Zobrazeno 1 - 10
of 201
pro vyhledávání: '"Kantchelian, A."'
Autor:
Kantchelian, Alex, Neo, Casper, Stevens, Ryan, Kim, Hyungwon, Fu, Zhaohao, Momeni, Sadegh, Huber, Birkett, Bursztein, Elie, Pavlidis, Yanis, Buthpitiya, Senaka, Cochran, Martin, Poletto, Massimiliano
We present Facade (Fast and Accurate Contextual Anomaly DEtection): a high-precision deep-learning-based anomaly detection system deployed at Google (a large technology company) as the last line of defense against insider threats since 2018. Facade i
Externí odkaz:
http://arxiv.org/abs/2412.06700
Autor:
Huber, Birkett, Neo, Casper, Sampson, Keiran, Kantchelian, Alex, Ksobiech, Brett, Pavlidis, Yanis
We present a method to detect departures from business-justified workflows among support agents. Our goal is to assist auditors in identifying agent actions that cannot be explained by the activity within their surrounding context, where normal activ
Externí odkaz:
http://arxiv.org/abs/2411.02645
Autor:
Miller, Brad, Kantchelian, Alex, Tschantz, Michael Carl, Afroz, Sadia, Bachwani, Rekha, Faizullabhoy, Riyaz, Huang, Ling, Shankar, Vaishaal, Wu, Tony, Yiu, George, Joseph, Anthony D., Tygar, J. D.
We present and evaluate a large-scale malware detection system integrating machine learning with expert reviewers, treating reviewers as a limited labeling resource. We demonstrate that even in small numbers, reviewers can vastly improve the system's
Externí odkaz:
http://arxiv.org/abs/1510.07338
Classifier evasion consists in finding for a given instance $x$ the nearest instance $x'$ such that the classifier predictions of $x$ and $x'$ are different. We present two novel algorithms for systematically computing evasions for tree ensembles suc
Externí odkaz:
http://arxiv.org/abs/1509.07892
Publikováno v:
ACM Conference on Computer and Communications Security
Miscreants register thousands of new domains every day to launch Internet-scale attacks, such as spam, phishing, and drive-by downloads. Quickly and accurately determining a domain's reputation (association with malicious activity) provides a powerfu
Autor:
Ling Huang, Rekha Bachwani, J. D. Tygar, Brad Miller, Tony Wu, Alex Kantchelian, Vaishaal Shankar, Michael Carl Tschantz, George Yiu, Riyaz Faizullabhoy, Sadia Afroz, Anthony D. Joseph
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319406664
DIMVA
DIMVA
We present and evaluate a large-scale malware detection system integrating machine learning with expert reviewers, treating reviewers as a limited labeling resource. We demonstrate that even in small numbers, reviewers can vastly improve the system's
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::df1eddae9141726e2a08abf7377e73d7
https://doi.org/10.1007/978-3-319-40667-1_7
https://doi.org/10.1007/978-3-319-40667-1_7
Autor:
Miller, Brad, Kantchelian, Alex, Tschantz, Michael Carl, Afroz, Sadia, Bachwani, Rekha, Faizullabhoy, Riyaz, Huang, Ling, Shankar, Vaishaal, Wu, Tony, Yiu, George, Joseph, Anthony D., Tygar, J. D.
Publikováno v:
Detection of Intrusions & Malware & Vulnerability Assessment (9783319406664); 2016, p122-141, 20p
Autor:
Sadia Afroz, Rekha Bachwani, J. D. Tygar, Anthony D. Joseph, Brad Miller, Vaishaal Shankar, Alex Kantchelian, Michael Carl Tschantz
Publikováno v:
AISec@CCS
We examine the problem of aggregating the results of multiple anti-virus (AV) vendors' detectors into a single authoritative ground-truth label for every binary. To do so, we adapt a well-known generative Bayesian model that postulates the existence
Autor:
Edwin Dauber, Ling Huang, Rekha Bachwani, Brad Miller, Alex Kantchelian, Michael Carl Tschantz, J. D. Tygar, Sadia Afroz, Anthony D. Joseph
Publikováno v:
AISec@CCS
Active learning is an area of machine learning examining strategies for allocation of finite resources, particularly human labeling efforts and to an extent feature extraction, in situations where available data exceeds available resources. In this o
Publikováno v:
Communications of the ACM. Apr2024, Vol. 67 Issue 4, p50-59. 10p.