Erick Galinkin

Orcid: 0000-0003-1268-9258

According to our database1, Erick Galinkin authored at least 19 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Behavioral Malware Detection using a Language Model Classifier Trained on sys2vec Embeddings.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

IoT Malware Data Augmentation using a Generative Adversarial Network.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2022
Review of The Geometry of Uncertainty by Fabio Cuzzolin.
SIGACT News, 2022

Simulation of Attacker Defender Interaction in a Noisy Security Game.
CoRR, 2022

Robustness and Usefulness in AI Explanation Methods.
CoRR, 2022

Towards a Responsible AI Development Lifecycle: Lessons From Information Security.
CoRR, 2022

Fast, lightweight IoT anomaly detection using feature pruning and PCA.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
Review of The Foundations of Computability Theory (Second Edition) by Borut Robič.
SIGACT News, 2021

Who's Afraid of Thomas Bayes?
CoRR, 2021

Winning the Ransomware Lottery: A Game-Theoretic Model for Mitigating Ransomware Attacks.
CoRR, 2021

The State of AI Ethics Report (January 2021).
CoRR, 2021

Information Security Games: A Survey.
CoRR, 2021

The Influence of Dropout on Membership Inference in Differentially Private Models.
CoRR, 2021

Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Winning the Ransomware Lottery - A Game-Theoretic Approach to Preventing Ransomware Attacks.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

2020
The State of AI Ethics Report (October 2020).
CoRR, 2020

Malicious Network Traffic Detection via Deep Learning: An Information Theoretic View.
CoRR, 2020

Green Lighting ML: Confidentiality, Integrity, and Availability of Machine Learning Systems in Deployment.
CoRR, 2020

The State of AI Ethics Report (June 2020).
CoRR, 2020


  Loading...