Hamlen, Kevin W.
75  Ergebnisse:
Personensuche X
?
1

VulMAE: Graph Masked Autoencoders for Vulnerability Detecti..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
Zamani, Mahmoud ; Irtiza, Saquib ; Khan, Latifur. - p. 191-207 , 2024
 
?
2

Securing Smart Vehicles Through Federated Learning:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
3

Confidential Execution of Deep Learning Inference at the Un..:

, In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy,
 
?
4

Renewable Just-In-Time Control-Flow Integrity:

, In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses,
Bauman, Erick ; Duan, Jun ; Hamlen, Kevin W.. - p. 580-594 , 2023
 
?
5

SentMod: Hidden Backdoor Attack on Unstructured Textual Dat:

, In: 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS),
 
?
6

MCoM: A Semi-Supervised Method for Imbalanced Tabular Secur..:

, In: Lecture Notes in Computer Science; Data and Applications Security and Privacy XXXVI,
Li, Xiaodi ; Khan, Latifur ; Zamani, Mahmoud... - p. 48-67 , 2022
 
?
7

A Federated Approach for Learning from Electronic Health Re..:

, In: 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS),
Halim, Sadaf MD ; Khan, Latifur ; Hamlen, Kevin W... - p. 218-223 , 2022
 
?
9

Crook-sourced intrusion detection as a service:

Araujo, Frederico ; Ayoade, Gbadebo ; Al-Naami, Khaled...
Journal of Information Security and Applications.  61 (2021)  - p. 102880 , 2021
 
?
10

BiMorphing: A Bi-Directional Bursting Defense against Websi..:

Al-Naami, Khaled ; El-Ghamry, Amir ; Islam, Md Shihabul...
IEEE Transactions on Dependable and Secure Computing.  18 (2021)  2 - p. 505-517 , 2021
 
?
11

FEAST'20: Fifth Workshop on Forming an Ecosystem Around Sof..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
Hamlen, Kevin W. ; Lu, Long - p. 2149-2150 , 2020
 
?
12

Exploiting the Trust Between Boundaries : Discovering Me..:

, In: The 21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems,
He, Xiaoyu ; Bauman, Erick ; Li, Feng... - p. 74-84 , 2020
 
?
15

Improving intrusion detectors by crook-sourcing:

, In: Proceedings of the 35th Annual Computer Security Applications Conference,
 
1-15