Follow
Keane Lucas
Keane Lucas
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Creating xBD: A dataset for assessing building damage from satellite imagery
R Gupta, B Goodman, N Patel, R Hosfelt, S Sajeev, E Heim, J Doshi, ...
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
3642019
Malware makeover: Breaking ml-based static analysis by modifying executable bytes
K Lucas, M Sharif, L Bauer, MK Reiter, S Shintre
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
65*2021
Adversarial training for {Raw-Binary} malware classifiers
K Lucas, S Pai, W Lin, L Bauer, MK Reiter, M Sharif
32nd USENIX Security Symposium (USENIX Security 23), 1163-1180, 2023
92023
Any-Play: An Intrinsic Augmentation for Zero-Shot Coordination
K Lucas, RE Allen
Proceedings of the 21st International Conference on Autonomous Agents and …, 2022
92022
Randomness in ml defenses helps persistent attackers and hinders evaluators
K Lucas, M Jagielski, F Tramèr, L Bauer, N Carlini
arXiv preprint arXiv:2302.13464, 2023
52023
Perspectives from a comprehensive evaluation of reconstruction-based anomaly detection in industrial control systems
C Fung, S Srinarasi, K Lucas, HB Phee, L Bauer
European Symposium on Research in Computer Security, 493-513, 2022
52022
RS-Del: Edit distance robustness certificates for sequence classifiers via randomized deletion
Z Huang, NG Marchant, K Lucas, L Bauer, O Ohrimenko, B Rubinstein
Advances in Neural Information Processing Systems 36, 2024
42024
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks
W Lin, K Lucas, L Bauer, MK Reiter, M Sharif
arXiv preprint arXiv:2112.14232, 2021
22021
Certified robustness of learning-based static malware detectors
Z Huang, NG Marchant, K Lucas, L Bauer, O Ohrimenko, BI Rubinstein
CoRR, 2023
12023
Subspace Grid-sweep: ML Defense Evaluation via Constrained Brute-force Search
K Lucas, M Jagielski, F Tramèr, L Bauer, N Carlini
2023
Group-based Robustness: A General Framework for Customized Robustness in the Real World
W Lin, K Lucas, N Eyal, L Bauer, MK Reiter, M Sharif
arXiv preprint arXiv:2306.16614, 2023
2023
Deceiving ML-Based Friend-or-Foe Identification for Executables
K Lucas, M Sharif, L Bauer, MK Reiter, S Shintre
Cyber Deception: Techniques, Strategies, and Human Aspects, 217-249, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–12