关注
Hyrum Anderson
Hyrum Anderson
Robust Intelligence
在 robustintelligence.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
The malicious use of artificial intelligence: Forecasting, prevention, and mitigation
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2018
8152018
Ember: an open dataset for training static pe malware machine learning models
HS Anderson, P Roth
arXiv preprint arXiv:1804.04637, 2018
4432018
Predicting domain generation algorithms with long short-term memory networks
J Woodbridge, HS Anderson, A Ahuja, D Grant
arXiv preprint arXiv:1611.00791, 2016
2722016
DeepDGA: Adversarially-tuned domain generation and detection
HS Anderson, J Woodbridge, B Filar
Proceedings of the 2016 ACM workshop on artificial intelligence and security …, 2016
2242016
Evading machine learning malware detection
HS Anderson, A Kharkar, B Filar, P Roth
black Hat 2017, 1-6, 2017
2062017
Learning to evade static pe machine learning malware models via reinforcement learning
HS Anderson, A Kharkar, B Filar, D Evans, P Roth
arXiv preprint arXiv:1801.08917, 2018
1952018
Sparse imaging for fast electron microscopy
HS Anderson, J Ilic-Helms, B Rohrer, J Wheeler, K Larson
Computational Imaging XI 8657, 94-105, 2013
772013
Classifying with confidence from incomplete information
N Parrish, HS Anderson, MR Gupta, DY Hsiao
The Journal of Machine Learning Research 14 (1), 3561-3589, 2013
662013
Real-time 3D ladar imaging
P Cho, H Anderson, R Hatch, P Ramaswami
35th IEEE Applied Imagery and Pattern Recognition Workshop (AIPR'06), 5-5, 2006
662006
Sea ice mapping method for SeaWinds
HS Anderson, DG Long
IEEE Transactions on Geoscience and Remote Sensing 43 (3), 647-657, 2005
642005
Poisoning web-scale training datasets is practical
N Carlini, M Jagielski, CA Choquette-Choo, D Paleka, W Pearce, ...
arXiv preprint arXiv:2302.10149, 2023
432023
Classifying sequences of extreme length with constant memory applied to malware detection
E Raff, W Fleshman, R Zak, HS Anderson, B Filar, M McLean
Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9386-9394, 2021
422021
“Real Attackers Don't Compute Gradients”: Bridging the Gap Between Adversarial ML Research and Practice
G Apruzzese, HS Anderson, S Dambra, D Freeman, F Pierazzi, K Roundy
2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 339-364, 2023
272023
Automatic YARA rule generation using biclustering
E Raff, R Zak, G Lopez Munoz, W Fleming, HS Anderson, B Filar, ...
Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security …, 2020
252020
Detecting homoglyph attacks with a siamese neural network
J Woodbridge, HS Anderson, A Ahuja, D Grant
2018 IEEE Security and Privacy Workshops (SPW), 22-28, 2018
252018
The malicious use of artificial intelligence: forecasting, prevention, and mitigation. 2018
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 1802
251802
The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv 2018
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2020
242020
Early Time Series Classification with Reliability Guarantee.
HS Anderson, N Parrish, MR Gupta
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2012
242012
Reliable Early Classification of Time Series
HS Anderson, N Parrish, K Tsukida, MR Gupta
ICASSP 2012, 2012
192012
Joint deconvolution and classification with applications to passive acoustic underwater multipath
HS Anderson, MR Gupta
The Journal of the Acoustical Society of America 124 (5), 2973-2983, 2008
192008
系统目前无法执行此操作,请稍后再试。
文章 1–20