Jack W. Stokes

According to our database1, Jack W. Stokes authored at least 56 papers between 2001 and 2024.

Collaborative distances:

Timeline

2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
3
2
2
1
1
1
1
2
7
5
5
4
2
3
1
3
2
1
1
4
1
3
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VLMGuard: Defending VLMs against Malicious Prompts via Unlabeled Data.
CoRR, 2024

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks.
CoRR, 2024

HetTree: Heterogeneous Tree Graph Neural Network.
CoRR, 2024

Interpretable User Satisfaction Estimation for Conversational Systems with Large Language Models.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2022
Tracking adoption of revocation and cryptographic features in X.509 certificates.
Int. J. Inf. Sec., 2022

Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks.
CoRR, 2022

I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation.
Proceedings of the IEEE Military Communications Conference, 2022

Long-Term Study of Honeypots in a Public Cloud.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Designing Media Provenance Indicators to Combat Fake Media.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Living-Off-The-Land Command Detection Using Active Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

AMP: authentication of media via provenance.
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Beyond $L_{p}$ Norms: Delving Deeper into Robustness to Physical Image Transformations.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

URLTran: Improving Phishing URL Detection Using Transformers.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Detection Of Malicious DNS and Web Servers using Graph-Based Approaches.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Designing Indicators to Combat Fake Media.
CoRR, 2020

AMP: Authentication of Media via Provenance.
CoRR, 2020

PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

Texception: A Character/Word-Level Deep Learning Model for Phishing URL Detection.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Detection of Malicious Vbscript Using Static and Dynamic Analysis with Recurrent Deep Learning.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Actor Critic Deep Reinforcement Learning for Neural Malware Control.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Neural Malware Control with Deep Reinforcement Learning.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Detection of Prevalent Malware Families with Deep Learning.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

ScriptNet: Neural Static Analysis for Malicious JavaScript Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback.
Proceedings of the IEEE International Conference on Acoustics, 2019

Attention in Recurrent Neural Networks for Ransomware Detection.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Neural Classification of Malicious Scripts: A study with JavaScript and VBScript.
CoRR, 2018

Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Latte: Large-Scale Lateral Movement Detection.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Robust Neural Malware Detection Models for Emulation Sequence Learning.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Neural Sequential Malware Detection with Parameters.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models.
CoRR, 2017

Hierarchical learning for automated malware classification.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Malware classification with LSTM and GRU language models and a character-level CNN.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
MART: Targeted attack detection on a compromised network.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Asking for a second opinion: Re-querying of noisy multi-class labels.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

MtNet: A Multi-Task Neural Network for Dynamic Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Malware classification with recurrent networks.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2013
Robust scareware image detection.
Proceedings of the IEEE International Conference on Acoustics, 2013

Large-scale malware classification using random projections and neural networks.
Proceedings of the IEEE International Conference on Acoustics, 2013

Detecting malicious landing pages in Malware Distribution Networks.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Scalable Telemetry Classification for Automated Malware Detection.
Proceedings of the Computer Security - ESORICS 2012, 2012

Using File Relationships in Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads.
Proceedings of the 20th International Conference on World Wide Web, 2011

2010
WebCop: Locating Neighborhoods of Malware on the Web.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2008
Classification of Automated Search Traffic.
Proceedings of the Weaving Services and People on the World Wide Web, 2008

Finding Similar Failures Using Callstack Similarity.
Proceedings of the Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, 2008

Nonlinear residual acoustic echo suppression for high levels of harmonic distortion.
Proceedings of the IEEE International Conference on Acoustics, 2008

A large-scale study of automated web search traffic.
Proceedings of the AIRWeb 2008, 2008

2007
Normalized Double-Talk Detection Based on Microphone and AEC Error Cross-Correlation.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Speaker Identification using a Microphone Array and a Joint HMM with Speech Spectrum and Angle of Arrival.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Acoustic Echo Cancelation for High Noise Environments.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Robust Rls with Round Robin Regularization Including Application to Stereo Acoustic Echo Cancellation.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2004
Acoustic echo cancellation with arbitrary playback sampling rate.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2001
Performance analysis of DS/CDMA systems with shadowing and flat fading.
Signal Process., 2001


  Loading...