Alert button
Picture for Hyrum S. Anderson

Hyrum S. Anderson

Alert button

Machine Learning Model Attribution Challenge

Add code
Bookmark button
Alert button
Feb 17, 2023
Elizabeth Merkhofer, Deepesh Chaudhari, Hyrum S. Anderson, Keith Manville, Lily Wong, João Gante

Figure 1 for Machine Learning Model Attribution Challenge
Figure 2 for Machine Learning Model Attribution Challenge
Figure 3 for Machine Learning Model Attribution Challenge
Figure 4 for Machine Learning Model Attribution Challenge
Viaarxiv icon

"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice

Add code
Bookmark button
Alert button
Dec 29, 2022
Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, Kevin A. Roundy

Figure 1 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 2 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 3 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Figure 4 for "Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice
Viaarxiv icon

Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection

Add code
Bookmark button
Alert button
Dec 17, 2020
Edward Raff, William Fleshman, Richard Zak, Hyrum S. Anderson, Bobby Filar, Mark McLean

Figure 1 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 2 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 3 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 4 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Viaarxiv icon

Automatic Yara Rule Generation Using Biclustering

Add code
Bookmark button
Alert button
Sep 06, 2020
Edward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt

Figure 1 for Automatic Yara Rule Generation Using Biclustering
Figure 2 for Automatic Yara Rule Generation Using Biclustering
Figure 3 for Automatic Yara Rule Generation Using Biclustering
Figure 4 for Automatic Yara Rule Generation Using Biclustering
Viaarxiv icon

Predicting Domain Generation Algorithms with Long Short-Term Memory Networks

Add code
Bookmark button
Alert button
Nov 02, 2016
Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, Daniel Grant

Figure 1 for Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Figure 2 for Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Figure 3 for Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Figure 4 for Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Viaarxiv icon

DeepDGA: Adversarially-Tuned Domain Generation and Detection

Add code
Bookmark button
Alert button
Oct 06, 2016
Hyrum S. Anderson, Jonathan Woodbridge, Bobby Filar

Figure 1 for DeepDGA: Adversarially-Tuned Domain Generation and Detection
Figure 2 for DeepDGA: Adversarially-Tuned Domain Generation and Detection
Figure 3 for DeepDGA: Adversarially-Tuned Domain Generation and Detection
Figure 4 for DeepDGA: Adversarially-Tuned Domain Generation and Detection
Viaarxiv icon