Follow
Benjamin Edwards
Title
Cited by
Cited by
Year
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
AAAI Workshop on Artificial Intelligence Safety 1 (1), 2019
7262019
Adversarial Robustness Toolbox v0.3.0
BE Maria-Irina Nicolae, Mathieu Sinn, Minh Ngoc Tran, Ambrish Rawat, Martin ...
ArXiV, 2018
530*2018
Hype and heavy tails: A closer look at data breaches
B Edwards, S Hofmeyr, S Forrest
Journal of Cybersecurity 2 (1), 3-14, 2016
3192016
Enhancing privacy in participatory sensing applications with multidimensional data
MM Groat, B Edwards, J Horey, W He, S Forrest
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
952012
Defending against neural network model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
852019
Exploit prediction scoring system (epss)
J Jacobs, S Romanosky, B Edwards, I Adjerid, M Roytman
Digital Threats: Research and Practice 2 (3), 1-17, 2021
832021
Strategic aspects of cyberattack, attribution, and blame
B Edwards, A Furnas, S Forrest, R Axelrod
Proceedings of the National Academy of Sciences 114 (11), 2825-2830, 2017
772017
Advit: Adversarial frames identifier based on temporal consistency in videos
C Xiao, R Deng, B Li, T Lee, B Edwards, J Yi, D Song, M Liu, I Molloy
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
552019
Deep neural network hardening framework
BJ Edwards, T Lee, IM Molloy, D Su
US Patent 11,443,178, 2022
482022
Using gradients to detect backdoors in neural networks
W Carvalho, B Chen, BJ Edwards, T Lee, IM Molloy, J Zhang
US Patent 11,132,444, 2021
472021
Defending against model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
402018
Defending against machine learning model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
322018
Internet topology over time
B Edwards, S Hofmeyr, G Stelle, S Forrest
arXiv preprint arXiv:1202.3993, 2012
292012
Adversarial learning of privacy protection layers for image recognition services
BJ Edwards, H Huang, T Lee, IM Molloy, D Su
US Patent 10,535,120, 2020
262020
Modeling internet-scale policies for cleaning up malware
S Hofmeyr, T Moore, S Forrest, B Edwards, G Stelle
Economics of Information Security and Privacy III, 149-170, 2013
262013
Application and analysis of multidimensional negative surveys in participatory sensing applications
MM Groat, B Edwards, J Horey, W He, S Forrest
Pervasive and Mobile Computing 9 (3), 372-391, 2013
252013
Beyond the blacklist: modeling malware spread and the effect of interventions
B Edwards, T Moore, G Stelle, S Hofmeyr, S Forrest
Proceedings of the 2012 New Security Paradigms Workshop, 53-66, 2012
252012
Energy and time determine scaling in biological and computer designs
M Moses, G Bezerra, B Edwards, J Brown, S Forrest
Philosophical Transactions of the Royal Society B: Biological Sciences 371 …, 2016
212016
Borders and gateways: measuring and analyzing national as chokepoints
KG Leyba, B Edwards, C Freeman, JR Crandall, S Forrest
Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable …, 2019
192019
Analyzing and modeling longitudinal security data: Promise and pitfalls
B Edwards, S Hofmeyr, S Forrest, M Van Eeten
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
172015
The system can't perform the operation now. Try again later.
Articles 1–20