no code implementations • 18 Oct 2018 • Octavian Suciu, Scott E. Coull, Jeffrey Johns
By training an existing model on a production-scale dataset, we show that some previous attacks are less effective than initially reported, while simultaneously highlighting architectural weaknesses that facilitate new attack strategies for malware classification.
no code implementations • NeurIPS 2010 • Jeffrey Johns, Christopher Painter-Wakefield, Ronald Parr
We demonstrate that warm starts, as well as the efficiency of LCP solvers, can speed up policy iteration.