Winning the ransomware lottery: A game-theoretic approach to preventing ransomware attacks E Galinkin International Conference on Decision and Game Theory for Security, 195-207, 2021 | 16 | 2021 |
Fast, lightweight IoT anomaly detection using feature pruning and PCA J Carter, S Mancoridis, E Galinkin Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, 133-138, 2022 | 12 | 2022 |
The influence of dropout on membership inference in differentially private models E Galinkin arXiv preprint arXiv:2103.09008, 2021 | 7 | 2021 |
Towards a responsible AI development lifecycle: Lessons from information security E Galinkin arXiv preprint arXiv:2203.02958, 2022 | 6 | 2022 |
Evaluating attacker risk behavior in an internet of things ecosystem E Galinkin, J Carter, S Mancoridis International Conference on Decision and Game Theory for Security, 354-364, 2021 | 5 | 2021 |
The state of AI ethics report (June 2020) A Gupta, C Lanteigne, V Heath, MB Ganapini, E Galinkin, A Cohen, ... arXiv preprint arXiv:2006.14662, 2020 | 5 | 2020 |
AEGIS: Online Adaptive AI Content Safety Moderation with Ensemble of LLM Experts S Ghosh, P Varshney, E Galinkin, C Parisien arXiv preprint arXiv:2404.05993, 2024 | 4 | 2024 |
Attack on critical infrastructure leverages template injection S Baird, E Carter, E Galinkin, C Marczewski, J Marshall Talos Intelligence Blog. http://web. archive. org/web/20170718181549/http …, 2017 | 4 | 2017 |
garak: A Framework for Security Probing Large Language Models L Derczynski, E Galinkin, J Martin, S Majumdar, N Inie arXiv preprint arXiv:2406.11036, 2024 | 3 | 2024 |
The State of AI Ethics Report (October 2020) A Gupta, A Royer, V Heath, C Wright, C Lanteigne, A Cohen, ... arXiv preprint arXiv:2011.02787, 2020 | 3 | 2020 |
Green lighting ML: confidentiality, integrity, and availability of machine learning systems in deployment A Gupta, E Galinkin arXiv preprint arXiv:2007.04693, 2020 | 3 | 2020 |
The Future of Cyber Attacks and Defense is in the Cloud E Galinkin, J Hwong, A Singh, C Estep, A Vamshi, R Canzanese IEEE 14th International Conference on Malicious and Unwanted Software, 2019 | 3 | 2019 |
Robustness and usefulness in AI explanation methods E Galinkin arXiv preprint arXiv:2203.03729, 2022 | 2 | 2022 |
What is the Shape of an Executable? E Galinkin Conference on Applied Machine Learning in Information Security, 2019 | 2 | 2019 |
Simulation of Attacker Defender Interaction in a Noisy Security Game E Galinkin, E Pountourakis, J Carter, S Mancoridis arXiv preprint arXiv:2212.04281, 2022 | 1 | 2022 |
The State of AI Ethics Report (January 2021) A Gupta, A Royer, C Wright, FA Khan, V Heath, E Galinkin, R Khurana, ... arXiv preprint arXiv:2105.09059, 2021 | 1 | 2021 |
Information security games: a survey E Galinkin arXiv preprint arXiv:2103.12520, 2021 | 1 | 2021 |
Malicious Network Traffic Detection via Deep Learning: An Information Theoretic View E Galinkin arXiv preprint arXiv:2009.07753, 2020 | 1 | 2020 |
The Cost of Cybersecurity Exposures: Evidence from a Direct Measure of Firm Network Vulnerabilities T Liu, C Makridis, E Galinkin Available at SSRN 3746589, 2023 | | 2023 |
IoT Malware Data Augmentation using a Generative Adversarial Network J Carter, P Protopapas, S Mancoridis, E Galinkin 56th Hawaii International Conference on System Sciences, 2023 | | 2023 |