Kristen Moore
Orcid: 0000-0002-9962-5080
According to our database1,
Kristen Moore
authored at least 45 papers
between 2021 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
ACM Comput. Surv., December, 2025
Towards Faithful Class-level Self-explainability in Graph Neural Networks by Subgraph Dependencies.
CoRR, August, 2025
Little By Little: Continual Learning via Self-Activated Sparse Mixture-of-Rank Adaptive Learning.
CoRR, June, 2025
From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs.
CoRR, June, 2025
CoRR, May, 2025
Continual Learning on CLIP via Incremental Prompt Tuning with Intrinsic Textual Anchors.
CoRR, May, 2025
Co-Evolutionary Defence of Active Directory Attack Graphs via GNN-Approximated Dynamic Programming.
CoRR, May, 2025
Unveiling the Black Box: A Multi-Layer Framework for Explaining Reinforcement Learning-Based Cyber Agents.
CoRR, May, 2025
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
CoRR, January, 2025
Vision Graph Non-Contrastive Learning for Audio Deepfake Detection with Limited Labels.
CoRR, January, 2025
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
Dataset, January, 2025
Proceedings of the Companion Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025
2024
Comput. Speech Lang., January, 2024
Adaptive Rank, Reduced Forgetting: Knowledge Retention in Continual Learning Vision-Language Models with Dynamic Rank-Selective LoRA.
CoRR, 2024
From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language Prompting.
CoRR, 2024
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking.
CoRR, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices.
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the 22nd International Conference of the Biometrics Special Interest Group, 2023
Proceedings of the Data Science and Machine Learning, 2023
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022
CoRR, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Data Mining - 20th Australasian Conference, AusDM 2022, Western Sydney, 2022
2021
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021