Alert button
Picture for Edward Bowen

Edward Bowen

Alert button

Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning

Add code
Bookmark button
Alert button
Feb 14, 2024
Cheng Wang, Christopher Redino, Abdul Rahman, Ryan Clark, Daniel Radke, Tyler Cody, Dhruv Nandakumar, Edward Bowen

Viaarxiv icon

Discovering Command and Control Channels Using Reinforcement Learning

Add code
Bookmark button
Alert button
Jan 13, 2024
Cheng Wang, Akshay Kakkar, Christopher Redino, Abdul Rahman, Ajinsyam S, Ryan Clark, Daniel Radke, Tyler Cody, Lanxiao Huang, Edward Bowen

Viaarxiv icon

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

Add code
Bookmark button
Alert button
Dec 04, 2023
Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen

Viaarxiv icon

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

Add code
Bookmark button
Alert button
Nov 28, 2023
Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty

Viaarxiv icon

A Simple yet Efficient Ensemble Approach for AI-generated Text Detection

Add code
Bookmark button
Alert button
Nov 08, 2023
Harika Abburi, Kalyani Roy, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya

Figure 1 for A Simple yet Efficient Ensemble Approach for AI-generated Text Detection
Figure 2 for A Simple yet Efficient Ensemble Approach for AI-generated Text Detection
Figure 3 for A Simple yet Efficient Ensemble Approach for AI-generated Text Detection
Figure 4 for A Simple yet Efficient Ensemble Approach for AI-generated Text Detection
Viaarxiv icon

A Closer Look at Bearing Fault Classification Approaches

Add code
Bookmark button
Alert button
Sep 29, 2023
Harika Abburi, Tanya Chaudhary, Haider Ilyas, Lakshmi Manne, Deepak Mittal, Don Williams, Derek Snaidauf, Edward Bowen, Balaji Veeramani

Figure 1 for A Closer Look at Bearing Fault Classification Approaches
Figure 2 for A Closer Look at Bearing Fault Classification Approaches
Figure 3 for A Closer Look at Bearing Fault Classification Approaches
Figure 4 for A Closer Look at Bearing Fault Classification Approaches
Viaarxiv icon

Generative AI Text Classification using Ensemble LLM Approaches

Add code
Bookmark button
Alert button
Sep 14, 2023
Harika Abburi, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya

Figure 1 for Generative AI Text Classification using Ensemble LLM Approaches
Figure 2 for Generative AI Text Classification using Ensemble LLM Approaches
Figure 3 for Generative AI Text Classification using Ensemble LLM Approaches
Figure 4 for Generative AI Text Classification using Ensemble LLM Approaches
Viaarxiv icon

A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention

Add code
Bookmark button
Alert button
Jun 06, 2023
Dhruv Nandakumar, Sathvik Murli, Ankur Khosla, Kevin Choi, Abdul Rahman, Drew Walsh, Scott Riede, Eric Dull, Edward Bowen

Figure 1 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 2 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 3 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 4 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Viaarxiv icon

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

Add code
Bookmark button
Alert button
Nov 06, 2022
Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

Figure 1 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 2 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 3 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 4 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Viaarxiv icon

Zero Day Threat Detection Using Metric Learning Autoencoders

Add code
Bookmark button
Alert button
Nov 01, 2022
Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha

Figure 1 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 2 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 3 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 4 for Zero Day Threat Detection Using Metric Learning Autoencoders
Viaarxiv icon