Follow
Rich Harang
Rich Harang
Verified email at nvidia.com
Title
Cited by
Cited by
Year
Crafting adversarial input sequences for recurrent neural networks
N Papernot, P McDaniel, A Swami, R Harang
MILCOM 2016-2016 IEEE Military Communications Conference, 49-54, 2016
5312016
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th USENIX security symposium (USENIX Security 15), 255-270, 2015
3062015
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
1602015
A neuropeptide speeds circadian entrainment by reducing intercellular synchrony
S An, R Harang, K Meeker, D Granados-Fuentes, CA Tsai, C Mazuski, ...
Proceedings of the National Academy of Sciences 110 (46), E4355-E4361, 2013
1532013
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1252017
SOREL-20M: A large scale benchmark dataset for malicious PE detection
R Harang, EM Rudd
arXiv preprint arXiv:2012.07634, 2020
1012020
SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks
WY Lee, J Saxe, R Harang
Deep learning applications for cyber security, 197-210, 2019
692019
Git blame who? stylistic authorship attribution of small, incomplete source code fragments
E Dauber, A Caliskan, R Harang, R Greenstadt
Proceedings of the 40th International Conference on Software Engineering …, 2018
672018
Methods and apparatus for detection of malicious documents using machine learning
JD Saxe, R HARANG
US Patent 11,003,774, 2021
592021
WAVOS: a MATLAB toolkit for wavelet analysis and visualization of oscillatory systems
R Harang, G Bonnet, LR Petzold
BMC research notes 5, 1-8, 2012
552012
Rapid permissions-based detection and analysis of mobile malware using random decision forests
W Glodek, R Harang
MILCOM 2013-2013 IEEE Military Communications Conference, 980-985, 2013
532013
A deep learning approach to fast, format-agnostic detection of malicious web content
J Saxe, R Harang, C Wild, H Sanders
2018 IEEE Security and Privacy Workshops (SPW), 8-14, 2018
462018
CATBERT: Context-aware tiny BERT for detecting social engineering emails
Y Lee, J Saxe, R Harang
arXiv preprint arXiv:2010.03484, 2020
422020
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
412018
Statistical models for the number of successful cyber intrusions
NO Leslie, RE Harang, LP Knachel, A Kott
The Journal of Defense Modeling and Simulation 15 (1), 49-63, 2018
392018
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
P Mell, J Shook, R Harang, S Gavrila
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2017
342017
Wavelet Measurement Suggests Cause of Period Instability in Mammalian Circadian Neurons
K Meeker, R Harang, AB Webb, DK Welsh, FJ Doyle, G Bonnet, ...
Journal of Biological Rhythms 26 (4), 353-362, 2011
322011
Methods and apparatus for using machine learning on multiple file fragments to identify malware
JD Saxe, R Harang
US Patent 10,635,813, 2020
312020
{ALOHA}: Auxiliary Loss Optimization for Hypothesis Augmentation
EM Rudd, FN Ducau, C Wild, K Berlin, R Harang
28th USENIX Security Symposium (USENIX Security 19), 303-320, 2019
272019
Burstiness of intrusion detection process: Empirical evidence and a modeling approach
R Harang, A Kott
IEEE Transactions on Information Forensics and Security 12 (10), 2348-2359, 2017
252017
The system can't perform the operation now. Try again later.
Articles 1–20