Exploring Adversarial Examples in Malware Detection
Suciu, Octavian, Coull, Scott E., Johns, Jeffrey
Published in 2019 IEEE Security and Privacy Workshops (SPW) (01.05.2019)
Published in 2019 IEEE Security and Privacy Workshops (SPW) (01.05.2019)
Get full text
Conference Proceeding
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System
Dumitraş, Tudor, Kaya, Yiğitcan, Mărginean, Radu, Suciu, Octavian
Published in Security Protocols XXVI (01.01.2018)
Published in Security Protocols XXVI (01.01.2018)
Get full text
Book Chapter
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights
Jacobs, Jay, Romanosky, Sasha, Suciu, Octavian, Edwards, Ben, Sarabi, Armin
Published in 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01.07.2023)
Published in 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01.07.2023)
Get full text
Conference Proceeding
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights
Jacobs, Jay, Romanosky, Sasha, Suciu, Octavian, Edwards, Benjamin, Sarabi, Armin
Year of Publication 27.02.2023
Year of Publication 27.02.2023
Get full text
Journal Article
Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
Suciu, Octavian, Nelson, Connor, Lyu, Zhuoer, Bao, Tiffany, Dumitras, Tudor
Year of Publication 15.02.2021
Year of Publication 15.02.2021
Get full text
Journal Article
SYSTEMS AND METHODS FOR PREDICTING DEVELOPMENT OF FUNCTIONAL VULNERABILITY EXPLOITS
Bao, Tiffany, Suciu, Octavian, Dumitras, Tudor, Lyu, Zhuoer, Nelson, Connor
Year of Publication 17.08.2023
Get full text
Year of Publication 17.08.2023
Patent
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Suciu, Octavian, Mărginean, Radu, Kaya, Yiğitcan, DauméIII, Hal, Dumitraş, Tudor
Year of Publication 19.03.2018
Year of Publication 19.03.2018
Get full text
Journal Article
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Shafahi, Ali, Huang, W. Ronny, Najibi, Mahyar, Suciu, Octavian, Studer, Christoph, Dumitras, Tudor, Goldstein, Tom
Year of Publication 02.04.2018
Year of Publication 02.04.2018
Get full text
Journal Article
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
Stevens, Rock, Suciu, Octavian, Ruef, Andrew, Hong, Sanghyun, Hicks, Michael, Dumitraş, Tudor
Year of Publication 17.01.2017
Year of Publication 17.01.2017
Get full text
Journal Article
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
Stevens, Rock, Suciu, Octavian, Ruef, Andrew, Hong, Sanghyun, Hicks, Michael, Tudor Dumitraş
Published in arXiv.org (17.01.2017)
Get full text
Published in arXiv.org (17.01.2017)
Paper