Search Results for author: Jiyong Jang

Found 4 papers, 1 papers with code

URET: Universal Robustness Evaluation Toolkit (for Evasion)

1 code implementation3 Aug 2023 Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin

In this work, we propose a new framework to enable the generation of adversarial inputs irrespective of the input type and task domain.

Image Classification

Evidential Cyber Threat Hunting

no code implementations21 Apr 2021 Frederico Araujo, Dhilung Kirat, Xiaokui Shu, Teryl Taylor, Jiyong Jang

A formal cyber reasoning framework for automating the threat hunting process is described.

Adaptive Verifiable Training Using Pairwise Class Similarity

no code implementations14 Dec 2020 Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian Molloy

On CIFAR10, a non-robust LeNet model has a 21. 63% error rate, while a model created using verifiable training and a L-infinity robustness criterion of 8/255, has an error rate of 57. 10%.

Attribute

Android Malware Clustering through Malicious Payload Mining

no code implementations15 Jul 2017 Yuping Li, Jiyong Jang, Xin Hu, Xinming Ou

Clustering has been well studied for desktop malware analysis as an effective triage method.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.