Follow
Ryan Sheatsley
Title
Cited by
Cited by
Year
cleverhans v2. 0.0: an adversarial machine learning library
N Papernot, I Goodfellow, R Sheatsley, R Feinman, P McDaniel
arXiv preprint arXiv:1610.00768 10, 2016
2922016
Technical report on the cleverhans v2. 1.0 adversarial examples library
N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ...
arXiv preprint arXiv:1610.00768, 2016
2432016
cleverhans v0. 1: an adversarial machine learning library
I Goodfellow, N Papernot, P McDaniel, R Feinman, F Faghri, A Matyasko, ...
arXiv preprint arXiv:1610.00768 1, 2016
442016
Network traffic obfuscation: An adversarial machine learning approach
G Verma, E Ciftcioglu, R Sheatsley, K Chan, L Scott
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-6, 2018
112018
Adversarial examples in constrained domains
R Sheatsley, N Papernot, M Weisman, G Verma, P McDaniel
arXiv preprint arXiv:2011.01183, 2020
82020
On the Robustness of Domain Constraints
R Sheatsley, B Hoak, E Pauley, Y Beugin, MJ Weisman, P McDaniel
arXiv preprint arXiv:2105.08619, 2021
72021
Curie: Policy-based secure data exchange
ZB Celik, A Acar, H Aksu, R Sheatsley, P McDaniel, AS Uluagac
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
62019
Technical report on the cleverhans v2. 1.0 adversarial examples library (2018)
N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ...
arXiv preprint arXiv:1610.00768, 0
6
A Vision Toward an Internet of Battlefield Things (IoBT): Autonomous Classifying Sensor Network
J Zhu, E McClave, Q Pham, S Polineni, S Reinhart, R Sheatsley, A Toth
US Army Research Laboratory Adelphi United States, 2018
42018
Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations
R Sheatsley, M Durbin, A Lintereur, P Mcdaniel
IEEE Sensors Journal 21 (8), 9994-10006, 2021
32021
Detection under privileged information
ZB Celik, P McDaniel, R Izmailov, N Papernot, R Sheatsley, R Alvarez, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
32018
LIN, Y
N Papernot, N Carlini, I Goodfellow, R Feinman, F Faghri, A Matyasko, ...
C. cleverhans v2. 0.0: an adversarial machine learning library. arXiv, 2017
32017
Adversarial examples in constrained domains
RM Sheatsley
22018
Heterogeneous information sharing of sensor information in contested environments
JA Wampler, C Hsieh, A Toth, R Sheatsley
Ground/Air Multisensor Interoperability, Integration, and Networking for …, 2017
22017
Adversarial examples for network intrusion detection systems
R Sheatsley, N Papernot, MJ Weisman, G Verma, P McDaniel
Journal of Computer Security, 1-26, 2022
12022
Application Transiency: Towards a Fair Trade of Personal Information for Application Services
R Alvarez, J Levenson, R Sheatsley, P McDaniel
International Conference on Security and Privacy in Communication Systems, 47-66, 2019
12019
Experimental tests of Gamma-ray Localization Aided with Machine-learning (GLAM) capabilities
M Durbin, R Sheatsley, P McDaniel, A Lintereur
Nuclear Instruments and Methods in Physics Research Section A: Accelerators …, 2022
2022
Adversarial Plannning
V Vie, R Sheatsley, S Beyda, S Shringarputale, K Chan, T Jaeger, ...
arXiv preprint arXiv:2205.00566, 2022
2022
Measuring and Mitigating the Risk of IP Reuse on Public Clouds
E Pauley, R Sheatsley, B Hoak, Q Burke, Y Beugin, P McDaniel
arXiv preprint arXiv:2204.05122, 2022
2022
A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting
K Domico, R Sheatsley, Y Beugin, Q Burke, P McDaniel
arXiv preprint arXiv:2204.05780, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20