Kristen Moore

Orcid: 0000-0002-9962-5080

According to our database1, Kristen Moore authored at least 30 papers between 2021 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A comprehensive solution to retrieval-based chatbot construction.
Comput. Speech Lang., January, 2024

From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language Prompting.
CoRR, 2024

DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking.
CoRR, 2024

SoK: Facial Deepfake Detectors.
CoRR, 2024

Learning with Mixture of Prototypes for Out-of-Distribution Detection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024

An Investigation into Misuse of Java Security APIs by Large Language Models.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Graph Lifelong Learning: A Survey.
IEEE Comput. Intell. Mag., February, 2023

Entropy Causal Graphs for Multivariate Time Series Anomaly Detection.
CoRR, 2023

Detecting Misuses of Security APIs: A Systematic Review.
CoRR, 2023

DualVAE: Controlling Colours of Generated and Real Images.
CoRR, 2023

Why Do Deepfake Detectors Fail?
CoRR, 2023

Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices.
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

Why Do Facial Deepfake Detectors Fail?
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023

PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Towards Understanding of Deepfake Videos in the Wild.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

DEFT: A New Distance-Based Feature Set for Keystroke Dynamics.
Proceedings of the 22nd International Conference of the Biometrics Special Interest Group, 2023

Text-Conditioned Graph Generation Using Discrete Graph Variational Autoencoders.
Proceedings of the Data Science and Machine Learning, 2023

DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Tracking Dataset IP Use in Deep Neural Networks.
CoRR, 2022

Integrity Fingerprinting of DNN with Double Black-box Design and Verification.
CoRR, 2022

RAIDER: Reinforcement-Aided Spear Phishing Detector.
Proceedings of the Network and System Security - 16th International Conference, 2022

Modelling direct messaging networks with multiple recipients for cyber deception.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

SchemaDB: A Dataset for Structures in Relational Data.
Proceedings of the Data Mining - 20th Australasian Conference, AusDM 2022, Western Sydney, 2022

2021
SchemaDB: Structures in Relational Datasets.
CoRR, 2021

Robust Training Using Natural Transformation.
CoRR, 2021

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021

Deception for Cyber Defence: Challenges and Opportunities.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

ACSIMA: A Cyber Security Index for Mobile Health Apps.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021


  Loading...