Benjamin Edwards

According to our database1, Benjamin Edwards authored at least 22 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2021
Assessing the Use of Optical Satellite Images to Detect Volcanic Impacts on Glacier Surface Morphology.
Remote. Sens., 2021

2019
Exploit Prediction Scoring System (EPSS).
CoRR, 2019

Risky Business: Assessing Security with External Measurements.
CoRR, 2019

Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Borders and gateways: measuring and analyzing national as chokepoints.
Proceedings of the Conference on Computing & Sustainable Societies, 2019

Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering.
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 (AAAI-19), 2019

2018
Adversarial Robustness Toolbox v0.2.2.
CoRR, 2018

Defending Against Model Stealing Attacks Using Deceptive Perturbations.
CoRR, 2018

2017
Strategic aspects of cyberattack, attribution, and blame.
Proc. Natl. Acad. Sci. USA, 2017

Supervised learning of sparse context reconstruction coefficients for data representation and classification.
Neural Comput. Appl., 2017

2016
Hype and heavy tails: A closer look at data breaches.
J. Cybersecur., 2016

2015
Representing data by sparse combination of contextual data points for classification.
CoRR, 2015

Representing Data by Sparse Combination of Contextual Data Points for Classification.
Proceedings of the Advances in Neural Networks - ISNN 2015, 2015

Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Panel Summary: The Future of Software Regulation.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2013
Application and analysis of multidimensional negative surveys in participatory sensing applications.
Pervasive Mob. Comput., 2013

2012
Internet Topology over Time
CoRR, 2012

Enhancing privacy in participatory sensing applications with multidimensional data.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Beyond the blacklist: modeling malware spread and the effect of interventions.
Proceedings of the New Security Paradigms Workshop, 2012

2011
Modeling Internet-Scale Policies for Cleaning up Malware.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011


  Loading...