Automated vulnerability detection in source code using deep representation learning R Russell, L Kim, L Hamilton, T Lazovich, J Harer, O Ozdemir, ... 2018 17th IEEE international conference on machine learning and applications …, 2018 | 677 | 2018 |
Automated software vulnerability detection with machine learning JA Harer, LY Kim, RL Russell, O Ozdemir, LR Kosta, A Rangamani, ... arXiv preprint arXiv:1803.04497, 2018 | 220 | 2018 |
Learning to repair software vulnerabilities with generative adversarial networks J Harer, O Ozdemir, T Lazovich, C Reale, R Russell, L Kim Advances in neural information processing systems 31, 2018 | 91 | 2018 |
Tree-transformer: A transformer-based method for correction of tree-structured data J Harer, C Reale, P Chin arXiv preprint arXiv:1908.00449, 2019 | 49 | 2019 |
Deep learning-based classification and anomaly detection of side-channel signals X Wang, Q Zhou, J Harer, G Brown, S Qiu, Z Dou, J Wang, A Hinton, ... Cyber Sensing 2018 10630, 37-44, 2018 | 46 | 2018 |
Countering physical eavesdropper evasion with adversarial training KW McClintick, J Harer, B Flowers, WC Headley, AM Wyglinski IEEE Open Journal of the Communications Society 3, 1820-1833, 2022 | 13 | 2022 |
Predicting local field potentials with recurrent neural networks L Kim, J Harer, A Rangamani, J Moran, PD Parks, A Widge, E Eskandar, ... 2016 38th Annual International Conference of the IEEE Engineering in …, 2016 | 9 | 2016 |
A mathematical analysis of network controllability through driver nodes SP Chin, J Cohen, A Albin, M Hayvanovych, E Reilly, G Brown, J Harer IEEE Transactions on Computational Social Systems 4 (2), 40-51, 2017 | 8 | 2017 |
Nodedrop: A method for finding sufficient network architecture size L Jensen, J Harer, S Chin 2020 International Joint Conference on Neural Networks (IJCNN), 1-9, 2020 | 7 | 2020 |
Automated vulnerability detection in source code using deep representation learning. CoRR abs/1807.04320 (2018) RL Russell, LY Kim, LH Hamilton, T Lazovich, JA Harer, O Ozdemir, ... arXiv preprint arXiv:1807.04320, 2018 | 7 | 2018 |
Automated software vulnerability detection with machine learning. arXiv 2018 JA Harer, LY Kim, RL Russell, O Ozdemir, LR Kosta, A Rangamani, ... arXiv preprint arXiv:1803.04497, 0 | 7 | |
Automated software vulnerability detection with machine learning.(2018) JA Harer, LY Kim, RL Russell, O Ozdemir, LR Kosta, A Rangamani, ... arXiv preprint cs.SE/1803.04497, 2018 | 6 | 2018 |
Tomo," JA Harer, LY Kim, RL Russell, O Ozdemir, LR Kosta, A Rangamani, ... Automated software vulnerability detection with machine learning," arXiv 55, 2018 | 3 | 2018 |
Deep learning for minimal-context block tracking through side-channel analysis L Jensen, G Brown, X Wang, J Harer, S Chin ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019 | 2 | 2019 |
Automated repair of bugs and security vulnerabilities in software J Harer, T Lazovich, R Russell, O Ozdemir, L Kim US Patent 10,866,877, 2020 | 1 | 2020 |
Improved neural machine translation systems for low resource correction tasks J Harer Boston University, 2019 | 1 | 2019 |
Modeling local field potentials with recurrent neural networks A Rangamani, J Harer, A Sinha, A Widge, E Eskandar, D Dougherty, ... networks 77, 4, 2015 | 1 | 2015 |
NodeDrop: A Condition for Reducing Network Size without Effect on Output L Jensen, J Harer, S Chin arXiv preprint arXiv:1906.01026, 2019 | | 2019 |
Learning to Repair Software Vulnerabilities with Generative Adversarial Networks-Supplementary Material JA Harer, O Ozdemir, T Lazovich, CP Reale, RL Russell, LY Kim, P Chin | | |
Artificial Intelligence for Physical Rehabilitation J Harer, SJ Lee, S Rajagopal, F Koc | | |