Alert button
Picture for Ethan M. Rudd

Ethan M. Rudd

Alert button

Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface

Add code
Bookmark button
Alert button
Jan 29, 2023
Chad Mello, Troy Weingart, Ethan M. Rudd

Figure 1 for Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface
Figure 2 for Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface
Figure 3 for Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface
Figure 4 for Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface
Viaarxiv icon

Transformers for End-to-End InfoSec Tasks: A Feasibility Study

Add code
Bookmark button
Alert button
Dec 05, 2022
Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully

Figure 1 for Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Figure 2 for Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Figure 3 for Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Figure 4 for Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Viaarxiv icon

Efficient Malware Analysis Using Metric Embeddings

Add code
Bookmark button
Alert button
Dec 05, 2022
Ethan M. Rudd, David Krisiloff, Scott Coull, Daniel Olszewski, Edward Raff, James Holt

Figure 1 for Efficient Malware Analysis Using Metric Embeddings
Figure 2 for Efficient Malware Analysis Using Metric Embeddings
Figure 3 for Efficient Malware Analysis Using Metric Embeddings
Figure 4 for Efficient Malware Analysis Using Metric Embeddings
Viaarxiv icon

Training Transformers for Information Security Tasks: A Case Study on Malicious URL Prediction

Add code
Bookmark button
Alert button
Nov 05, 2020
Ethan M. Rudd, Ahmed Abdallah

Figure 1 for Training Transformers for Information Security Tasks: A Case Study on Malicious URL Prediction
Figure 2 for Training Transformers for Information Security Tasks: A Case Study on Malicious URL Prediction
Figure 3 for Training Transformers for Information Security Tasks: A Case Study on Malicious URL Prediction
Viaarxiv icon

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Add code
Bookmark button
Alert button
May 16, 2019
Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin

Figure 1 for Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Figure 2 for Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Figure 3 for Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Figure 4 for Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Viaarxiv icon

SMART: Semantic Malware Attribute Relevance Tagging

Add code
Bookmark button
Alert button
May 15, 2019
Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin

Figure 1 for SMART: Semantic Malware Attribute Relevance Tagging
Figure 2 for SMART: Semantic Malware Attribute Relevance Tagging
Figure 3 for SMART: Semantic Malware Attribute Relevance Tagging
Figure 4 for SMART: Semantic Malware Attribute Relevance Tagging
Viaarxiv icon

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

Add code
Bookmark button
Alert button
Mar 13, 2019
Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang

Figure 1 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 2 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 3 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 4 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Viaarxiv icon

Principled Uncertainty Estimation for Deep Neural Networks

Add code
Bookmark button
Alert button
Oct 29, 2018
Richard Harang, Ethan M. Rudd

Figure 1 for Principled Uncertainty Estimation for Deep Neural Networks
Figure 2 for Principled Uncertainty Estimation for Deep Neural Networks
Figure 3 for Principled Uncertainty Estimation for Deep Neural Networks
Figure 4 for Principled Uncertainty Estimation for Deep Neural Networks
Viaarxiv icon

Facial Attributes: Accuracy and Adversarial Robustness

Add code
Bookmark button
Alert button
Apr 20, 2018
Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult

Figure 1 for Facial Attributes: Accuracy and Adversarial Robustness
Figure 2 for Facial Attributes: Accuracy and Adversarial Robustness
Figure 3 for Facial Attributes: Accuracy and Adversarial Robustness
Figure 4 for Facial Attributes: Accuracy and Adversarial Robustness
Viaarxiv icon

The Extreme Value Machine

Add code
Bookmark button
Alert button
May 21, 2017
Ethan M. Rudd, Lalit P. Jain, Walter J. Scheirer, Terrance E. Boult

Figure 1 for The Extreme Value Machine
Figure 2 for The Extreme Value Machine
Figure 3 for The Extreme Value Machine
Figure 4 for The Extreme Value Machine
Viaarxiv icon