Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression N Das, M Shanbhogue, ST Chen, F Hohman, L Chen, ME Kounavis, ... arXiv preprint arXiv:1705.02900, 2017 | 333 | 2017 |
Shield: Fast, practical defense and vaccination for deep learning using jpeg compression N Das, M Shanbhogue, ST Chen, F Hohman, S Li, L Chen, ME Kounavis, ... Proceedings of the 24th ACM SIGKDD International Conference on Knowledge …, 2018 | 203 | 2018 |
Mapping archaeological landscapes from space DC Comer, MJ Harrower Springer 5, 159-171, 2013 | 120 | 2013 |
Henet: A deep learning approach on intel® processor trace for effective exploit detection L Chen, S Sultana, R Sahita 2018 IEEE Security and Privacy Workshops (SPW), 109-115, 2018 | 56* | 2018 |
Deep transfer learning for static malware classification L Chen arXiv preprint arXiv:1812.07606, 2018 | 53 | 2018 |
Spectral clustering for divide-and-conquer graph matching V Lyzinski, DL Sussman, DE Fishkind, H Pao, L Chen, JT Vogelstein, ... Parallel Computing 47, 70-87, 2015 | 52 | 2015 |
Vertex Nomination Schemes for Membership Prediction DE Fishkind, V Lyzinski, H Pao, L Chen, CE Priebe Annuals of Applied Statistics, accepted for publication. arXiv preprint …, 2015 | 41 | 2015 |
ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio N Das, M Shanbhogue, ST Chen, L Chen, ME Kounavis, DH Chau Machine Learning and Knowledge Discovery in Databases: European Conference …, 2019 | 37 | 2019 |
A joint graph inference case study: the c. elegans chemical and electrical connectomes L Chen, JT Vogelstein, V Lyzinski, CE Priebe Worm. http://www.tandfonline.com/doi/full/10.1080/21624054.2016.1142041 …, 2015 | 36 | 2015 |
Deep learning on execution trace data for exploit detection L Chen, S Sultana US Patent 10,915,631, 2021 | 29 | 2021 |
POSTER: Semi-supervised classification for dynamic Android malware detection L Chen, M Zhang, CY Yang, R Sahita Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 24 | 2017 |
Semi-supervised classification for dynamic Android malware detection L Chen, M Zhang, CY Yang, R Sahita https://arxiv.org/abs/1704.05948, 2017 | 21 | 2017 |
STAMINA: Scalable deep learning approach for malware classification L Chen, R Sahita, J Parikh, M Marino Intel Labs Whitepaper, 2020 | 19 | 2020 |
Towards resilient machine learning for ransomware detection L Chen, CY Yang, A Paul, R Sahita arXiv preprint arXiv:1812.09400, 2018 | 19 | 2018 |
On the robustness of monte carlo dropout trained with noisy labels P Goel, L Chen Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 17 | 2021 |
Refinement of a method for identifying probable archaeological sites from remotely sensed data DC Comer, MJ Harrower, L Chen, DC Comer, CE Priebe, D Sussman, ... Mapping archaeological landscapes from space, 251-258, 2013 | 17 | 2013 |
Robust Vertex Classification L Chen, C Shen, J Vogelstein, C Priebe IEEE Transactions on Pattern Analysis and Machine Intelligence, accepted for …, 2015 | 16 | 2015 |
Vertex nomination: The canonical sampling and the extended spectral nomination schemes J Yoder, L Chen, H Pao, E Bridgeford, K Levin, DE Fishkind, C Priebe, ... Computational Statistics & Data Analysis 145, 106916, 2020 | 15 | 2020 |
Sparse representation classification beyond ℓ1 minimization and the subspace assumption C Shen, L Chen, Y Dong, CE Priebe IEEE Transactions on Information Theory 66 (8), 5061-5071, 2020 | 15 | 2020 |
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces C Yagemann, S Sultana, L Chen, W Lee Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 14 | 2019 |