Artificial Intelligence for Cyber Security
Papers
End-to-End Active Learning for Computer Security Experts
PDFRADMAX: Risk and Deadline Aware Planning for Maximum Utility
PDFAttention for Detecting Unreliable News in the Information Age
PDFAdequacy of the Gradient-Descent Method for Classifier Evasion Attacks
PDFBlack-Box Attacks against RNN Based Malware Detection Algorithms
PDFSteganographic Internet of Things: Graph Topology Timing Channels
PDFDeceitful Attacks in Security Games
PDFMalware Detection by Eating a Whole EXE
PDFDetecting Cyberattack Entities from Audit Data via Multi-View Anomaly Detection with Feedback
PDFRecurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
PDF