Creating xBD: A dataset for assessing building damage from satellite imagery R Gupta, B Goodman, N Patel, R Hosfelt, S Sajeev, E Heim, J Doshi, ... Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 404 | 2019 |
Malware makeover: Breaking ml-based static analysis by modifying executable bytes K Lucas, M Sharif, L Bauer, MK Reiter, S Shintre Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 77* | 2021 |
Adversarial training for {Raw-Binary} malware classifiers K Lucas, S Pai, W Lin, L Bauer, MK Reiter, M Sharif 32nd USENIX Security Symposium (USENIX Security 23), 1163-1180, 2023 | 19 | 2023 |
RS-Del: Edit distance robustness certificates for sequence classifiers via randomized deletion Z Huang, NG Marchant, K Lucas, L Bauer, O Ohrimenko, B Rubinstein Advances in Neural Information Processing Systems 36, 18676-18711, 2023 | 13 | 2023 |
Any-Play: An Intrinsic Augmentation for Zero-Shot Coordination K Lucas, RE Allen Proceedings of the 21st International Conference on Autonomous Agents and …, 2022 | 10 | 2022 |
Perspectives from a comprehensive evaluation of reconstruction-based anomaly detection in industrial control systems C Fung, S Srinarasi, K Lucas, HB Phee, L Bauer European Symposium on Research in Computer Security, 493-513, 2022 | 8 | 2022 |
Randomness in ml defenses helps persistent attackers and hinders evaluators K Lucas, M Jagielski, F Tramèr, L Bauer, N Carlini arXiv preprint arXiv:2302.13464, 2023 | 5 | 2023 |
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks W Lin, K Lucas, L Bauer, MK Reiter, M Sharif arXiv preprint arXiv:2112.14232, 2021 | 3 | 2021 |
Group-based Robustness: A General Framework for Customized Robustness in the Real World W Lin, K Lucas, N Eyal, L Bauer, MK Reiter, M Sharif arXiv preprint arXiv:2306.16614, 2023 | 1 | 2023 |
Certified robustness of learning-based static malware detectors Z Huang, NG Marchant, K Lucas, L Bauer, O Ohrimenko, BI Rubinstein CoRR, 2023 | 1 | 2023 |
Deceiving ML-Based Friend-or-Foe Identification for Executables K Lucas, M Sharif, L Bauer, MK Reiter, S Shintre Cyber Deception: Techniques, Strategies, and Human Aspects, 217-249, 2022 | | 2022 |
Check for S Horimoto, K Lucas, L Bauer Detection of Intrusions and Malware, and Vulnerability Assessment: 21st …, 0 | | |
Subspace Grid-sweep: ML Defense Evaluation via Constrained Brute-force Search K Lucas, M Jagielski, F Tramèr, L Bauer, N Carlini | | |