Следене
Ethan M. Rudd, PhD
Ethan M. Rudd, PhD
Потвърден имейл адрес: google.com
Заглавие
Позовавания
Позовавания
Година
The extreme value machine
EM Rudd, LP Jain, WJ Scheirer, TE Boult
IEEE transactions on pattern analysis and machine intelligence 40 (3), 762-768, 2017
3382017
Adversarial diversity and hard positive generation
A Rozsa, EM Rudd, TE Boult
Proceedings of the IEEE conference on computer vision and pattern …, 2016
3222016
Moon: A mixed objective optimization network for the recognition of facial attributes
EM Rudd, M Günther, TE Boult
Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The …, 2016
2402016
A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions
EM Rudd, A Rozsa, M Günther, TE Boult
IEEE Communications Surveys & Tutorials 19 (2), 1145-1172, 2016
1832016
Toward open-set face recognition
M Gunther, S Cruz, EM Rudd, TE Boult
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017
902017
SOREL-20M: A large scale benchmark dataset for malicious PE detection
R Harang, EM Rudd
arXiv preprint arXiv:2012.07634, 2020
892020
Facial attributes: Accuracy and adversarial robustness
A Rozsa, M Günther, EM Rudd, TE Boult
Pattern Recognition Letters 124, 100-108, 2019
662019
Are facial attributes adversarially robust?
A Rozsa, M Günther, EM Rudd, TE Boult
2016 23rd International Conference on Pattern Recognition (ICPR), 3121-3127, 2016
532016
Incremental open set intrusion recognition using extreme value machine
J Henrydoss, S Cruz, EM Rudd, M Gunther, TE Boult
2017 16th IEEE International Conference on Machine Learning and Applications …, 2017
472017
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
402018
Open set intrusion recognition for fine-grained attack categorization
S Cruz, C Coleman, EM Rudd, TE Boult
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
302017
{ALOHA}: Auxiliary Loss Optimization for Hypothesis Augmentation
EM Rudd, FN Ducau, C Wild, K Berlin, R Harang
28th USENIX Security Symposium (USENIX Security 19), 303-320, 2019
262019
Paraph: presentation attack rejection by analyzing polarization hypotheses
EM Rudd, M Gunther, TE Boult
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2016
232016
Automated big text security classification
K Alzhrani, EM Rudd, TE Boult, CE Chow
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 103-108, 2016
212016
Exemplar codes for facial attributes and tattoo recognition
MJ Wilber, E Rudd, B Heflin, YM Lui, TE Boult
IEEE Winter Conference on Applications of Computer Vision, 205-212, 2014
192014
Automatic malware description via attribute tagging and similarity embedding
FN Ducau, EM Rudd, TM Heppner, A Long, K Berlin
arXiv preprint arXiv:1905.06262, 2019
172019
Automated us diplomatic cables security classification: Topic model pruning vs. classification based on clusters
K Alzhrani, EM Rudd, CE Chow, TE Boult
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
162017
Automated big security text pruning and classification
K Alzhrani, EM Rudd, CE Chow, TE Boult
2016 IEEE International Conference on Big Data (Big Data), 3629-3637, 2016
162016
Learning from context: A multi-view deep learning architecture for malware detection
A Kyadige, EM Rudd, K Berlin
2020 IEEE Security and Privacy Workshops (SPW), 1-7, 2020
152020
Smart: Semantic malware attribute relevance tagging
FN Ducau, EM Rudd, TM Heppner, A Long, K Berlin
arXiv preprint arXiv:1905.06262, 2019
62019
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20