
Title |
|---|
![]() In Search of netUnicorn: A Data-Collection Platform to Develop
Generalizable ML Models for Network Security ProblemsConference on Computer and Communications Security (CCS), 2023 |
![]() Cerberus: Exploring Federated Prediction of Security EventsConference on Computer and Communications Security (CCS), 2022 |
![]() A new hope for network model generalizationACM Workshop on Hot Topics in Networks (HotNets), 2022 |
![]() Extensible Machine Learning for Encrypted Network Traffic Application
Labeling via Uncertainty QuantificationIEEE Transactions on Artificial Intelligence (IEEE TAI), 2022 |
![]() Generative Adversarial NetworksInternational Conference on Computing Communication and Networking Technologies (ICCCNT), 2021 |
![]() Should You Mask 15% in Masked Language Modeling?Conference of the European Chapter of the Association for Computational Linguistics (EACL), 2022 |
![]() ET-BERT: A Contextualized Datagram Representation with Pre-training
Transformers for Encrypted Traffic ClassificationThe Web Conference (WWW), 2022 |
![]() Masked Autoencoders Are Scalable Vision LearnersComputer Vision and Pattern Recognition (CVPR), 2021 |
![]() Towards Transferable Adversarial Attacks on Vision TransformersAAAI Conference on Artificial Intelligence (AAAI), 2021 |
![]() A Survey on Data-driven Software Vulnerability Assessment and
PrioritizationACM Computing Surveys (CSUR), 2021 |
![]() ViTAS: Vision Transformer Architecture SearchEuropean Conference on Computer Vision (ECCV), 2021 |
![]() LoRA: Low-Rank Adaptation of Large Language ModelsInternational Conference on Learning Representations (ICLR), 2021 |
![]() Decision-Making with Auto-Encoding Variational BayesNeural Information Processing Systems (NeurIPS), 2020 Romain Lopez Pierre Boyeau Nir Yosef Michael I. Jordan Jeffrey Regier |
![]() Kitsune: An Ensemble of Autoencoders for Online Network Intrusion
DetectionNetwork and Distributed System Security Symposium (NDSS), 2018 |
![]() Attention Is All You NeedNeural Information Processing Systems (NeurIPS), 2017 |
![]() Deciphering Malware's use of TLS (without Decryption)Journal of Computer Virology and Hacking Techniques (JCVHT), 2016 |
![]() Adam: A Method for Stochastic OptimizationInternational Conference on Learning Representations (ICLR), 2014 Diederik P. Kingma Jimmy Ba |