Search Results for author: Quan Le

Found 5 papers, 2 papers with code

A Robust Defense against Adversarial Attacks on Deep Learning-based Malware Detectors via (De)Randomized Smoothing

no code implementations23 Feb 2024 Daniel Gibert, Giulio Zizzo, Quan Le, Jordi Planes

Our findings reveal that the chunk-based smoothing classifiers exhibit greater resilience against adversarial malware examples generated with state-of-the-are evasion attacks, outperforming a non-smoothed classifier and a randomized smoothing-based classifier by a great margin.

Adversarial Robustness

American Stories: A Large-Scale Structured Text Dataset of Historical U.S. Newspapers

no code implementations NeurIPS 2023 Melissa Dell, Jacob Carlson, Tom Bryan, Emily Silcock, Abhishek Arora, Zejiang Shen, Luca D'Amico-Wong, Quan Le, Pablo Querubin, Leander Heldring

The resulting American Stories dataset provides high quality data that could be used for pre-training a large language model to achieve better understanding of historical English and historical world knowledge.

Language Modelling Large Language Model +3

Towards a Practical Defense against Adversarial Attacks on Deep Learning-based Malware Detectors via Randomized Smoothing

1 code implementation17 Aug 2023 Daniel Gibert, Giulio Zizzo, Quan Le

Malware detectors based on deep learning (DL) have been shown to be susceptible to malware examples that have been deliberately manipulated in order to evade detection, a. k. a.

Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events

no code implementations2 Dec 2020 Xiaoyu Du, Quan Le, Mark Scanlon

This is due to an ever-growing number of cases requiring digital forensic investigation coupled with the growing volume of data to be processed per case.

Deep learning at the shallow end: Malware classification for non-domain experts

1 code implementation22 Jul 2018 Quan Le, Oisín Boydell, Brian Mac Namee, Mark Scanlon

Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to extract patterns (signatures) and behaviors from malware, which are then used for identification.

Classification General Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.