Showing 1–15 of 15 results
/ Date/ Name
Aug 10, 2024Your Context Is Not an Array: Unveiling Random Access Limitations in TransformersJun 10, 2020Time-Resolved fMRI Shared Response Model using Gaussian Process Factor AnalysisNov 24, 2022Sequential Gradient Coding For Straggler MitigationMay 5, 2022Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and CybersecurityAug 30, 2019Two-layer Coded Channel Access with Collision Resolution: Design and AnalysisDec 14, 2020Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language ModelOct 25, 2022Multi-view Representation Learning from Malware to Defend Against Adversarial VariantsNov 11, 2021Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning ApproachJan 8, 2022Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat IntelligenceDec 3, 2021Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model ApproachDec 19, 2025Adversarially Robust Detection of Harmful Online Content: A Computational Design Science ApproachOct 26, 2022Privately Fine-Tuning Large Language Models with Differential PrivacyAug 19, 2024Differentially Private Stochastic Gradient Descent with Fixed-Size Minibatches: Tighter RDP Guarantees with or without ReplacementAug 13, 2022Thermodynamic geometry of pure Lovelock black holesMay 30, 2023Sensor Fault Detection and Compensation with Performance Prescription for Robotic Manipulators