Follow
Hyrum Anderson
Hyrum Anderson
Robust Intelligence
Verified email at robustintelligence.com - Homepage
Title
Cited by
Cited by
Year
The malicious use of artificial intelligence: Forecasting, prevention, and mitigation
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2018
9332018
Ember: an open dataset for training static pe malware machine learning models
HS Anderson, P Roth
arXiv preprint arXiv:1804.04637, 2018
4812018
Predicting domain generation algorithms with long short-term memory networks
J Woodbridge, HS Anderson, A Ahuja, D Grant
arXiv preprint arXiv:1611.00791, 2016
2772016
DeepDGA: Adversarially-tuned domain generation and detection
HS Anderson, J Woodbridge, B Filar
Proceedings of the 2016 ACM workshop on artificial intelligence and security …, 2016
2352016
Evading machine learning malware detection
HS Anderson, A Kharkar, B Filar, P Roth
black Hat 2017, 1-6, 2017
2172017
Learning to evade static pe machine learning malware models via reinforcement learning
HS Anderson, A Kharkar, B Filar, D Evans, P Roth
arXiv preprint arXiv:1801.08917, 2018
2142018
Poisoning web-scale training datasets is practical
N Carlini, M Jagielski, CA Choquette-Choo, D Paleka, W Pearce, ...
arXiv preprint arXiv:2302.10149, 2023
812023
Sparse imaging for fast electron microscopy
HS Anderson, J Ilic-Helms, B Rohrer, J Wheeler, K Larson
Computational Imaging XI 8657, 94-105, 2013
812013
Classifying with confidence from incomplete information
N Parrish, HS Anderson, MR Gupta, DY Hsiao
The Journal of Machine Learning Research 14 (1), 3561-3589, 2013
672013
Real-time 3D ladar imaging
P Cho, H Anderson, R Hatch, P Ramaswami
35th IEEE Applied Imagery and Pattern Recognition Workshop (AIPR'06), 5-5, 2006
662006
Sea ice mapping method for SeaWinds
HS Anderson, DG Long
IEEE Transactions on Geoscience and Remote Sensing 43 (3), 647-657, 2005
642005
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
G Apruzzese, HS Anderson, S Dambra, D Freeman, F Pierazzi, K Roundy
2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 339-364, 2023
502023
Classifying sequences of extreme length with constant memory applied to malware detection
E Raff, W Fleshman, R Zak, HS Anderson, B Filar, M McLean
Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9386-9394, 2021
462021
Automatic yara rule generation using biclustering
E Raff, R Zak, G Lopez Munoz, W Fleming, HS Anderson, B Filar, ...
Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security …, 2020
322020
The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv 2018
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2020
292020
Detecting homoglyph attacks with a siamese neural network
J Woodbridge, HS Anderson, A Ahuja, D Grant
2018 IEEE Security and Privacy Workshops (SPW), 22-28, 2018
262018
Early Time Series Classification with Reliability Guarantee.
HS Anderson, N Parrish, MR Gupta
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2012
242012
Tree of attacks: Jailbreaking black-box llms automatically
A Mehrotra, M Zampetakis, P Kassianik, B Nelson, H Anderson, Y Singer, ...
arXiv preprint arXiv:2312.02119, 2023
222023
Gamut expansion for video and image sets
H Anderson, E Garcia, M Gupta
14th International Conference of Image Analysis and Processing-Workshops …, 2007
202007
Kilograms: Very large n-grams for malware classification
E Raff, W Fleming, R Zak, H Anderson, B Finlayson, C Nicholas, ...
arXiv preprint arXiv:1908.00200, 2019
192019
The system can't perform the operation now. Try again later.
Articles 1–20