit. Investig. 1(2): 150-157 (2004) - 2003
- [j13]Zhuhan Jiang, Olivier Y. de Vel, Bruce E. Litow:
Unification and extension of weighted finite automata applicable to image compression. Theor. Comput. Sci. 302(1-3): 275-294 (2003) - 2002
- [c13]Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay:
Gender-Preferential Text Mining of E-mail Discourse. ACSAC 2002: 282-289 - [c12]Tamas Abraham, Ryan Kling, Olivier Y. de Vel:
Investigative Profile Analysis With Computer Forensic Log Data Using Attribute Generalisation. AusDM 2002: 17-28 - [c11]Tamas Abraham, Olivier Y. de Vel:
Investigative Profiling with Computer Forensic Log Data and Association Rules. ICDM 2002: 11-18 - [p1]Olivier Y. de Vel, Alison Anderson, Malcolm Corney, George M. Mohay:
E-Mail Authorship Attribution for Computer Forensics. Applications of Data Mining in Computer Security 2002: 229-250 - 2001
- [j12]Olivier Y. de Vel, Alison Anderson, Malcolm Corney, George M. Mohay:
Mining Email Content for Author Identification Forensics. SIGMOD Rec. 30(4): 55-64 (2001) - [c10]Zhuhan Jiang, Bruce E. Litow, Olivier Y. de Vel:
An Inference Implementation Based on Extended Weighted Finite Automata. ACSC 2001: 100-108 - 2000
- [j11]Olivier Y. de Vel, Stefan Aeberhard:
Object recognition using random image-lines. Image Vis. Comput. 18(3): 193-198 (2000) - [j10]Stefan Aeberhard, Olivier Y. de Vel, Danny Coomans:
New Fast Algorithms for Error Rate-Based Stepwise Variable Selection in Discriminant Analysis. SIAM J. Sci. Comput. 22(3): 1036-1052 (2000) - [c9]Zhuhan Jiang, Bruce E. Litow, Olivier Y. de Vel:
Similarity Enrichment in Image Compression through Weighted Finite Automata. COCOON 2000: 447-456
1990 – 1999
- 1999
- [j9]Jiannong Cao, Olivier Y. de Vel, Ling Shi:
Rapid prototyping of distributed algorithms. J. Syst. Softw. 45(2): 141-154 (1999) - [j8]Olivier Y. de Vel, Stefan Aeberhard:
Line-Based Face Recognition under Varying Pose. IEEE Trans. Pattern Anal. Mach. Intell. 21(10): 1081-1088 (1999) - 1998
- [j7]Jiannong Cao, Kang Zhang, Olivier Y. de Vel:
On heuristics for optimal configuration of hierarchical distributed monitoring systems. J. Syst. Softw. 43(3): 197-206 (1998) - [c8]Olivier Y. de Vel, Stefan Aeberhard:
View-based object recognition using image lines. ICPR 1998: 805-807 - [c7]Stefan Aeberhard, Olivier Y. de Vel:
Face recognition using multiple image view line segments. ICPR 1998: 1198-1200 - [c6]Olivier Y. de Vel, Danny Coomans, S. Patrick:
Feature Mining and Mapping of Collinear Data. PAKDD 1998: 322-335 - 1997
- [j6]Brendan McCane, Terry Caelli, Olivier Y. de Vel:
Learning to Recognition 3D Objects Using Sparse Depth and Intensity Information. Int. J. Pattern Recognit. Artif. Intell. 11(6): 909-931 (1997) - [j5]Yvette Mallet, Danny Coomans, Jerry Kautsky, Olivier Y. de Vel:
Classification Using Adaptive Wavelets for Feature Extraction. IEEE Trans. Pattern Anal. Mach. Intell. 19(10): 1058-1066 (1997) - 1996
- [c5]Brendan McCane, Terry Caelli, Olivier Y. de Vel:
Inducing complex spatial descriptions in two dimensional scenes. PRICAI Workshops 1996: 123-132 - 1995
- [c4]Olivier Y. de Vel, Sofianto Li, Danny Coomans:
Non-Linear Dimensionality Reduction: A Comparative Performance Analysis. AISTATS 1995: 323-331 - [c3]Olivier Y. de Vel, Sujint Wangsuya, Danny Coomans:
On Thai character recognition. ICNN 1995: 2095-2098 - 1994
- [j4]Olivier Y. de Vel, Peter G. Thomas:
Concurrent Simulation of Systolic and Wavefront Array Processor Architectures. Int. J. Comput. Simul. 4(1) (1994) - [j3]Stefan Aeberhard, Danny Coomans, Olivier Y. de Vel:
Comparative analysis of statistical pattern recognition methods in high dimensional settings. Pattern Recognit. 27(8): 1065-1077 (1994) - 1993
- [c2]Olivier Y. de Vel:
Concurrent Simulation of Instruction Systolic Array Structures. MASCOTS 1993: 38-43 - 1991
- [c1]Zhiwei Xu, Olivier Y. de Vel:
Petri Net Modelling of Occam Programs for Detecting Indeterminacy, Non-termination and Deadlock Anomalies. PNPM 1991: 116-124 - 1990
- [j2]Olivier Y. de Vel, Peter G. Thomas:
Multitransputer architecture for the low-level characterization of speech spectrograms. Microprocess. Microsystems 14(5): 267-275 (1990)
1980 – 1989
- 1988
- [j1]Olivier Y. de Vel, E. V. Krishnamurthy:
An Iterative Pipelined Array Architecture for the Generalized Matrix Inversion. Inf. Process. Lett. 26(5): 263-267 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint