Showing 1–20 of 48 results
/ Date/ Name
Apr 23, 2020Adversarial Machine Learning in Network Intrusion Detection SystemsDec 12, 2023Real-time Network Intrusion Detection via Decision TransformersMay 27, 2024TrojFM: Resource-efficient Backdoor Attacks against Very Large Foundation ModelsJun 20, 2025Prmpt2Adpt: Prompt-Based Zero-Shot Domain Adaptation for Resource-Constrained EnvironmentsJan 24, 2023Off-Policy Evaluation for Action-Dependent Non-Stationary EnvironmentsMay 18, 2023Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet GenerationSep 28, 2023Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability SolvingApr 3, 2020Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling MethodsMay 19, 2025A Few Large Shifts: Layer-Inconsistency Based Minimal Overhead Adversarial Example DetectionFeb 18, 2025Multiple Distribution Shift -- Aerial (MDS-A): A Dataset for Test-Time Error Detection and Model AdaptationMay 19, 2025VLC Fusion: Vision-Language Conditioned Sensor Fusion for Robust Object DetectionSep 4, 2025An Automated, Scalable Machine Learning Model Inversion Assessment PipelineMar 5, 2025PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity ReasoningJan 5, 2026ACDZero: MCTS Agent for Mastering Automated Cyber DefenseNov 6, 2025LogHD: Robust Compression of Hyperdimensional Classifiers via Logarithmic Class-Axis ReductionFeb 9, 2026$n$-Musketeers: Reinforcement Learning Shapes Collaboration Among Language ModelsMay 8, 2026Interactive Critique-Revision Training for Reliable Structured LLM GenerationMay 28, 2020Algorithm Selection Framework for Cyber Attack DetectionSep 24, 2020Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning CapabilitiesJul 6, 2019Intelligent Systems Design for Malware Classification Under Adversarial Conditions