Authors |
Paper (Accepted) |
Rasika Bhalerao, Mohammad Al-Rubaie, Anand Bhaskar, Igor Markov |
Data-Driven Mitigation of Adversarial Text Perturbation |
Thomas Davies |
A Review of Topological Data Analysis for Cybersecurity |
Xiaolei Hua, Lin Zhu, Shenglin Zhang, Zeyan Li, Su Wang, Dong Zhou, Shuo Wang, Chao Deng |
GenAD: General Representations of Multivariate Time Series for Anomaly Detection |
Khouloud Abdelli, Joo Yeon Cho, Carsten Tropschug |
ML-based Anomaly Detection in Optical Fiber Monitoring |
Omid Madani, Thanh Ngo, Weifei Zeng, Sai Ankith Averineni, Sasidhar Evuru, Varun Malhotra, Shashidhar Gandham, Navindra Yadav |
Binomial Tails for Community Analysis |
Sujoy Sikdar, Sikai Ruan, Qishen Han, Paween Pitimanaaree, Jeremy Blackthorne, Bulent Yener, Lirong Xia |
Anti-Malware Sandbox Games |
Robert Joyce, Dev Amlani, Charles Nicholas, Edward Raff |
MOTIF: A Large Malware Reference Dataset with Ground Truth Family Labels |
Thanh Nguyen, Arunesh Sinha |
The Art of Manipulation: Threat of Multi-Step Manipulative Attacks in Security Game |
Andre Nguyen, Fred Lu, Gary Lopez, Edward Raff, Charles Nicholas, James Holt |
Out of Distribution Data Detection Using Dropout Bayesian Neural Networks |