Alert button
Picture for Kristen Moore

Kristen Moore

Alert button

An Investigation into Misuse of Java Security APIs by Large Language Models

Add code
Bookmark button
Alert button
Apr 04, 2024
Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar

Viaarxiv icon

Learning with Mixture of Prototypes for Out-of-Distribution Detection

Add code
Bookmark button
Alert button
Feb 05, 2024
Haodong Lu, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore

Figure 1 for Learning with Mixture of Prototypes for Out-of-Distribution Detection
Figure 2 for Learning with Mixture of Prototypes for Out-of-Distribution Detection
Figure 3 for Learning with Mixture of Prototypes for Out-of-Distribution Detection
Figure 4 for Learning with Mixture of Prototypes for Out-of-Distribution Detection
Viaarxiv icon

SoK: Facial Deepfake Detectors

Add code
Bookmark button
Alert button
Jan 09, 2024
Binh M. Le, Jiwon Kim, Shahroz Tariq, Kristen Moore, Alsharif Abuadbba, Simon S. Woo

Viaarxiv icon

Entropy Causal Graphs for Multivariate Time Series Anomaly Detection

Add code
Bookmark button
Alert button
Dec 15, 2023
Falih Gozi Febrinanto, Kristen Moore, Chandra Thapa, Mujie Liu, Vidya Saikrishna, Jiangang Ma, Feng Xia

Figure 1 for Entropy Causal Graphs for Multivariate Time Series Anomaly Detection
Figure 2 for Entropy Causal Graphs for Multivariate Time Series Anomaly Detection
Figure 3 for Entropy Causal Graphs for Multivariate Time Series Anomaly Detection
Figure 4 for Entropy Causal Graphs for Multivariate Time Series Anomaly Detection
Viaarxiv icon

DEFT: A new distance-based feature set for keystroke dynamics

Add code
Bookmark button
Alert button
Oct 06, 2023
Nuwan Kaluarachchi, Sevvandi Kandanaarachchi, Kristen Moore, Arathi Arakala

Figure 1 for DEFT: A new distance-based feature set for keystroke dynamics
Figure 2 for DEFT: A new distance-based feature set for keystroke dynamics
Figure 3 for DEFT: A new distance-based feature set for keystroke dynamics
Figure 4 for DEFT: A new distance-based feature set for keystroke dynamics
Viaarxiv icon

DualVAE: Controlling Colours of Generated and Real Images

Add code
Bookmark button
Alert button
May 30, 2023
Keerth Rathakumar, David Liebowitz, Christian Walder, Kristen Moore, Salil S. Kanhere

Figure 1 for DualVAE: Controlling Colours of Generated and Real Images
Figure 2 for DualVAE: Controlling Colours of Generated and Real Images
Figure 3 for DualVAE: Controlling Colours of Generated and Real Images
Figure 4 for DualVAE: Controlling Colours of Generated and Real Images
Viaarxiv icon

Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices

Add code
Bookmark button
Alert button
Mar 26, 2023
Shahroz Tariq, Alsharif Abuadbba, Kristen Moore

Figure 1 for Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices
Viaarxiv icon

Why Do Deepfake Detectors Fail?

Add code
Bookmark button
Alert button
Feb 25, 2023
Binh Le, Shahroz Tariq, Alsharif Abuadbba, Kristen Moore, Simon Woo

Figure 1 for Why Do Deepfake Detectors Fail?
Figure 2 for Why Do Deepfake Detectors Fail?
Figure 3 for Why Do Deepfake Detectors Fail?
Figure 4 for Why Do Deepfake Detectors Fail?
Viaarxiv icon

Tracking Dataset IP Use in Deep Neural Networks

Add code
Bookmark button
Alert button
Nov 24, 2022
Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal

Figure 1 for Tracking Dataset IP Use in Deep Neural Networks
Figure 2 for Tracking Dataset IP Use in Deep Neural Networks
Figure 3 for Tracking Dataset IP Use in Deep Neural Networks
Figure 4 for Tracking Dataset IP Use in Deep Neural Networks
Viaarxiv icon

Deception for Cyber Defence: Challenges and Opportunities

Add code
Bookmark button
Alert button
Aug 15, 2022
David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

Figure 1 for Deception for Cyber Defence: Challenges and Opportunities
Figure 2 for Deception for Cyber Defence: Challenges and Opportunities
Figure 3 for Deception for Cyber Defence: Challenges and Opportunities
Figure 4 for Deception for Cyber Defence: Challenges and Opportunities
Viaarxiv icon