David Noever

According to our database1, David Noever authored at least 46 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PICS: Pipeline for Image Captioning and Search.
CoRR, 2024

Exploiting Alpha Transparency In Language And Vision-Based AI Systems.
CoRR, 2024

Transparency Attacks: How Imperceptible Image Layers Can Fool AI Perception.
CoRR, 2024

2023
Satellite Captioning: Large Language Models to Augment Labeling.
CoRR, 2023

Evaluating AI Vocational Skills Through Professional Testing.
CoRR, 2023

Acoustic Cybersecurity: Exploiting Voice-Activated Systems.
CoRR, 2023

Can Large Language Models Find And Fix Vulnerable Software?
CoRR, 2023

AI Text-to-Behavior: A Study In Steerability.
CoRR, 2023

Adversarial Agents For Attacking Inaudible Voice Activated Devices.
CoRR, 2023

NUANCE: Near Ultrasound Attack On Networked Communication Environments.
CoRR, 2023

Professional Certification Benchmark Dataset: The First 500 Jobs For Large Language Models.
CoRR, 2023

Grading Conversational Responses Of Chatbots.
CoRR, 2023

Numeracy from Literacy: Data Science as an Emergent Skill from Large Language Models.
CoRR, 2023

Chatbots in a Honeypot World.
CoRR, 2023

Chatbots As Fluent Polyglots: Revisiting Breakthrough Code Snippets.
CoRR, 2023

Chatbots as Problem Solvers: Playing Twenty Questions with Role Reversals.
CoRR, 2023

2022
Chatbots in a Botnet World.
CoRR, 2022

The Turing Deception.
CoRR, 2022

Soft Labels for Rapid Satellite Object Detection.
CoRR, 2022

Soft-labeling Strategies for Rapid Sub-Typing.
CoRR, 2022

Physical Systems Modeled Without Physical Laws.
CoRR, 2022

Enhancing Satellite Imagery using Deep Learning for the Sensor To Shooter Timeline.
CoRR, 2022

2021
Color Teams for Machine Learning Development.
CoRR, 2021

A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity.
CoRR, 2021

Puzzle Solving without Search or Human Knowledge: An Unnatural Language Approach.
CoRR, 2021

Overhead-MNIST: Machine Learning Baselines for Image Classification.
CoRR, 2021

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models.
CoRR, 2021

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models.
CoRR, 2021

Multilingual Augmenter: The Model Chooses.
CoRR, 2021

Fortify Machine Learning Production Systems: Detect and Classify Adversarial Attacks.
CoRR, 2021

Local Translation Services for Neglected Languages.
CoRR, 2021

2020
The Chess Transformer: Mastering Play using Generative Language Models.
CoRR, 2020

Systematic Attack Surface Reduction For Deployed Sentiment Analysis Models.
CoRR, 2020

The Enron Corpus: Where the Email Bodies are Buried?
CoRR, 2020

Discoverability in Satellite Imagery: A Good Sentence is Worth a Thousand Pictures.
CoRR, 2020

Black Box to White Box: Discover Model Characteristics Based on Strategic Probing.
Proceedings of the Third International Conference on Artificial Intelligence for Industries, 2020

The Go Transformer: Natural Language Modeling for Game Play.
Proceedings of the Third International Conference on Artificial Intelligence for Industries, 2020

2019
Training Set Affect on Super Resolution for Automated Target Recognition.
CoRR, 2019

Classifier Suites for Insider Threat Detection.
CoRR, 2019

2018
Data Strategies for Fleetwide Predictive Maintenance.
CoRR, 2018

Machine Learning Suites for Online Toxicity Detection.
CoRR, 2018

1999
Probabilistic and Other Neural Nets in Multi-Hole Probe Calibration and Flow Angularity Pattern Recognition.
Pattern Anal. Appl., 1999

Time and Size Limited Harvesting Models of Genetic Algorithm.
Proceedings of the International Conference on Artificial Neural Nets and Genetic Algorithms, 1999

1997
Excursion Set Mediated Evolutionary Strategy.
Proceedings of the International Conference on Artificial Neural Nets and Genetic Algorithms, 1997

Möbius Crossover and Excursion Set Mediated Genetic Algorithms.
Proceedings of the International Conference on Artificial Neural Nets and Genetic Algorithms, 1997

1995
Dominant Takeover Regimes for Genetic Algorithms.
Proceedings of the Artificial Neural Nets and Genetic Algorithms, 1995


  Loading...