Jack W. Stokes

According to our database1, Jack W. Stokes authored at least 27 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Latte: Large-Scale Lateral Movement Detection.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Robust Neural Malware Detection Models for Emulation Sequence Learning.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Neural Sequential Malware Detection with Parameters.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Hierarchical learning for automated malware classification.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Malware classification with LSTM and GRU language models and a character-level CNN.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
MART: Targeted attack detection on a compromised network.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Asking for a second opinion: Re-querying of noisy multi-class labels.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

MtNet: A Multi-Task Neural Network for Dynamic Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Malware classification with recurrent networks.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2013
Robust scareware image detection.
Proceedings of the IEEE International Conference on Acoustics, 2013

Large-scale malware classification using random projections and neural networks.
Proceedings of the IEEE International Conference on Acoustics, 2013

Detecting malicious landing pages in Malware Distribution Networks.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Scalable Telemetry Classification for Automated Malware Detection.
Proceedings of the Computer Security - ESORICS 2012, 2012

Using File Relationships in Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads.
Proceedings of the 20th International Conference on World Wide Web, 2011

2010
WebCop: Locating Neighborhoods of Malware on the Web.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2008
Classification of Automated Search Traffic.
Proceedings of the Weaving Services and People on the World Wide Web, 2008

Finding Similar Failures Using Callstack Similarity.
Proceedings of the Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, 2008

Nonlinear residual acoustic echo suppression for high levels of harmonic distortion.
Proceedings of the IEEE International Conference on Acoustics, 2008

A large-scale study of automated web search traffic.
Proceedings of the AIRWeb 2008, 2008

2007
Normalized Double-Talk Detection Based on Microphone and AEC Error Cross-Correlation.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Speaker Identification using a Microphone Array and a Joint HMM with Speech Spectrum and Angle of Arrival.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Acoustic Echo Cancelation for High Noise Environments.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Robust Rls with Round Robin Regularization Including Application to Stereo Acoustic Echo Cancellation.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2004
Acoustic echo cancellation with arbitrary playback sampling rate.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2001
Performance analysis of DS/CDMA systems with shadowing and flat fading.
Signal Processing, 2001


  Loading...