Jack W. Stokes
According to our database1,
Jack W. Stokes
authored at least 56 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
3
2
2
1
1
1
1
2
7
5
5
4
2
3
1
3
2
1
1
4
1
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks.
CoRR, 2024
Interpretable User Satisfaction Estimation for Conversational Systems with Large Language Models.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2022
Int. J. Inf. Sec., 2022
Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks.
CoRR, 2022
I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation.
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Beyond $L_{p}$ Norms: Delving Deeper into Robustness to Physical Image Transformations.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
2020
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Detection of Malicious Vbscript Using Static and Dynamic Analysis with Recurrent Deep Learning.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback.
Proceedings of the IEEE International Conference on Acoustics, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
2018
CoRR, 2018
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
2017
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models.
CoRR, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
2013
Proceedings of the IEEE International Conference on Acoustics, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
2008
Proceedings of the Weaving Services and People on the World Wide Web, 2008
Proceedings of the Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, 2008
Proceedings of the IEEE International Conference on Acoustics, 2008
Proceedings of the AIRWeb 2008, 2008
2007
Normalized Double-Talk Detection Based on Microphone and AEC Error Cross-Correlation.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
2006
Speaker Identification using a Microphone Array and a Joint HMM with Speech Spectrum and Angle of Arrival.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006
Robust Rls with Round Robin Regularization Including Application to Stereo Acoustic Echo Cancellation.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
2004
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004
2001
Signal Process., 2001