Paul Montague

Orcid: 0000-0001-9461-7471

According to our database1, Paul Montague authored at least 42 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bayesian Learned Models Can Detect Adversarial Malware For Free.
CoRR, 2024

Removing Undesirable Concepts in Text-to-Image Generative Models with Learnable Prompts.
CoRR, 2024

Adversarial Robustness on Image Classification With k-Means.
IEEE Access, 2024

BAIT: Benchmarking (Embedding) Architectures for Interactive Theorem-Proving.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
It's Simplex! Disaggregating Measures to Improve Certified Robustness.
CoRR, 2023

Generating Adversarial Examples with Task Oriented Multi-Objective Optimization.
CoRR, 2023

Exploiting Certified Defences to Attack Randomised Smoothing.
CoRR, 2023

Leveraging Generative Models for Combating Adversarial Attacks on Tabular Datasets.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Enhancing the Antidote: Improved Pointwise Certifications against Poisoning Attacks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation.
IEEE Trans. Dependable Secur. Comput., 2022

Transferable Graph Backdoor Attack.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

On Global-view Based Defense via Adversarial Attack and Defense Risk Guaranteed Bounds.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases.
IEEE Trans. Dependable Secur. Comput., 2021

Understanding and Achieving Efficient Robustness with Adversarial Contrastive Learning.
CoRR, 2021

Information-theoretic Source Code Vulnerability Highlighting.
Proceedings of the International Joint Conference on Neural Networks, 2021

Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Towards Understanding Pixel Vulnerability under Adversarial Attacks for Images.
CoRR, 2020

Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Deep Cost-Sensitive Kernel Machine for Binary Software Vulnerability Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Code Action Network for Binary Function Scope Identification.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Code Pointer Network for Binary Function Scope Identification.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Improving Adversarial Robustness by Enforcing Local and Global Compactness.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions.
CoRR, 2019

Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019

Deep Domain Adaptation for Vulnerable Code Function Identification.
Proceedings of the International Joint Conference on Neural Networks, 2019

Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection.
Proceedings of the 7th International Conference on Learning Representations, 2019

Towards Attention Based Vulnerability Discovery Using Source Code Representation.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Text and Time Series, 2019

2018
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Ind. Informatics, 2018

Reinforcement Learning for Autonomous Defence in Software-Defined Networking.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

2017
An efficient semi-supervised SVM for anomaly detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2012
A Context-Based Integrity Framework.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2005
Translation of Rights Expressions.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

GBD Threshold Cryptography with an Application to RSA Key Recovery.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.
Int. J. Inf. Sec., 2004

2003
A Password-Based Authenticator: Security Proof and Applications.
Proceedings of the Progress in Cryptology, 2003

The Security of Fixed versus Random Elliptic Curves in Cryptography.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Elliptic Curve Based Password Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

1999
An elliptic curve authenticated key exchange based approach to key infrastructure.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999


  Loading...