Author of the publication

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation.

, , , , and . USENIX Security Symposium, page 303-320. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Zero-Day Malware Testing Methodology Using Statistically Significant Time-Lagged Test Samples., and . CoRR, (2016)That Escalated Quickly: An ML Framework for Alert Prioritization., , , and . CoRR, (2023)Web Content Filtering Through Knowledge Distillation of Large Language Models., , and . CAMLIS, volume 3652 of CEUR Workshop Proceedings, page 1-21. CEUR-WS.org, (2023)eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys, and . (2017)cite arxiv:1702.08568.AI Total: Analyzing Security ML Models with Imperfect Data in Production., and . VizSec, page 10-14. IEEE, (2021)Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection., , and . CoRR, (2019)SMART: Semantic Malware Attribute Relevance Tagging., , , , and . CoRR, (2019)Learning from Context: A Multi-View Deep Learning Architecture for Malware Detection., , and . SP (Workshops), page 1-7. IEEE, (2020)Evaluating the Impact of Programming Language Features on the Performance of Parallel Applications on Cluster Architectures., , , , , , , , and . LCPC, volume 2958 of Lecture Notes in Computer Science, page 194-208. Springer, (2003)A hierarchical algorithm for fast debye summation with applications to small angle scattering., , , and . J. Comput. Chem., 33 (25): 1981-1996 (2012)