default search action
Ethan M. Rudd
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Ethan M. Rudd, David Krisiloff, Scott E. Coull, Daniel Olszewski, Edward Raff, James Holt:
Efficient Malware Analysis Using Metric Embeddings. DTRAP 5(1): 4:1-4:20 (2024) - [e1]Lauren Deason, Sagar Samtani, Edward Raff, Ethan M. Rudd:
Proceedings of the Conference on Applied Machine Learning in Information Security, Arlington, Virginia, USA, October 19-20, 2023. CEUR Workshop Proceedings 3652, CEUR-WS.org 2024 [contents] - 2023
- [i22]Chad Mello, Troy Weingart, Ethan M. Rudd:
Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface. CoRR abs/2301.12322 (2023) - 2022
- [c15]Ethan M. Rudd, David Krisiloff, Daniel Olszewski, Edward Raff, James Holt:
Efficient Malware Analysis Using Metric Embeddings. CAMLIS 2022: 65-80 - [c14]Chad Mello, Troy Weingart, Ethan M. Rudd:
Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface. ICPR 2022: 1062-1068 - [c13]Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully:
Transformers for End-to-End InfoSec Tasks: A Feasibility Study. WoRMA@AsiaCCS 2022: 21-31 - [i21]Ethan M. Rudd, David Krisiloff, Scott E. Coull, Daniel Olszewski, Edward Raff, James Holt:
Efficient Malware Analysis Using Metric Embeddings. CoRR abs/2212.02663 (2022) - [i20]Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully:
Transformers for End-to-End InfoSec Tasks: A Feasibility Study. CoRR abs/2212.02666 (2022) - 2020
- [c12]Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin:
Learning from Context: A Multi-View Deep Learning Architecture for Malware Detection. SP (Workshops) 2020: 1-7 - [i19]Ethan M. Rudd, Ahmed Abdallah:
Training Transformers for Information Security Tasks: A Case Study on Malicious URL Prediction. CoRR abs/2011.03040 (2020) - [i18]Richard E. Harang, Ethan M. Rudd:
SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection. CoRR abs/2012.07634 (2020)
2010 – 2019
- 2019
- [j3]Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult:
Facial attributes: Accuracy and adversarial robustness. Pattern Recognit. Lett. 124: 100-108 (2019) - [c11]Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard E. Harang:
ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation. USENIX Security Symposium 2019: 303-320 - [i17]Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard E. Harang:
ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation. CoRR abs/1903.05700 (2019) - [i16]Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin:
SMART: Semantic Malware Attribute Relevance Tagging. CoRR abs/1905.06262 (2019) - [i15]Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin:
Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection. CoRR abs/1905.06987 (2019) - 2018
- [j2]Ethan M. Rudd, Lalit P. Jain, Walter J. Scheirer, Terrance E. Boult:
The Extreme Value Machine. IEEE Trans. Pattern Anal. Mach. Intell. 40(3): 762-768 (2018) - [i14]Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult:
Facial Attributes: Accuracy and Adversarial Robustness. CoRR abs/1801.02480 (2018) - [i13]Ethan M. Rudd, Richard E. Harang, Joshua Saxe:
MEADE: Towards a Malicious Email Attachment Detection Engine. CoRR abs/1804.08162 (2018) - [i12]Richard E. Harang, Ethan M. Rudd:
Principled Uncertainty Estimation for Deep Neural Networks. CoRR abs/1810.12278 (2018) - 2017
- [j1]Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult:
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions. IEEE Commun. Surv. Tutorials 19(2): 1145-1172 (2017) - [c10]Manuel Günther, Steve Cruz, Ethan M. Rudd, Terrance E. Boult:
Toward Open-Set Face Recognition. CVPR Workshops 2017: 573-582 - [c9]James Henrydoss, Steve Cruz, Ethan M. Rudd, Manuel Günther, Terrance E. Boult:
Incremental Open Set Intrusion Recognition Using Extreme Value Machine. ICMLA 2017: 1089-1093 - [i11]Steve Cruz, Cora Coleman, Ethan M. Rudd, Terrance E. Boult:
Open Set Intrusion Recognition for Fine-Grained Attack Categorization. CoRR abs/1703.02244 (2017) - [i10]Khudran Alzhrani, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult:
Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters. CoRR abs/1703.02248 (2017) - [i9]Manuel Günther, Steve Cruz, Ethan M. Rudd, Terrance E. Boult:
Toward Open-Set Face Recognition. CoRR abs/1705.01567 (2017) - 2016
- [c8]Khudran Alzhrani, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult:
Automated big security text pruning and classification. IEEE BigData 2016: 3629-3637 - [c7]Ethan M. Rudd, Manuel Günther, Terrance E. Boult:
PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses. CVPR Workshops 2016: 171-178 - [c6]Ethan M. Rudd, Terrance E. Boult:
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition. CVPR Workshops 2016: 195-203 - [c5]Andras Rozsa, Ethan M. Rudd, Terrance E. Boult:
Adversarial Diversity and Hard Positive Generation. CVPR Workshops 2016: 410-417 - [c4]Ethan M. Rudd, Manuel Günther, Terrance E. Boult:
MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes. ECCV (5) 2016: 19-35 - [c3]Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult:
Are facial attributes adversarially robust? ICPR 2016: 3121-3127 - [c2]Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow:
Automated big text security classification. ISI 2016: 103-108 - [i8]Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult:
A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions. CoRR abs/1603.06028 (2016) - [i7]Ethan M. Rudd, Manuel Günther, Terrance E. Boult:
MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes. CoRR abs/1603.07027 (2016) - [i6]Andras Rozsa, Ethan M. Rudd, Terrance E. Boult:
Adversarial Diversity and Hard Positive Generation. CoRR abs/1605.01775 (2016) - [i5]Ethan M. Rudd, Terrance E. Boult:
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition. CoRR abs/1605.03116 (2016) - [i4]Ethan M. Rudd, Manuel Günther, Terrance E. Boult:
PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses. CoRR abs/1605.03124 (2016) - [i3]Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult:
Are Facial Attributes Adversarially Robust? CoRR abs/1605.05411 (2016) - [i2]Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow:
Automated Big Text Security Classification. CoRR abs/1610.06856 (2016) - 2015
- [i1]Ethan M. Rudd, Lalit P. Jain, Walter J. Scheirer, Terrance E. Boult:
The Extreme Value Machine. CoRR abs/1506.06112 (2015) - 2014
- [c1]Michael J. Wilber, Ethan M. Rudd, Brian Heflin, Yui-Man Lui, Terrance E. Boult:
Exemplar codes for facial attributes and tattoo recognition. WACV 2014: 205-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint