1 code implementation • 3 Aug 2023 • Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin
In this work, we propose a new framework to enable the generation of adversarial inputs irrespective of the input type and task domain.
no code implementations • 21 Apr 2021 • Frederico Araujo, Dhilung Kirat, Xiaokui Shu, Teryl Taylor, Jiyong Jang
A formal cyber reasoning framework for automating the threat hunting process is described.
no code implementations • 14 Dec 2020 • Shiqi Wang, Kevin Eykholt, Taesung Lee, Jiyong Jang, Ian Molloy
On CIFAR10, a non-robust LeNet model has a 21. 63% error rate, while a model created using verifiable training and a L-infinity robustness criterion of 8/255, has an error rate of 57. 10%.
no code implementations • 15 Jul 2017 • Yuping Li, Jiyong Jang, Xin Hu, Xinming Ou
Clustering has been well studied for desktop malware analysis as an effective triage method.
Cryptography and Security