Alert button
Picture for Erik Hemberg

Erik Hemberg

Alert button

Evolving Code with A Large Language Model

Add code
Bookmark button
Alert button
Jan 13, 2024
Erik Hemberg, Stephen Moskal, Una-May O'Reilly

Viaarxiv icon

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

Add code
Bookmark button
Alert button
Oct 10, 2023
Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly

Viaarxiv icon

Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence

Add code
Bookmark button
Alert button
Aug 05, 2021
Erik Hemberg, Una-May O'Reilly

Figure 1 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 2 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 3 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 4 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Viaarxiv icon

Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks

Add code
Bookmark button
Alert button
Jun 25, 2021
Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

Figure 1 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 2 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 3 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 4 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Viaarxiv icon

Proceedings - AI/ML for Cybersecurity: Challenges, Solutions, and Novel Ideas at SIAM Data Mining 2021

Add code
Bookmark button
Alert button
Apr 27, 2021
John Emanuello, Kimberly Ferguson-Walter, Erik Hemberg, Una-May O Reilly, Ahmad Ridley, Dennis Ross, Diane Staheli, William Streilein

Viaarxiv icon

Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation

Add code
Bookmark button
Alert button
Apr 23, 2021
Prakruthi Karuna, Erik Hemberg, Una-May O'Reilly, Nick Rutar

Figure 1 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 2 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 3 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 4 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Viaarxiv icon

Analyzing the Components of Distributed Coevolutionary GAN Training

Add code
Bookmark button
Alert button
Aug 03, 2020
Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

Figure 1 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 2 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 3 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 4 for Analyzing the Components of Distributed Coevolutionary GAN Training
Viaarxiv icon

Parallel/distributed implementation of cellular training for generative adversarial neural networks

Add code
Bookmark button
Alert button
Apr 10, 2020
Emiliano Perez, Sergio Nesmachnow, Jamal Toutouh, Erik Hemberg, Una-May O'Reily

Figure 1 for Parallel/distributed implementation of cellular training for generative adversarial neural networks
Figure 2 for Parallel/distributed implementation of cellular training for generative adversarial neural networks
Figure 3 for Parallel/distributed implementation of cellular training for generative adversarial neural networks
Figure 4 for Parallel/distributed implementation of cellular training for generative adversarial neural networks
Viaarxiv icon

Data Dieting in GAN Training

Add code
Bookmark button
Alert button
Apr 07, 2020
Jamal Toutouh, Una-May O'Reilly, Erik Hemberg

Figure 1 for Data Dieting in GAN Training
Figure 2 for Data Dieting in GAN Training
Figure 3 for Data Dieting in GAN Training
Figure 4 for Data Dieting in GAN Training
Viaarxiv icon

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Add code
Bookmark button
Alert button
Apr 07, 2020
Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg

Figure 1 for Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Figure 2 for Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Figure 3 for Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Figure 4 for Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Viaarxiv icon