Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ... AAAI Workshop on Artificial Intelligence Safety 1 (1), 2019 | 655 | 2019 |
Adversarial Robustness Toolbox v0.3.0 BE Maria-Irina Nicolae, Mathieu Sinn, Minh Ngoc Tran, Ambrish Rawat, Martin ... ArXiV, 2018 | 506* | 2018 |
Hype and heavy tails: A closer look at data breaches B Edwards, S Hofmeyr, S Forrest Journal of Cybersecurity 2 (1), 3-14, 2016 | 314 | 2016 |
Enhancing privacy in participatory sensing applications with multidimensional data MM Groat, B Edwards, J Horey, W He, S Forrest 2012 IEEE International Conference on Pervasive Computing and Communications …, 2012 | 96 | 2012 |
Defending against neural network model stealing attacks using deceptive perturbations T Lee, B Edwards, I Molloy, D Su 2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019 | 78 | 2019 |
Exploit prediction scoring system (epss) J Jacobs, S Romanosky, B Edwards, I Adjerid, M Roytman Digital Threats: Research and Practice 2 (3), 1-17, 2021 | 75 | 2021 |
Strategic aspects of cyberattack, attribution, and blame B Edwards, A Furnas, S Forrest, R Axelrod Proceedings of the National Academy of Sciences 114 (11), 2825-2830, 2017 | 73 | 2017 |
Advit: Adversarial frames identifier based on temporal consistency in videos C Xiao, R Deng, B Li, T Lee, B Edwards, J Yi, D Song, M Liu, I Molloy Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019 | 53 | 2019 |
Deep neural network hardening framework BJ Edwards, T Lee, IM Molloy, D Su US Patent 11,443,178, 2022 | 44 | 2022 |
Using gradients to detect backdoors in neural networks W Carvalho, B Chen, BJ Edwards, T Lee, IM Molloy, J Zhang US Patent 11,132,444, 2021 | 42 | 2021 |
Defending against model stealing attacks using deceptive perturbations T Lee, B Edwards, I Molloy, D Su arXiv preprint arXiv:1806.00054, 2018 | 39 | 2018 |
Modeling internet-scale policies for cleaning up malware S Hofmeyr, T Moore, S Forrest, B Edwards, G Stelle Economics of Information Security and Privacy III, 149-170, 2013 | 32 | 2013 |
Internet topology over time B Edwards, S Hofmeyr, G Stelle, S Forrest arXiv preprint arXiv:1202.3993, 2012 | 29 | 2012 |
Defending against machine learning model stealing attacks using deceptive perturbations T Lee, B Edwards, I Molloy, D Su arXiv preprint arXiv:1806.00054, 2018 | 28 | 2018 |
Application and analysis of multidimensional negative surveys in participatory sensing applications MM Groat, B Edwards, J Horey, W He, S Forrest Pervasive and Mobile Computing 9 (3), 372-391, 2013 | 25 | 2013 |
Beyond the blacklist: modeling malware spread and the effect of interventions B Edwards, T Moore, G Stelle, S Hofmeyr, S Forrest Proceedings of the 2012 New Security Paradigms Workshop, 53-66, 2012 | 25 | 2012 |
Adversarial learning of privacy protection layers for image recognition services BJ Edwards, H Huang, T Lee, IM Molloy, D Su US Patent 10,535,120, 2020 | 22 | 2020 |
Energy and time determine scaling in biological and computer designs M Moses, G Bezerra, B Edwards, J Brown, S Forrest Philosophical Transactions of the Royal Society B: Biological Sciences 371 …, 2016 | 22 | 2016 |
Borders and gateways: measuring and analyzing national as chokepoints KG Leyba, B Edwards, C Freeman, JR Crandall, S Forrest Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable …, 2019 | 17 | 2019 |
Analyzing and modeling longitudinal security data: Promise and pitfalls B Edwards, S Hofmeyr, S Forrest, M Van Eeten Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 17 | 2015 |