Picture for Mingyu Guo

Mingyu Guo

Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys

Add code
Mar 27, 2024
Figure 1 for Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys
Figure 2 for Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys
Figure 3 for Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys
Figure 4 for Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys
Viaarxiv icon

Symmetry-Breaking Augmentations for Ad Hoc Teamwork

Add code
Feb 15, 2024
Viaarxiv icon

Evolutionary Multi-Objective Diversity Optimization

Add code
Jan 15, 2024
Viaarxiv icon

Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs

Add code
Dec 28, 2023
Viaarxiv icon

METAL: Metamorphic Testing Framework for Analyzing Large-Language Model Qualities

Add code
Dec 11, 2023
Viaarxiv icon

Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems

Add code
Apr 08, 2023
Figure 1 for Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems
Figure 2 for Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems
Figure 3 for Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems
Figure 4 for Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems
Viaarxiv icon

Limited Query Graph Connectivity Test

Add code
Feb 25, 2023
Figure 1 for Limited Query Graph Connectivity Test
Figure 2 for Limited Query Graph Connectivity Test
Figure 3 for Limited Query Graph Connectivity Test
Figure 4 for Limited Query Graph Connectivity Test
Viaarxiv icon

Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection

Add code
Jul 27, 2022
Figure 1 for Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection
Figure 2 for Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection
Figure 3 for Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection
Figure 4 for Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection
Viaarxiv icon

Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation

Add code
Apr 08, 2022
Figure 1 for Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation
Figure 2 for Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation
Figure 3 for Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation
Figure 4 for Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation
Viaarxiv icon

Niching-based Evolutionary Diversity Optimization for the Traveling Salesperson Problem

Add code
Jan 25, 2022
Figure 1 for Niching-based Evolutionary Diversity Optimization for the Traveling Salesperson Problem
Figure 2 for Niching-based Evolutionary Diversity Optimization for the Traveling Salesperson Problem
Figure 3 for Niching-based Evolutionary Diversity Optimization for the Traveling Salesperson Problem
Figure 4 for Niching-based Evolutionary Diversity Optimization for the Traveling Salesperson Problem
Viaarxiv icon