People

RESEARCHERS & LECTURERS

DOC. ING. TOMÁŠ PEVNÝ, PH.D.

doc. Ing. Tomáš Pevný, Ph.D.
Praha 2, Karlovo náměstí 13, E-111
+420 224 357 608
pevnytom@fel.cvut.cz

Stiborek, J., Pevný, T., Rehák, M. 2018 Multiple instance learning for malware classification, detail

Pevný, T., Kohout, J. 2018 Network traffic fingerprinting based on approximated kernel two-sample test, detail

Stiborek, J., Pevný, T., Rehák, M. 2018 Multiple instance learning for malware classification, detail

Stiborek, J., Pevný, T., Rehák, M. 2018 Probabilistic analysis of dynamic malware traces, detail

Pevný, T., Ker, A.D. 2018 Exploring Non-Additive Distortion in Steganography, detail

Durkota, K., Lisý, V., Kiekintveld, C., Horák, K., Bošanský, B., Pevný, T. 2017 Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers, detail

Pevný, T., Somol, P. 2017 Using Neural Network Formalism to Solve Multiple-Instance Problems, detail

Prasse, P., Machlica, L., Pevný, T., Havelka, J., Scheffer, T. 2017 Malware Detection by Analysing Encrypted Network Traffic with Neural Networks, detail

Janisch, J., Pevný, T., Lisý, V. 2017 Classification with Costly Features using Deep Reinforcement Learning, detail

Grill, M., Pevný, T., Rehák, M. 2017 Reducing False Positives of Network Anomaly Detection by Local Adaptive Multivariate Smoothing, detail

Grill, M., Pevný, T. 2016 Learning Combination of Anomaly Detectors for Security Domain, detail

Pevný, T., Cech, P., Kohout, J., Lokoc, J., Komárek, T., Marousek, J. 2016 Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce, detail

Jusko, J., Rehák, M., Stiborek, J., Kohout, J., Pevný, T. 2016 Using Behavioral Similarity for Botnet Command-and-Control Discovery, detail

Durkota, K., Lisý, V., Horák, K., Kiekintveld, Ch., Bošanský, B., Pevný, T. 2016 Game-theoretic Analysis of Detecting Data Exfiltration, detail

Kungurtsev, V., Pevný, T. 2016 Algorithms for Solving Optimization Problems Arsing from Deep Neural Net Models: Smooth Problems, detail

Pevný, T. 2016 Loda: Lightweight on-line detector of anomalies, detail

Pevný, T., Kopp, M., Křoustek, J, Ker, A.D 2016 Malicons: Detecting Payload in Favicons, detail

Čech, Přemysl, Kohout, J., Lokoč, Jakub, Komárek, T., Maroušek, Jakub, Pevný, T. 2016 Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce, detail

Komárek, T., Grill, M., Pevný, T. 2016 Passive NAT Detection Using HTTP Access Logs, detail

Pevný, T., Somol, Petr 2016 Discriminative Models for Multi-instance Problems with Tree Structure, detail

Pevný, T., Ker, Andrew D., Bas, Patrick 2016 Rethinking Optimal Embedding, detail

Pevný, T., Kopp, M., Kroustek, J., Ker, A.D. 2016 Malicons: Detecting Payload in Favicons, detail

Stiborek, J., Rehák, M., Pevný, T. 2015 Towards Scalable Network Host Simulation, detail

Kohout, J., Pevný, T. 2015 Unsupervised Detection of Malware in Persistent Web Traffic, detail

Kohout, J., Pevný, T. 2015 Automatic Discovery of Web Servers Hosting Similar Applications, detail

Pevný, T., Ker, Andrew D. 2015 Towards dependable steganalysis, detail

Cogranne, Remi, Sedighi, Vahid, Fridrich, Jessica, Pevný, T. 2015 Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces?, detail

Pevný, T., Nikolaev, I. 2015 Optimizing pooling function for pooled steganalysis, detail

Létal, V., Pevný, T., Somol, Petr, Smidl, Vasek 2015 Finding New Malicious Domains Using Variational Bayes on Large-Scale Computer Network Data, detail

Šourek, G., Železný, F., Kuželka, O., Pevný, T. 2015 Learning to create and exploit aggregative and relational properties of flow-sets, detail

Ker, Andrew D., Pevný, T. 2014 The Steganographer is the Outlier: Realistic Large-Scale Steganalysis, detail

Kopp, M., Pevný, T., Holeňa, M. 2014 Interpreting and clustering outliers with sapling random forests, detail

Kopp, M., Pevný, T., Holeňa, M. 2014 Interpreting and clustering outliers with sapling random forests, detail

Pevný, T., Kopp, M. 2014 Explaining Anomalies with Sapling Random Forests, detail

Lisý, V., Kessl, R., Pevný, T. 2014 Randomized Operating Point Selection in Adversarial Classification, detail

Rehák, M., Jusko, J., Pevný, T. 2014 A Memory Efficient Privacy Preserving Representation of Connection Graphs, detail

Ker, Andrew D., Pevný, T. 2014 A mishmash of methods for mitigating the model mismatch mess, detail

Pevný, T., Ker, Andrew D. 2014 Steganographic key leakage through payload metadata, detail

Pevný, T., Kopp, M. 2014 Explaining Anomalies with Sampling Random Forests, detail

Pevný, T., Rehák, M., Komon, Martin 2013 Attacking the IDS learning processes, detail

Ker, Andrew, Bas, Patrick, Bohme, Rainer, Cogranne, Remi, Craver, Scott, Filler, Tomas, Fridrich, Jessica, Pevný, T. 2013 Moving Steganography and Steganalysis from the Laboratory into the Real World, detail

Pevný, T., Ker, Andrew D. 2013 The Challenges of Rich Features in Universal Steganalysis, detail

Pevný, T. 2013 Anomaly detection by bagging, detail

Kohout, J., Pevný, T. 2013 Modeling behavior twitter users, detail

Ker, Andrew, Pevný, T. 2012 Identifying a steganographer in realistic and heterogeneous data sets, detail

Pevný, T., Fridrich, Jessica, Ker, Andrew 2012 From Blind to Quantitative Steganalysis, detail

Ker, Andrew, Pevný, T. 2012 Batch steganography in the real world, detail

Pevný, T., Grill, M., Rehák, M. 2012 Detecting anomalous network hosts by means of PCA, detail

Pevný, T. 2012 Co-occurrence steganalysis in high dimensions, detail

Pevný, T. 2011 13th Information Hiding Conference, detail

Bas, P., Filler, T., Pevný, T. 2011 "Break Our Steganographic System" --- the ins and outs of organizing BOSS, detail

Filler, T., Pevný, T., Craver, S., Ker, A.D. 2011 Proceedings of the 13th international conference on Information hiding, detail

Ker, A.D., Pevný, T. 2011 A New Paradigm for Steganalysis via Clustering, detail

Pevný, T. 2011 Detecting messages of unknown length, detail

Kodovský, J., Pevný, T., Fridrich, J. 2010 Modern Steganalysis Can Detect YASS, detail

Pevný, T., Filler, T., Bas, P. 2010 Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, detail

Pevný, T., Bas, T., Fridrich, J. 2010 Steganalysis by Subtractive Pixel Adjacency Matrix, detail

Pevný, T. 2010 Coordination of Malware by Means of Steganography, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Stiborek, J., Svoboda, M., Pevný, T. 2009 Cooperative Adaptive Mechanism for Network Protection, detail

Pevný, T., Fridrich, J., Bas, P. 2009 Steganalysis by Subtractive Pixel Adjacency Matrix, detail

Pevný, T., Fridrich, J., Ker, A. D. 2009 From Blind to Quantitative Steganalysis, detail

Pevný, T., Fridrich, J. 2008 Novelty detection in blind steganalysis, detail

Pevný, T., Ker, A.D., Kodovsky, J., Fridrich, J. 2008 The Square Root Law of Steganographic Capacity, detail

Pevný, T., Fridrich, J. 2008 Benchmarking for Steganography, detail

Pevný, T., Fridrich, J. 2008 Detection of double-compression in JPEG images for applications in steganography, detail

Pevný, T. 2008 Kernel methods in steganalysis, detail

Pevný, T., Fridrich, J. 2008 Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images, detail

Pevný, T., Fridrich, J. 2008 Multiclass Detector of Current Steganographic Methods for JPEG Format, detail

Fridrich, J., Pevný, T., Kodovsky, J. 2007 Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, detail

Pevný, T., Fridrich, J. 2007 Merging Markov and DCT features for multi-class JPEG steganalysis, detail

Pevný, T., Firdrich, J. 2006 Determining the stego algorithm for JPEG images, detail

Pevný, T., Fridrich, J. 2006 Multi-class blind steganalysis for JPEG images, detail

Pevný, T., Fridrich, J. 2005 Towards Multi-class Blind Steganalyzer for JPEG Images, detail