Alert button
Picture for Una-May O'Reilly

Una-May O'Reilly

Alert button

Evolving Code with A Large Language Model

Add code
Bookmark button
Alert button
Jan 13, 2024
Erik Hemberg, Stephen Moskal, Una-May O'Reilly

Viaarxiv icon

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

Add code
Bookmark button
Alert button
Oct 10, 2023
Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly

Viaarxiv icon

CLAWSAT: Towards Both Robust and Accurate Code Models

Add code
Bookmark button
Alert button
Nov 22, 2022
Jinghan Jia, Shashank Srikant, Tamara Mitrovska, Chuang Gan, Shiyu Chang, Sijia Liu, Una-May O'Reilly

Figure 1 for CLAWSAT: Towards Both Robust and Accurate Code Models
Figure 2 for CLAWSAT: Towards Both Robust and Accurate Code Models
Figure 3 for CLAWSAT: Towards Both Robust and Accurate Code Models
Figure 4 for CLAWSAT: Towards Both Robust and Accurate Code Models
Viaarxiv icon

Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence

Add code
Bookmark button
Alert button
Aug 05, 2021
Erik Hemberg, Una-May O'Reilly

Figure 1 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 2 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 3 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 4 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Viaarxiv icon

Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks

Add code
Bookmark button
Alert button
Jun 25, 2021
Jamal Toutouh, Erik Hemberg, Una-May O'Reilly

Figure 1 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 2 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 3 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 4 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Viaarxiv icon

Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation

Add code
Bookmark button
Alert button
Apr 23, 2021
Prakruthi Karuna, Erik Hemberg, Una-May O'Reilly, Nick Rutar

Figure 1 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 2 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 3 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 4 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Viaarxiv icon

Generating Adversarial Computer Programs using Optimized Obfuscations

Add code
Bookmark button
Alert button
Mar 18, 2021
Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shiyu Chang, Quanfu Fan, Gaoyuan Zhang, Una-May O'Reilly

Figure 1 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 2 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 3 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 4 for Generating Adversarial Computer Programs using Optimized Obfuscations
Viaarxiv icon

Signal Propagation in a Gradient-Based and Evolutionary Learning System

Add code
Bookmark button
Alert button
Feb 10, 2021
Jamal Toutouh, Una-May O'Reilly

Figure 1 for Signal Propagation in a Gradient-Based and Evolutionary Learning System
Figure 2 for Signal Propagation in a Gradient-Based and Evolutionary Learning System
Figure 3 for Signal Propagation in a Gradient-Based and Evolutionary Learning System
Figure 4 for Signal Propagation in a Gradient-Based and Evolutionary Learning System
Viaarxiv icon

STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code

Add code
Bookmark button
Alert button
Sep 28, 2020
Jacob M. Springer, Bryn Marie Reinstadler, Una-May O'Reilly

Figure 1 for STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code
Figure 2 for STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code
Figure 3 for STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code
Figure 4 for STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code
Viaarxiv icon