Seguir
Benjamin Edwards
Benjamin Edwards
Bitsight
Dirección de correo verificada de bitsight.com
Título
Citado por
Citado por
Año
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
AAAI Workshop on Artificial Intelligence Safety 1 (1), 2019
7442019
Adversarial Robustness Toolbox v0.3.0
BE Maria-Irina Nicolae, Mathieu Sinn, Minh Ngoc Tran, Ambrish Rawat, Martin ...
ArXiV, 2018
543*2018
Hype and heavy tails: A closer look at data breaches
B Edwards, S Hofmeyr, S Forrest
Journal of Cybersecurity 2 (1), 3-14, 2016
3192016
Enhancing privacy in participatory sensing applications with multidimensional data
MM Groat, B Edwards, J Horey, W He, S Forrest
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
952012
Defending against neural network model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
872019
Exploit prediction scoring system (epss)
J Jacobs, S Romanosky, B Edwards, I Adjerid, M Roytman
Digital Threats: Research and Practice 2 (3), 1-17, 2021
852021
Strategic aspects of cyberattack, attribution, and blame
B Edwards, A Furnas, S Forrest, R Axelrod
Proceedings of the National Academy of Sciences 114 (11), 2825-2830, 2017
782017
Advit: Adversarial frames identifier based on temporal consistency in videos
C Xiao, R Deng, B Li, T Lee, B Edwards, J Yi, D Song, M Liu, I Molloy
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
592019
Deep neural network hardening framework
BJ Edwards, T Lee, IM Molloy, D Su
US Patent 11,443,178, 2022
502022
Using gradients to detect backdoors in neural networks
W Carvalho, B Chen, BJ Edwards, T Lee, IM Molloy, J Zhang
US Patent 11,132,444, 2021
482021
Defending against model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
422018
Defending against machine learning model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
342018
Internet topology over time
B Edwards, S Hofmeyr, G Stelle, S Forrest
arXiv preprint arXiv:1202.3993, 2012
302012
Adversarial learning of privacy protection layers for image recognition services
BJ Edwards, H Huang, T Lee, IM Molloy, D Su
US Patent 10,535,120, 2020
262020
Modeling internet-scale policies for cleaning up malware
S Hofmeyr, T Moore, S Forrest, B Edwards, G Stelle
Economics of Information Security and Privacy III, 149-170, 2013
262013
Application and analysis of multidimensional negative surveys in participatory sensing applications
MM Groat, B Edwards, J Horey, W He, S Forrest
Pervasive and Mobile Computing 9 (3), 372-391, 2013
252013
Beyond the blacklist: modeling malware spread and the effect of interventions
B Edwards, T Moore, G Stelle, S Hofmeyr, S Forrest
Proceedings of the 2012 New Security Paradigms Workshop, 53-66, 2012
252012
Energy and time determine scaling in biological and computer designs
M Moses, G Bezerra, B Edwards, J Brown, S Forrest
Philosophical Transactions of the Royal Society B: Biological Sciences 371 …, 2016
212016
Borders and gateways: measuring and analyzing national as chokepoints
KG Leyba, B Edwards, C Freeman, JR Crandall, S Forrest
Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable …, 2019
192019
Analyzing and modeling longitudinal security data: Promise and pitfalls
B Edwards, S Hofmeyr, S Forrest, M Van Eeten
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
172015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20