Edward Bowen

According to our database1, Edward Bowen authored at least 26 papers between 2022 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning.
CoRR, 2024

Discovering Command and Control Channels Using Reinforcement Learning.
CoRR, 2024

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

2023
Procedure code overutilization detection from healthcare claims using unsupervised deep learning methods.
BMC Medical Informatics Decis. Mak., December, 2023

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning.
CoRR, 2023

A Simple yet Efficient Ensemble Approach for AI-generated Text Detection.
CoRR, 2023

A Closer Look at Bearing Fault Classification Approaches.
CoRR, 2023

Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach.
CoRR, 2023

A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention.
CoRR, 2023

Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks.
CoRR, 2023

An Ensemble-Based Approach for Generative Language Model Attribution.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Generative AI Text Classification using Ensemble LLM Approaches.
Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2023) co-located with the Conference of the Spanish Society for Natural Language Processing (SEPLN 2023), 2023

Graph Representational Learning for Internal Audit.
Proceedings of the ISWC 2023 Posters, 2023

Anomaly Detection via Federated Learning.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Identification of Providers with Similar Risk Profiles in Healthcare Claims Using Graphs.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

A Novel Approach to User Agent String Parsing for Vulnerability Analysis Using Multi-Headed Attention.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023

How far is too far? Identifying suspicious travel patterns in healthcare claims using machine learning.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Embedding Representations of Diagnosis Codes for Outlier Payment Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Enhancing Exfiltration Path Analysis Using Reinforcement Learning.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

2022
Anomaly Detection via Federated Learning.
CoRR, 2022

Lateral Movement Detection Using User Behavioral Analysis.
CoRR, 2022

Do-AIQ: A Design-of-Experiment Approach to Quality Evaluation of AI Mislabel Detection Algorithm.
CoRR, 2022

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry.
CoRR, 2022

Zero Day Threat Detection Using Metric Learning Autoencoders.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022


  Loading...