Segueix
Hyrum Anderson
Hyrum Anderson
Robust Intelligence
Correu electrònic verificat a robustintelligence.com - Pàgina d'inici
Títol
Citada per
Citada per
Any
The malicious use of artificial intelligence: Forecasting, prevention, and mitigation
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2018
12572018
Ember: an open dataset for training static pe malware machine learning models
HS Anderson, P Roth
arXiv preprint arXiv:1804.04637, 2018
6142018
Predicting domain generation algorithms with long short-term memory networks
J Woodbridge, HS Anderson, A Ahuja, D Grant
arXiv preprint arXiv:1611.00791, 2016
3082016
DeepDGA: Adversarially-tuned domain generation and detection
HS Anderson, J Woodbridge, B Filar
Proceedings of the 2016 ACM workshop on artificial intelligence and security …, 2016
2712016
Learning to evade static PE machine learning malware models via reinforcement learning
HS Anderson, A Kharkar, B Filar, D Evans, P Roth
arXiv preprint arXiv:1801.08917, 2018
2592018
Evading machine learning malware detection
HS Anderson, A Kharkar, B Filar, P Roth
black Hat 2017, 1-6, 2017
2522017
Poisoning web-scale training datasets is practical
N Carlini, M Jagielski, CA Choquette-Choo, D Paleka, W Pearce, ...
2024 IEEE Symposium on Security and Privacy (SP), 407-425, 2024
1962024
Tree of attacks: Jailbreaking black-box llms automatically
A Mehrotra, M Zampetakis, P Kassianik, B Nelson, H Anderson, Y Singer, ...
Advances in Neural Information Processing Systems 37, 61065-61105, 2025
1882025
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
G Apruzzese, HS Anderson, S Dambra, D Freeman, F Pierazzi, K Roundy
2023 IEEE conference on secure and trustworthy machine learning (SaTML), 339-364, 2023
1102023
The Malicious Use of Artificial Intelligence: Forecasting
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
Prevention, and Mitigation 20, 2018
992018
Sparse imaging for fast electron microscopy
HS Anderson, J Ilic-Helms, B Rohrer, J Wheeler, K Larson
Computational Imaging XI 8657, 94-105, 2013
832013
Classifying with confidence from incomplete information
N Parrish, HS Anderson, MR Gupta, DY Hsiao
The Journal of Machine Learning Research 14 (1), 3561-3589, 2013
722013
Real-time 3D ladar imaging
P Cho, H Anderson, R Hatch, P Ramaswami
35th IEEE Applied Imagery and Pattern Recognition Workshop (AIPR'06), 5-5, 2006
692006
Classifying sequences of extreme length with constant memory applied to malware detection
E Raff, W Fleshman, R Zak, HS Anderson, B Filar, M McLean
Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9386-9394, 2021
682021
Sea ice mapping method for SeaWinds
HS Anderson, DG Long
IEEE Transactions on Geoscience and Remote Sensing 43 (3), 647-657, 2005
672005
Adversarial machine learning: A taxonomy and terminology of attacks and mitigations
A Vassilev, A Oprea, A Fordyce, H Andersen
Apostol Vassilev, Alina Oprea, Alie Fordyce, Hyrum Andersen, 2024
632024
The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv 2018
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2020
512020
Automatic yara rule generation using biclustering
E Raff, R Zak, G Lopez Munoz, W Fleming, HS Anderson, B Filar, ...
Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security …, 2020
472020
Detecting homoglyph attacks with a siamese neural network
J Woodbridge, HS Anderson, A Ahuja, D Grant
2018 IEEE Security and Privacy Workshops (SPW), 22-28, 2018
422018
Adversarial machine learning
A Vassilev, A Oprea, A Fordyce, H Anderson
Gaithersburg, MD, 2024
292024
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20