Rethinking Optimal Embedding

Andrew D. Ker , Tomáš Pevnỳ , Patrick Bas
information hiding 93 -102

7
2016
Malware Detection by HTTPS Traffic Analysis

Paul Prasse , Gerrit Gruben , Lukas Machlika , Tomas Pevny

2
2016
Unsupervised detection of malware in persistent web traffic

Jan Kohout , Tomas Pevny
international conference on acoustics, speech, and signal processing 1757 -1761

17
2015
Malware Detection by Analysing Network Traffic with Neural Networks

Paul Prasse , Lukas Machlica , Tomas Pevny , Jiri Havelka
ieee symposium on security and privacy 205 -210

14
2017
The Steganographer is the Outlier: Realistic Large-Scale Steganalysis

Andrew D. Ker , Tomas Pevny
IEEE Transactions on Information Forensics and Security 9 ( 9) 1424 -1435

43
2014
Multiclass Detector of Current Steganographic Methods for JPEG Format

Tomas Pevny , Jessica Fridrich
IEEE Transactions on Information Forensics and Security 3 ( 4) 635 -650

69
2008
Detection of Double-Compression in JPEG Images for Applications in Steganography

Tomas Pevny , Jessica Fridrich
IEEE Transactions on Information Forensics and Security 3 ( 2) 247 -258

328
2008
Universal Batch Steganalysis

Tomas Pevny , Andrew D. Ker
Defense Technical Information Center

1
2014
Using Behavioral Similarity for Botnet Command-and-Control Discovery

Jan Jusko , Martin Rehak , Jan Stiborek , Jan Kohout
IEEE Intelligent Systems 31 ( 5) 16 -22

3
2016
Detecting anomalous network hosts by means of PCA

Tomas Pevny , Martin Rehak , Martin Grill
international workshop on information forensics and security 103 -108

6
2012
Passive NAT detection using HTTP access logs

Tomas Komarek , Martin Grill , Tomas Pevny
international workshop on information forensics and security 1 -6

7
2016
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?

Remi Cogranne , Vahid Sedighi , Jessica Fridrich , Tomas Pevny
international workshop on information forensics and security 1 -6

91
2015
Optimizing pooling function for pooled steganalysis

Tomas Pevny , Ivan Nikolaev
international workshop on information forensics and security 1 -6

11
2015
Automatic discovery of web servers hosting similar applications

Jan Kohout , Tomas Pevny
integrated network management 1310 -1315

16
2015
Attacking the IDS learning processes

Tomas Pevny , Martin Komon , Martin Rehaky
international conference on acoustics, speech, and signal processing 8687 -8691

1
2013
A memory efficient privacy preserving representation of connection graphs

Jan Jusko , Martin Rehak , Tomas Pevny
Proceedings of the 1st International Workshop on Agents and CyberSecurity 4

4
2014
Explicit Optimization of min max Steganographic Game

Solene Bernard , Patrick Bas , John Klein , Tomas Pevny
IEEE Transactions on Information Forensics and Security 16 812 -823

33
2021
Exploring Non-Additive Distortion in Steganography

Tomas Pevny , Andrew D. Ker
information hiding 109 -114

6
2018
Discriminative Models for Multi-instance Problems with Tree Structure

Tomas Pevny , Petr Somol
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security 83 -91

11
2016
Merging Markov and DCT Features for Multi-Class JPEG Steganalysis

Tomas Pevny , Jessica Fridrich
conference on security steganography and watermarking of multimedia contents 6505 650503

424
2007