EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionIsaiah J. KingXiaokui Shuet al.2023RAID 2023
URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin EykholtTaesung Leeet al.2023USENIX Security 2023
Matching Pairs: Attributing Fine-Tuned Models to their Pre-Trained Large Language ModelsMyles FoleyAmbrish Rawatet al.2023ACL 2023
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of the Final ModelNathalie Baracaldo AngelKevin Eykholtet al.2022NeurIPS 2022
Full-Stack Information Extraction System for Cybersecurity IntelligenceYoungja ParkTaesung Lee2022EMNLP 2022
Backdoor smoothing: Demystifying backdoor attacks on deep neural networksKathrin GrosseTaesung Leeet al.2022Computers and Security
Adaptive Verifiable Training Using Pairwise Class SimilarityShiqi WangKevin Eykholtet al.2021AAAI 2021
Supervising unsupervised open information extraction modelsArpita RoyYoungja Parket al.2019EMNLP-IJCNLP 2019
AdvIT: Adversarial frames identifier based on temporal consistency in videosChaowei XiaoRuizhi Denget al.2019ICCV 2019