关注
Erick Galinkin
标题
引用次数
引用次数
年份
Winning the ransomware lottery: A game-theoretic approach to preventing ransomware attacks
E Galinkin
International Conference on Decision and Game Theory for Security, 195-207, 2021
162021
Fast, lightweight IoT anomaly detection using feature pruning and PCA
J Carter, S Mancoridis, E Galinkin
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, 133-138, 2022
122022
The influence of dropout on membership inference in differentially private models
E Galinkin
arXiv preprint arXiv:2103.09008, 2021
72021
Towards a responsible AI development lifecycle: Lessons from information security
E Galinkin
arXiv preprint arXiv:2203.02958, 2022
62022
Evaluating attacker risk behavior in an internet of things ecosystem
E Galinkin, J Carter, S Mancoridis
International Conference on Decision and Game Theory for Security, 354-364, 2021
52021
The state of AI ethics report (June 2020)
A Gupta, C Lanteigne, V Heath, MB Ganapini, E Galinkin, A Cohen, ...
arXiv preprint arXiv:2006.14662, 2020
52020
AEGIS: Online Adaptive AI Content Safety Moderation with Ensemble of LLM Experts
S Ghosh, P Varshney, E Galinkin, C Parisien
arXiv preprint arXiv:2404.05993, 2024
42024
Attack on critical infrastructure leverages template injection
S Baird, E Carter, E Galinkin, C Marczewski, J Marshall
Talos Intelligence Blog. http://web. archive. org/web/20170718181549/http …, 2017
42017
garak: A Framework for Security Probing Large Language Models
L Derczynski, E Galinkin, J Martin, S Majumdar, N Inie
arXiv preprint arXiv:2406.11036, 2024
32024
The State of AI Ethics Report (October 2020)
A Gupta, A Royer, V Heath, C Wright, C Lanteigne, A Cohen, ...
arXiv preprint arXiv:2011.02787, 2020
32020
Green lighting ML: confidentiality, integrity, and availability of machine learning systems in deployment
A Gupta, E Galinkin
arXiv preprint arXiv:2007.04693, 2020
32020
The Future of Cyber Attacks and Defense is in the Cloud
E Galinkin, J Hwong, A Singh, C Estep, A Vamshi, R Canzanese
IEEE 14th International Conference on Malicious and Unwanted Software, 2019
32019
Robustness and usefulness in AI explanation methods
E Galinkin
arXiv preprint arXiv:2203.03729, 2022
22022
What is the Shape of an Executable?
E Galinkin
Conference on Applied Machine Learning in Information Security, 2019
22019
Simulation of Attacker Defender Interaction in a Noisy Security Game
E Galinkin, E Pountourakis, J Carter, S Mancoridis
arXiv preprint arXiv:2212.04281, 2022
12022
The State of AI Ethics Report (January 2021)
A Gupta, A Royer, C Wright, FA Khan, V Heath, E Galinkin, R Khurana, ...
arXiv preprint arXiv:2105.09059, 2021
12021
Information security games: a survey
E Galinkin
arXiv preprint arXiv:2103.12520, 2021
12021
Malicious Network Traffic Detection via Deep Learning: An Information Theoretic View
E Galinkin
arXiv preprint arXiv:2009.07753, 2020
12020
The Cost of Cybersecurity Exposures: Evidence from a Direct Measure of Firm Network Vulnerabilities
T Liu, C Makridis, E Galinkin
Available at SSRN 3746589, 2023
2023
IoT Malware Data Augmentation using a Generative Adversarial Network
J Carter, P Protopapas, S Mancoridis, E Galinkin
56th Hawaii International Conference on System Sciences, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20