


Остановите войну!
for scientists:


default search action
Ethan M. Rudd
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i22]Chad Mello, Troy Weingart, Ethan M. Rudd:
Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface. CoRR abs/2301.12322 (2023) - 2022
- [c14]Chad Mello, Troy Weingart, Ethan M. Rudd:
Cross-Subject Deep Transfer Models for Evoked Potentials in Brain-Computer Interface. ICPR 2022: 1062-1068 - [c13]Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully:
Transformers for End-to-End InfoSec Tasks: A Feasibility Study. WoRMA@AsiaCCS 2022: 21-31 - [i21]Ethan M. Rudd, David Krisiloff, Scott E. Coull, Daniel Olszewski, Edward Raff, James Holt:
Efficient Malware Analysis Using Metric Embeddings. CoRR abs/2212.02663 (2022) - [i20]Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully:
Transformers for End-to-End InfoSec Tasks: A Feasibility Study. CoRR abs/2212.02666 (2022) - 2020
- [c12]Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin:
Learning from Context: A Multi-View Deep Learning Architecture for Malware Detection. SP Workshops 2020: 1-7 - [i19]Ethan M. Rudd, Ahmed Abdallah:
Training Transformers for Information Security Tasks: A Case Study on Malicious URL Prediction. CoRR abs/2011.03040 (2020) - [i18]Richard E. Harang, Ethan M. Rudd:
SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection. CoRR abs/2012.07634 (2020)
2010 – 2019
- 2019
- [j3]Andras Rozsa, Manuel Günther
, Ethan M. Rudd, Terrance E. Boult:
Facial attributes: Accuracy and adversarial robustness. Pattern Recognit. Lett. 124: 100-108 (2019) - [c11]Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard E. Harang:
ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation. USENIX Security Symposium 2019: 303-320 - [i17]Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard E. Harang:
ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation. CoRR abs/1903.05700 (2019) - [i16]Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin:
SMART: Semantic Malware Attribute Relevance Tagging. CoRR abs/1905.06262 (2019) - [i15]Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin:
Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection. CoRR abs/1905.06987 (2019) - 2018
- [j2]Ethan M. Rudd
, Lalit P. Jain, Walter J. Scheirer, Terrance E. Boult:
The Extreme Value Machine. IEEE Trans. Pattern Anal. Mach. Intell. 40(3): 762-768 (2018) - [i14]Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult:
Facial Attributes: Accuracy and Adversarial Robustness. CoRR abs/1801.02480 (2018) - [i13]Ethan M. Rudd, Richard E. Harang, Joshua Saxe:
MEADE: Towards a Malicious Email Attachment Detection Engine. CoRR abs/1804.08162 (2018) - [i12]Richard E. Harang, Ethan M. Rudd:
Principled Uncertainty Estimation for Deep Neural Networks. CoRR abs/1810.12278 (2018) - 2017
- [j1]Ethan M. Rudd
, Andras Rozsa, Manuel Günther
, Terrance E. Boult:
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions. IEEE Commun. Surv. Tutorials 19(2): 1145-1172 (2017) - [c10]Manuel Günther
, Steve Cruz, Ethan M. Rudd, Terrance E. Boult:
Toward Open-Set Face Recognition. CVPR Workshops 2017: 573-582 - [c9]James Henrydoss, Steve Cruz, Ethan M. Rudd, Manuel Günther, Terrance E. Boult:
Incremental Open Set Intrusion Recognition Using Extreme Value Machine. ICMLA 2017: 1089-1093 - [i11]Steve Cruz, Cora Coleman, Ethan M. Rudd, Terrance E. Boult:
Open Set Intrusion Recognition for Fine-Grained Attack Categorization. CoRR abs/1703.02244 (2017) - [i10]Khudran Alzhrani, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult:
Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters. CoRR abs/1703.02248 (2017) - [i9]Manuel Günther, Steve Cruz, Ethan M. Rudd, Terrance E. Boult:
Toward Open-Set Face Recognition. CoRR abs/1705.01567 (2017) - 2016
- [c8]Khudran Alzhrani
, Ethan M. Rudd, C. Edward Chow, Terrance E. Boult:
Automated big security text pruning and classification. IEEE BigData 2016: 3629-3637 - [c7]Ethan M. Rudd, Manuel Günther
, Terrance E. Boult:
PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses. CVPR Workshops 2016: 171-178 - [c6]Ethan M. Rudd, Terrance E. Boult:
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition. CVPR Workshops 2016: 195-203 - [c5]Andras Rozsa, Ethan M. Rudd, Terrance E. Boult:
Adversarial Diversity and Hard Positive Generation. CVPR Workshops 2016: 410-417 - [c4]Ethan M. Rudd, Manuel Günther
, Terrance E. Boult:
MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes. ECCV (5) 2016: 19-35 - [c3]Andras Rozsa, Manuel Günther
, Ethan M. Rudd, Terrance E. Boult:
Are facial attributes adversarially robust? ICPR 2016: 3121-3127 - [c2]Khudran Alzhrani
, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow:
Automated big text security classification. ISI 2016: 103-108 - [i8]Ethan M. Rudd, Andras Rozsa, Manuel Günther, Terrance E. Boult:
A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions. CoRR abs/1603.06028 (2016) - [i7]Ethan M. Rudd, Manuel Günther, Terrance E. Boult:
MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes. CoRR abs/1603.07027 (2016) - [i6]Andras Rozsa, Ethan M. Rudd, Terrance E. Boult:
Adversarial Diversity and Hard Positive Generation. CoRR abs/1605.01775 (2016) - [i5]Ethan M. Rudd, Terrance E. Boult:
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition. CoRR abs/1605.03116 (2016) - [i4]Ethan M. Rudd, Manuel Günther, Terrance E. Boult:
PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses. CoRR abs/1605.03124 (2016) - [i3]Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult:
Are Facial Attributes Adversarially Robust? CoRR abs/1605.05411 (2016) - [i2]Khudran Alzhrani, Ethan M. Rudd, Terrance E. Boult, C. Edward Chow:
Automated Big Text Security Classification. CoRR abs/1610.06856 (2016) - 2015
- [i1]Ethan M. Rudd, Lalit P. Jain, Walter J. Scheirer, Terrance E. Boult:
The Extreme Value Machine. CoRR abs/1506.06112 (2015) - 2014
- [c1]Michael J. Wilber
, Ethan M. Rudd, Brian Heflin, Yui-Man Lui, Terrance E. Boult:
Exemplar codes for facial attributes and tattoo recognition. WACV 2014: 205-212
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-26 01:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint