Edward Bowen

Orcid: 0000-0003-3669-6444

According to our database1, Edward Bowen authored at least 45 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
AI Generated Text Detection Using Instruction Fine-tuned Large Language and Transformer-Based Models.
CoRR, July, 2025

AI-generated Text Detection: A Multifaceted Approach to Binary and Multiclass Classification.
CoRR, May, 2025

Fraud detection in healthcare claims using machine learning: A systematic review.
Artif. Intell. Medicine, 2025

MedCodER: A Generative AI Assistant for Medical Coding.
Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies, 2025

MentorPDM: Learning Data-Driven Curriculum for Multi-Modal Predictive Maintenance.
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.1, 2025

RADEP: A Resilient Adaptive Defense Framework Against Model Extraction Attacks.
Proceedings of the International Wireless Communications and Mobile Computing, 2025

Evaluating Query Efficiency and Accuracy of Transfer Learning-based Model Extraction Attack in Federated Learning.
Proceedings of the International Wireless Communications and Mobile Computing, 2025

Accuracy-Privacy Trade-off in the Mitigation of Membership Inference Attack in Federated Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2025

Privacy Drift: Evolving Privacy Concerns in Incremental Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2025

Deloitte (Drocks) at the Financial Misinformation Detection Challenge Task: Enhancing Misinformation Detection through Instruction-Tuned Models.
Proceedings of the 31st International Conference on Computational Linguistics, 2025

2024
Continual learning and its industrial applications: A selective review.
WIREs Data. Mining. Knowl. Discov., 2024

Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning.
CoRR, 2024

Discovering Command and Control Channels Using Reinforcement Learning.
CoRR, 2024

Domain Contextual and Relational Graph Model for Predictive Maintenance.
Proceedings of the International Conference on Machine Learning and Applications, 2024

Pre-train. Mixup and Fine-tune: A Simple Strategy to Handle Domain Shift.
Proceedings of the International Conference on Machine Learning and Applications, 2024

Toward Robust Generative AI Text Detection: Generalizable Neural Model.
Proceedings of the International Conference on Machine Learning and Applications, 2024

EvoluNet: Advancing Dynamic Non-IID Transfer Learning on Graphs.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Cross-Temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

Team Deloitte at PAN: A Novel Approach for Generative AI Text Detection.
Proceedings of the Working Notes of the Conference and Labs of the Evaluation Forum (CLEF 2024), 2024

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

Data Composition for Continual Learning in Application of Cyberattack Detection.
Proceedings of the Social Networks Analysis and Mining - 16th International Conference, 2024

2023
Procedure code overutilization detection from healthcare claims using unsupervised deep learning methods.
BMC Medical Informatics Decis. Mak., December, 2023

A Simple yet Efficient Ensemble Approach for AI-generated Text Detection.
CoRR, 2023

A Closer Look at Bearing Fault Classification Approaches.
CoRR, 2023

Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach.
CoRR, 2023

A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention.
CoRR, 2023

An Ensemble-Based Approach for Generative Language Model Attribution.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Generative AI Text Classification using Ensemble LLM Approaches.
Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2023) co-located with the Conference of the Spanish Society for Natural Language Processing (SEPLN 2023), 2023

Graph Representational Learning for Internal Audit.
Proceedings of the ISWC 2023 Posters, 2023

Anomaly Detection via Federated Learning.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Identification of Providers with Similar Risk Profiles in Healthcare Claims Using Graphs.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

A Novel Approach to User Agent String Parsing for Vulnerability Analysis Using Multi-Headed Attention.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023

How far is too far? Identifying suspicious travel patterns in healthcare claims using machine learning.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Embedding Representations of Diagnosis Codes for Outlier Payment Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Enhancing Exfiltration Path Analysis Using Reinforcement Learning.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

2022
Anomaly Detection via Federated Learning.
CoRR, 2022

Lateral Movement Detection Using User Behavioral Analysis.
CoRR, 2022

Do-AIQ: A Design-of-Experiment Approach to Quality Evaluation of AI Mislabel Detection Algorithm.
CoRR, 2022

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry.
CoRR, 2022

Zero Day Threat Detection Using Metric Learning Autoencoders.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022


  Loading...