The malicious use of artificial intelligence: Forecasting, prevention, and mitigation M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ... arXiv preprint arXiv:1802.07228, 2018 | 1484* | 2018 |
Learning to evade static PE machine learning malware models via reinforcement learning HS Anderson, A Kharkar, B Filar, D Evans, P Roth arXiv preprint arXiv:1801.08917, 2018 | 481* | 2018 |
DeepDGA: Adversarially-tuned domain generation and detection HS Anderson, J Woodbridge, B Filar Proceedings of the 2016 ACM workshop on artificial intelligence and security …, 2016 | 272 | 2016 |
Fraudsters used AI to mimic CEO’s voice in unusual cybercrime case C Stupp The Wall Street Journal 30 (08), 2019 | 267 | 2019 |
Classifying sequences of extreme length with constant memory applied to malware detection E Raff, W Fleshman, R Zak, HS Anderson, B Filar, M McLean Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9386-9394, 2021 | 68 | 2021 |
Automatic yara rule generation using biclustering E Raff, R Zak, G Lopez Munoz, W Fleming, HS Anderson, B Filar, ... Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security …, 2020 | 47 | 2020 |
The malicious use of artificial intelligence: forecasting, prevention, and mitigation authors are listed in order of contribution design direction S Bhatnagar, T Cotton, M Brundage, S Avin, J Clark, H Toner, P Eckersley, ... arXiv Prepr. arXiv1802 7228, 101, 2018 | 43* | 2018 |
RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware MA Ayub, A Siraj, B Filar, M Gupta International Journal of Information Security 23 (1), 533-556, 2024 | 22 | 2024 |
Getting passive aggressive about false positives: patching deployed malware detectors E Raff, B Filar, J Holt 2020 International Conference on Data Mining Workshops (ICDMW), 506-515, 2020 | 9 | 2020 |
Ask Me Anything: A Conversational Interface to Augment Information Security Workers. B Filar, R Seymour, M Park SOUPS, 2017 | 9 | 2017 |
Problemchild: Discovering anomalous patterns based on parent-child process relationships B Filar, D French arXiv preprint arXiv:2008.04676, 2020 | 5 | 2020 |
Artemis: an Intelligent Assistant for Cyber Defense B Filar July, 2020 | 2 | 2020 |
Malware bypass research using reinforcement learning B Filar | 2 | 2020 |
Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows Ransomware MA Ayub, A Siraj, B Filar, M Gupta 2023 IEEE 22nd International Conference on Trust, Security and Privacy in …, 2023 | 1 | 2023 |
Voice and textual interface for closed-domain environment A Filar, Robert Seymour, Richard, Kahan US Patent US20190088254A1, 2019 | | 2019 |
{TreeHuggr}: Discovering Where Tree-based Classifiers are Vulnerable to Adversarial Attack B Filar | | 2019 |
Learning to evade static PE machine learning malware models via reinforcement learning S Anderson Hyrum, K Anant, F Bobby, R Phil arXiv preprint arXiv:1801.08917, 2018 | | 2018 |