1 code implementation • 3 Dec 2023 • Matthew Lau, Ismaila Seck, Athanasios P Meliopoulos, Wenke Lee, Eugene Ndiaye
From its properties, we intuit that equality separation is suitable for anomaly detection.
no code implementations • 30 Jun 2021 • Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio
Although offensive AI has been discussed in the past, there is a need to analyze and understand the threat in the context of organizations.
1 code implementation • 24 Jul 2020 • Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran
Our game model has imperfect information as the players do not have information about the actions of the opponent.
Computer Science and Game Theory Cryptography and Security
no code implementations • 23 Apr 2020 • Yisroel Mirsky, Wenke Lee
Generative deep learning algorithms have progressed to a point where it is difficult to tell the difference between what is real and what is fake.
1 code implementation • 4 Feb 2020 • Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee
We outline the challenges of tailoring program analysis tools to interpreted languages and release our pipeline as a reference point for the community to build on and help in securing the software supply chain.
Cryptography and Security