Ethan M. Rudd

Orcid: 0000-0001-8831-5514

According to our database1, Ethan M. Rudd authored at least 27 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient Malware Analysis Using Metric Embeddings.
CoRR, 2022

Transformers for End-to-End InfoSec Tasks: A Feasibility Study.
Proceedings of the WoRMA@AsiaCCS 2022: Proceedings of the 1st Workshop on Robust Malware Analysis, 2022

Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Efficient Malware Analysis Using Metric Embeddings.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

2020
SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection.
CoRR, 2020

Training Transformers for Information Security Tasks: A Case Study on Malicious URL Prediction.
CoRR, 2020

Learning from Context: A Multi-View Deep Learning Architecture for Malware Detection.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

2019
Facial attributes: Accuracy and adversarial robustness.
Pattern Recognit. Lett., 2019

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection.
CoRR, 2019

SMART: Semantic Malware Attribute Relevance Tagging.
CoRR, 2019

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
The Extreme Value Machine.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

Principled Uncertainty Estimation for Deep Neural Networks.
CoRR, 2018

MEADE: Towards a Malicious Email Attachment Detection Engine.
CoRR, 2018

2017
Open Set Intrusion Recognition for Fine-Grained Attack Categorization.
CoRR, 2017

Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters.
CoRR, 2017

A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions.
IEEE Commun. Surv. Tutorials, 2017

Incremental Open Set Intrusion Recognition Using Extreme Value Machine.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Toward Open-Set Face Recognition.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Automated big text security classification.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Are facial attributes adversarially robust?
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes.
Proceedings of the Computer Vision - ECCV 2016, 2016

PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016

CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016

Adversarial Diversity and Hard Positive Generation.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016

Automated big security text pruning and classification.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2014
Exemplar codes for facial attributes and tattoo recognition.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2014


  Loading...