no code implementations • 5 Mar 2024 • Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Long Phan, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Adam Khoja, Zhenqi Zhao, Ariel Herbert-Voss, Cort B. Breuer, Andy Zou, Mantas Mazeika, Zifan Wang, Palash Oswal, Weiran Liu, Adam A. Hunt, Justin Tienken-Harder, Kevin Y. Shih, Kemper Talley, John Guan, Russell Kaplan, Ian Steneker, David Campbell, Brad Jokubaitis, Alex Levinson, Jean Wang, William Qian, Kallol Krishna Karmakar, Steven Basart, Stephen Fitz, Mindy Levine, Ponnurangam Kumaraguru, Uday Tupakula, Vijay Varadharajan, Yan Shoshitaishvili, Jimmy Ba, Kevin M. Esvelt, Alexandr Wang, Dan Hendrycks
To measure these risks of malicious use, government institutions and major AI labs are developing evaluations for hazardous capabilities in LLMs.
no code implementations • IEEE Congress on Evolutionary Computation (CEC) 2022 • Cornelius Paardekooper, Nasimul Noman, Raymond Chiong, Vijay Varadharajan
In recent years, deep Convolutional Neural Networks (CNNs) have shown great potential in malware classification.
Ranked #1 on Malware Classification on Microsoft Malware Classification Challenge (Accuracy metric)
no code implementations • 9 Jun 2021 • Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdran, Seyit Camtepe, Vijay Varadharajan, Surya Nepal
FedDICE integrates federated learning (FL), which is privacy-preserving learning, to SDN-oriented security architecture to enable collaborative learning, detection, and mitigation of ransomware attacks.
no code implementations • 11 Dec 2019 • Behzad Asadi, Vijay Varadharajan
Our final aim is to improve the robustness of the classifier by considering generated examples in rebuilding the classifier.
no code implementations • 9 Oct 2019 • Behzad Asadi, Vijay Varadharajan
This involves selecting a model that best compresses the training dataset for each class considering the MDL criterion.
no code implementations • 9 Mar 2018 • Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Shiping Chen
We show feature extraction, which is performed by tf -simhashing, is equivalent to the first layer of a particular neural network.
Cryptography and Security