Seguir
Ethan M. Rudd, PhD
Ethan M. Rudd, PhD
Dirección de correo verificada de google.com
Título
Citado por
Citado por
Año
The extreme value machine
EM Rudd, LP Jain, WJ Scheirer, TE Boult
IEEE transactions on pattern analysis and machine intelligence 40 (3), 762-768, 2017
3802017
Adversarial diversity and hard positive generation
A Rozsa, EM Rudd, TE Boult
Proceedings of the IEEE conference on computer vision and pattern …, 2016
3462016
Moon: A mixed objective optimization network for the recognition of facial attributes
EM Rudd, M Günther, TE Boult
Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The …, 2016
2622016
A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions
EM Rudd, A Rozsa, M Günther, TE Boult
IEEE Communications Surveys & Tutorials 19 (2), 1145-1172, 2016
2002016
SOREL-20M: A large scale benchmark dataset for malicious PE detection
R Harang, EM Rudd
arXiv preprint arXiv:2012.07634, 2020
1082020
Toward open-set face recognition
M Gunther, S Cruz, EM Rudd, TE Boult
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017
1002017
Facial attributes: Accuracy and adversarial robustness
A Rozsa, M Günther, EM Rudd, TE Boult
Pattern Recognition Letters 124, 100-108, 2019
712019
Are facial attributes adversarially robust?
A Rozsa, M Günther, EM Rudd, TE Boult
2016 23rd International Conference on Pattern Recognition (ICPR), 3121-3127, 2016
582016
Incremental open set intrusion recognition using extreme value machine
J Henrydoss, S Cruz, EM Rudd, M Gunther, TE Boult
2017 16th IEEE International Conference on Machine Learning and Applications …, 2017
512017
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
452018
Open set intrusion recognition for fine-grained attack categorization
S Cruz, C Coleman, EM Rudd, TE Boult
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
372017
{ALOHA}: Auxiliary Loss Optimization for Hypothesis Augmentation
EM Rudd, FN Ducau, C Wild, K Berlin, R Harang
28th USENIX Security Symposium (USENIX Security 19), 303-320, 2019
282019
Exemplar codes for facial attributes and tattoo recognition
MJ Wilber, E Rudd, B Heflin, YM Lui, TE Boult
IEEE Winter Conference on Applications of Computer Vision, 205-212, 2014
242014
Automated big text security classification
K Alzhrani, EM Rudd, TE Boult, CE Chow
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 103-108, 2016
232016
Paraph: presentation attack rejection by analyzing polarization hypotheses
EM Rudd, M Gunther, TE Boult
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2016
232016
Automatic malware description via attribute tagging and similarity embedding
FN Ducau, EM Rudd, TM Heppner, A Long, K Berlin
arXiv preprint arXiv:1905.06262, 2019
192019
Learning from context: A multi-view deep learning architecture for malware detection
A Kyadige, EM Rudd, K Berlin
2020 IEEE Security and Privacy Workshops (SPW), 1-7, 2020
172020
Automated us diplomatic cables security classification: Topic model pruning vs. classification based on clusters
K Alzhrani, EM Rudd, CE Chow, TE Boult
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
172017
Automated big security text pruning and classification
K Alzhrani, EM Rudd, CE Chow, TE Boult
2016 IEEE International Conference on Big Data (Big Data), 3629-3637, 2016
172016
Learning from context: Exploiting and interpreting file path information for better malware detection
A Kyadige, EM Rudd, K Berlin
arXiv preprint arXiv:1905.06987, 2019
72019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20