Search Results for author: Michael Weisman

Found 2 papers, 0 papers with code

Adversarial Examples in Constrained Domains

no code implementations2 Nov 2020 Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel

To assess how these algorithms perform, we evaluate them in constrained (e. g., network intrusion detection) and unconstrained (e. g., image recognition) domains.

Network Intrusion Detection

Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

no code implementations20 Jan 2017 Edwin Dauber, Aylin Caliskan, Richard Harang, Gregory Shearer, Michael Weisman, Frederica Nelson, Rachel Greenstadt

We show that we can also use these calibration curves in the case that we do not have linking information and thus are forced to classify individual samples directly.

Authorship Attribution

Cannot find the paper you are looking for? You can Submit a new open access paper.