Seguir
Rich Harang
Rich Harang
E-mail confirmado em nvidia.com
Título
Citado por
Citado por
Ano
Crafting adversarial input sequences for recurrent neural networks
N Papernot, P McDaniel, A Swami, R Harang
MILCOM 2016-2016 IEEE Military Communications Conference, 49-54, 2016
5002016
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th USENIX security symposium (USENIX Security 15), 255-270, 2015
2852015
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
1542015
A neuropeptide speeds circadian entrainment by reducing intercellular synchrony
S An, R Harang, K Meeker, D Granados-Fuentes, CA Tsai, C Mazuski, ...
Proceedings of the National Academy of Sciences 110 (46), E4355-E4361, 2013
1472013
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1132017
SOREL-20M: A large scale benchmark dataset for malicious PE detection
R Harang, EM Rudd
arXiv preprint arXiv:2012.07634, 2020
902020
SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks
WY Lee, J Saxe, R Harang
Deep learning applications for cyber security, 197-210, 2019
642019
Git blame who? stylistic authorship attribution of small, incomplete source code fragments
E Dauber, A Caliskan, R Harang, R Greenstadt
Proceedings of the 40th International Conference on Software Engineering …, 2018
592018
WAVOS: a MATLAB toolkit for wavelet analysis and visualization of oscillatory systems
R Harang, G Bonnet, LR Petzold
BMC research notes 5, 1-8, 2012
552012
Methods and apparatus for detection of malicious documents using machine learning
JD Saxe, R HARANG
US Patent 11,003,774, 2021
542021
Rapid permissions-based detection and analysis of mobile malware using random decision forests
W Glodek, R Harang
MILCOM 2013-2013 IEEE Military Communications Conference, 980-985, 2013
532013
A deep learning approach to fast, format-agnostic detection of malicious web content
J Saxe, R Harang, C Wild, H Sanders
2018 IEEE Security and Privacy Workshops (SPW), 8-14, 2018
432018
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
402018
Statistical models for the number of successful cyber intrusions
NO Leslie, RE Harang, LP Knachel, A Kott
The Journal of Defense Modeling and Simulation 15 (1), 49-63, 2018
352018
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
P Mell, J Shook, R Harang, S Gavrila
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2017
332017
CATBERT: Context-aware tiny BERT for detecting social engineering emails
Y Lee, J Saxe, R Harang
arXiv preprint arXiv:2010.03484, 2020
322020
Wavelet Measurement Suggests Cause of Period Instability in Mammalian Circadian Neurons
K Meeker, R Harang, AB Webb, DK Welsh, FJ Doyle, G Bonnet, ...
Journal of Biological Rhythms 26 (4), 353-362, 2011
322011
Methods and apparatus for using machine learning on multiple file fragments to identify malware
JD Saxe, R Harang
US Patent 10,635,813, 2020
292020
{ALOHA}: Auxiliary Loss Optimization for Hypothesis Augmentation
EM Rudd, FN Ducau, C Wild, K Berlin, R Harang
28th USENIX Security Symposium (USENIX Security 19), 303-320, 2019
262019
Extremely lightweight intrusion detection (elide)
RJ Chang, RE Harang, GS Payer
ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE, 2013
242013
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20