|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9948 occurrences of 4956 keywords
|
|
|
Results
Found 9558 publication records. Showing 9558 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
49 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jong Youl Choi, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil |
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
49 | David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng 0002 |
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. |
SP |
2008 |
DBLP DOI BibTeX RDF |
exploit generation, combined execution, symbolic execution, test case generation, patch |
49 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi |
Packet vaccine: black-box exploit detection and signature generation. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
46 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
Analyzing network traffic to detect self-decrypting exploit code. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
exploit code, static analysis, emulation, detection, polymorphic, decryption |
46 | Alex McMahon, Dan Scott 0002, William N. L. Browne |
An autonomous explore/exploit strategy. |
GECCO Workshops |
2005 |
DBLP DOI BibTeX RDF |
explore/exploit strategy, learning classifier systems, genetics-based machine learning |
35 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu 0005, Sencun Zhu |
Detecting Remote Exploits Using Data Mining. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
Server attacks, exploit code, data mining, attack detection |
35 | Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant |
Automatic discovery of API-level exploits. |
ICSE |
2005 |
DBLP DOI BibTeX RDF |
API-level exploit, bounded model checking |
35 | Paul Ammann, Duminda Wijesekera, Saket Kaushik |
Scalable, graph-based network vulnerability analysis. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
monotonic analysis, model checking, scalability, network security, vulnerability, exploit |
32 | Thomas Toth, Christopher Krügel |
Accurate Buffer Overflow Detection via Abstract Payload Execution. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Intrusion Detecion, Buffer Overflow Exploit, Network Security |
29 | Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang |
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. |
DSC |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Clément Laverdet |
Relations publiques et Exploitation des RéSeaux sociaux NUMéRiques en gestion des Crises: quels Rôles de Facebook pour les gestionnaires FrançAIS, et comment Exploiter CE canal de FAçon pertinente ? (Communicate and Exploit Digital Social Networks in Crisis Management: What are the Facebook Capacities for French Managers, and How to Exploit this Medium in a Relevant Way ?). |
|
2021 |
RDF |
|
29 | Fadi Yilmaz, Meera Sridhar, Wontae Choi |
Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine. |
ACSAC |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Murat Yilmaz |
Contracting with a naïve time-inconsistent agent: To exploit or not to exploit? |
Math. Soc. Sci. |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Chao Yang, Tao Zheng, Zhitian Lin |
A-R Exploit: An Automatic ROP Exploit Based on Long Sequence. |
SERE (Companion) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Vadim Kotov, Fabio Massacci |
Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts. |
ESSoS |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay |
Probability of Attack Based on System Vulnerability Life Cycle. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA |
28 | Daewon Kim, Yangseo Choi, Ikkyun Kim, Jintae Oh, Jongsoo Jang |
Function Call Mechanism Based Executable Code Detection for the Network Security. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
shellcode, security, network, exploit |
28 | Ramkumar Chinchani, Eric van den Berg |
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh |
Applications of a feather-weight virtual machine. |
VEE |
2008 |
DBLP DOI BibTeX RDF |
binary server, browser exploit, information theft, virtual machine, web crawler |
25 | Mustapha Refai |
Exploiting a buffer overflow using metasploit framework. |
PST |
2006 |
DBLP DOI BibTeX RDF |
metasploit, framework, buffer overflow, exploit, buffer overrun |
25 | Iván Arce |
The Kernel Craze. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
kernel bugs, kernel security, exploit code, vulnerabilities |
25 | Richard Lippmann, Seth E. Webster, Douglas Stetson |
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm |
25 | Christophe Baraer, Kaustubh S. Phanse, Johan Nykvist, Luka Birsa |
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Daniele Paolo Scarpazza, Praveen Raghavan, David Novo, Francky Catthoor, Diederik Verkest |
Software Simultaneous Multi-Threading, a Technique to Exploit Task-Level Parallelism to Improve Instruction- and Data-Level Parallelism. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Zhiyuan Zhang, Yao Zhao |
A New Transform with Extended Product to Exploit Different Scale Redundance. |
ICICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Sabyasachi Saha, Sandip Sen |
Aggressive Pricing to Exploit Market Niches in Supply Chains. |
IEEE Intell. Syst. |
2005 |
DBLP DOI BibTeX RDF |
pricing and scheduling strategies, wealth maximization, market niche, software agents, supply chain management |
22 | Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute |
Simulating cyber-attacks for fun and profit. |
SimuTools |
2009 |
DBLP DOI BibTeX RDF |
0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack |
22 | Luis Campo-Giralte, Ricardo Jiménez-Peris, Marta Patiño-Martínez |
PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic Exploits. |
SRDS |
2009 |
DBLP DOI BibTeX RDF |
polymorphic malware, metamorphic malware, zero-day malware, web server, vulnerability, exploit |
22 | Leevar Williams, Richard Lippmann, Kyle Ingols |
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
attack path, visualization, network, recommendation, vulnerability, treemap, security metrics, attack graph, exploit, adversary model |
22 | Scott O'Hare, Steven Noel, Kenneth Prole |
A Graph-Theoretic Visualization Approach to Network Risk Analysis. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment |
22 | Melanie Tupper, Nur Zincir-Heywood |
VEA-bility Security Metric: A Network Security Analysis Tool. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
network security, Attackability, Vulnerability, security metric, attack graphs, exploit, Exploitability, quantitative measure |
22 | Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup |
A weakest-adversary security metric for network configuration security analysis. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
network security, vulnerability, security metric, attack graphs, exploit, quantitative measure |
22 | Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey |
A framework for establishing, assessing, and managing trust in inter-organizational relationships. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
access graphs, network sharing, scalability, network security, vulnerability, attack graphs, exploit |
22 | Misha Zitser, Richard Lippmann, Tim Leek |
Testing static analysis tools using exploitable buffer overflows from open source code. |
SIGSOFT FSE |
2004 |
DBLP DOI BibTeX RDF |
test detection, security, evaluation, static analysis, source code, buffer overflow, exploit, false alarm |
21 | Omer Khan, Sandip Kundu |
A model to exploit power-performance efficiency in superscalar processors via structure resizing. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
modeling, power |
21 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Woo-Cheol Kwon, Sungjoo Yoo, Sung-Min Hong, Byeong Min, Kyu-Myung Choi, Soo-Kwan Eo |
A practical approach of memory access parallelization to exploit multiple off-chip DDR memories. |
DAC |
2008 |
DBLP DOI BibTeX RDF |
parallelization, memory, arbitration |
21 | Ashish Deshpande, Jonathan E. Luntz |
A method to characterize and exploit actuation redundancy in mobility and manipulation. |
IROS |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Venkat Pothamsetty, Prabhaker Mateti |
A case for exploit-robust and attack-aware protocol RFCs. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yabo Li, Xiang-Gen Xia 0001, Genyuan Wang |
Simple iterative methods to exploit the signal-space diversity. |
IEEE Trans. Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jingyu Zhou, Giovanni Vigna |
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs 0001 |
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka |
Testing Detector Parameterization Using Evolutionary Exploit Generation. |
EvoWorkshops |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Pedro M. Q. Aguiar, João M. F. Xavier, Marko Stosic |
Globally optimal solution to exploit rigidity when recovering structure from motion under occlusion. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
Protecting web services from remote exploit code: a static analysis approach. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
static analysis, http, code injection attack |
18 | Carlos Morra, João Bispo, João M. P. Cardoso, Jürgen Becker 0001 |
Combining Rewriting-Logic, Architecture Generation, and Simulation to Exploit Coarse-Grained Reconfigurable Architectures. |
FCCM |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Fan Ding, Bin Wang 0004 |
An Axiomatic Approach to Exploit Term Dependencies in Language Model. |
AIRS |
2008 |
DBLP DOI BibTeX RDF |
Language Model, Term Dependency, Axiomatic Approach, Retrieval Heuristics |
18 | Maristella Agosti, Tullio Coppotelli, Nicola Ferro 0001, Luca Pretto |
An Approach for the Construction of an Experimental Test Collection to Evaluate Search Systems that Exploit Annotations. |
DELOS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Kejing Liu, Javier Garcia-Frías |
Hidden Markov Models as Self-Organizing Maps to Exploit Time Dependencies in Data Clustering. |
CISS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Taehee Lee 0001, Junho Shim, Hyunja Lee, Sang-goo Lee |
A Pragmatic Approach to Model and Exploit the Semantics of Product Information. |
J. Data Semantics |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Lixin Shi, Jian-Yun Nie |
Filtering or adapting: two strategies to exploit noisy parallel corpora for cross-language information retrieval. |
CIKM |
2006 |
DBLP DOI BibTeX RDF |
alignment score, parallel corpus, noise filtering |
18 | Prashant Jain, Andrew Laffely, Wayne P. Burleson, Russell Tessier, Dennis Goeckel |
Dynamically Parameterized Algorithms and Architectures to Exploit Signal Variations. |
J. VLSI Signal Process. |
2004 |
DBLP DOI BibTeX RDF |
VLSI, motion estimation, digital signal processing, MPEG, power-aware |
18 | Franco Frattolillo |
A PVM Extension to Exploit Cluster Grids. |
PVM/MPI |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Jike Cui, Mansur H. Samadzadeh |
A new hybrid approach to exploit localities: LRFU with adaptive prefetching. |
SIGMETRICS Perform. Evaluation Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Per Stenström |
One Chip, One Server: How Do We Exploit Its Power? |
HiPC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Stavroula Zoi, Dimitrios Loukatos, Lambros Sarakis, Panagiotis Stathopoulos, Nikolas Mitrou |
Extending an Open MPEG-4 Video Streaming Platform to Exploit a Differentiated Services Network. |
HSNMC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Kaushal R. Gandhi, Nihar R. Mahapatra |
A Study of Hardware Techniques That Dynamically Exploit Frequent Operands to Reduce Power Consumption in Integer Function Units. |
ICCD |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Narasimhan Ramasubramanian, Ram Subramanian, Santosh Pande |
Automatic Compilation of Loops to Exploit Operator Parallelism on Configurable Arithmetic Logic Units. |
IEEE Trans. Parallel Distributed Syst. |
2002 |
DBLP DOI BibTeX RDF |
operator parallelism, FPGAs, parallel computing, Compilers, loop transformation, reconfigurable systems |
18 | Petko Faber, Bob Fisher |
How can we exploit typical architectural structures to improve model recovery? |
3DPVT |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Yong Yan 0003, Xiaodong Zhang 0001, Zhao Zhang 0010 |
Cacheminer: A Runtime Approach to Exploit Cache Locality on SMP. |
IEEE Trans. Parallel Distributed Syst. |
2000 |
DBLP DOI BibTeX RDF |
symmetric multiprocessors (SMP) and task scheduling, simulation, runtime systems, nested loops, Cache locality |
18 | Narasimhan Ramasubramanian, Ram Subramanian, Santosh Pande |
Automatic Analysis of Loops to Exploit Operator Parallelism on Reconfigurable Systems. |
LCPC |
1998 |
DBLP DOI BibTeX RDF |
|
15 | Sara Saponaro, Francesca Lizzi, Giacomo Serra, Francesca Mainas, Piernicola Oliva, Alessia Giuliano, Sara Calderoni, Alessandra Retico |
Deep learning based joint fusion approach to exploit anatomical and functional brain information in autism spectrum disorders. |
Brain Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Subhalakshmi Gooptu, Shiv Issar |
Book Reviews: Worn Out: How Retailers Surveil and Exploit Workers in the Digital Age and How Workers Are Fighting Back Madison Van Oort. |
New Media Soc. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Juncheng Zhang, Qingmin Liao, Haoyu Ma, Jing-Hao Xue, Wenming Yang, Shaojun Liu |
Exploit the Best of Both End-to-End and Map-Based Methods for Multi-Focus Image Fusion. |
IEEE Trans. Multim. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Lilin Xu, Chaojie Gu, Rui Tan 0001, Shibo He, Jiming Chen |
MESEN: Exploit Multimodal Data to Design Unimodal Human Activity Recognition with Few Labels. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Cheng Qian, Shihao Liang, Yujia Qin, Yining Ye, Xin Cong, Yankai Lin, Yesai Wu, Zhiyuan Liu 0001, Maosong Sun 0001 |
Investigate-Consolidate-Exploit: A General Strategy for Inter-Task Agent Self-Evolution. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Siwei Liu 0012, Ke Ma, Stephan M. Goetz |
A Robbins-Monro Sequence That Can Exploit Prior Information For Faster Convergence. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Dandan Xu, Kai Chen 0012, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang |
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Simona Bottani, Elina Thibeau-Sutre, Aurélien Maire, Sebastian Ströer, Didier Dormont, Olivier Colliot, Ninon Burgos |
Contrast-enhanced to non-contrast-enhanced image translation to exploit a clinical data warehouse of T1-weighted brain MRI. |
BMC Medical Imaging |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yichi Zhang, Zhihao Duan, Ming Lu, Dandan Ding, Fengqing Zhu 0001, Zhan Ma |
Another Way to the Top: Exploit Contextual Clustering in Learned Image Coding. |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Matteo Castiglioni, Alberto Latino, Alberto Marchesi 0001, Giulia Romano, Nicola Gatti 0001, Chokha Palayamkottai |
Finding Effective Ad Allocations: How to Exploit User History. |
AAMAS |
2024 |
DBLP BibTeX RDF |
|
15 | Xingran Chen, Hesam Nikpey, Jungyeol Kim, Saswati Sarkar, Shirin Saeedi Bidokhti |
Containing a spread through sequential learning: to exploit or to explore? |
Trans. Mach. Learn. Res. |
2023 |
DBLP BibTeX RDF |
|
15 | Marta Catillo, Umberto Villano, Massimiliano Rak |
A survey on auto-scaling: how to exploit cloud elasticity. |
Int. J. Grid Util. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Nikhil Iyer, V. Thejas, Nipun Kwatra, Ramachandran Ramjee, Muthian Sivathanu |
Wide-minima Density Hypothesis and the Explore-Exploit Learning Rate Schedule. |
J. Mach. Learn. Res. |
2023 |
DBLP BibTeX RDF |
|
15 | Mohammadreza Mohades Kasaei, Miguel Abreu, Nuno Lau, Artur Pereira, Luís Paulo Reis, Zhibin Li 0001 |
Learning hybrid locomotion skills - Learn to exploit residual actions and modulate model-based gait control. |
Frontiers Robotics AI |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mengxin Yu, Aimin Tang, Xudong Wang 0001, Jinnan Liu |
FDOE: Exploit Concurrent Communication Opportunities in Full-Duplex Wireless Mesh Networks. |
IEEE Trans. Mob. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Lennert Van der Schraelen, Kristof Stouthuysen, Seppe K. L. M. vanden Broucke, Tim Verdonck |
Regularization oversampling for classification tasks: To exploit what you do not know. |
Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hao Tian, Hong Zhang, Juncheng Jia, Mianxiong Dong, Kaoru Ota |
FedBroadcast: Exploit Broadcast Channel for Fast Convergence in Wireless Federated Learning. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ronen Shaltiel |
Is it possible to improve Yao's XOR lemma using reductions that exploit the efficiency of their oracle? |
Comput. Complex. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Guifang Duan, Yunkun Xu, Zhenyu Liu 0005, Jianrong Tan |
Hand-in-Hand Guidance: An Explore-Exploit Based Reinforcement Learning Method for Performance Driven Assembly-Adjustment. |
IEEE Trans. Ind. Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Vincent Werner, Laurent Maingault, Marie-Laure Potet |
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers. |
J. Cryptogr. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hayley Hung |
How AI can Exploit Body Language to Understand Social Behaviour in the Wild. |
ERCIM News |
2023 |
DBLP BibTeX RDF |
|
15 | Noah L. Schrick, Peter J. Hawrylak |
State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing. |
IEEE Open J. Comput. Soc. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yu Wang, Yipeng Zhang, Zhoujun Li 0001 |
AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree. |
Symmetry |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Scott Cheng-Hsin Yang, Chirag Rank, Jake Alden Whritner, Olfa Nasraoui, Patrick Shafto |
Human Variability and the Explore-Exploit Trade-Off in Recommendation. |
Cogn. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko, Sergey Verevkin |
An Analytical Review of the Source Code Models for Exploit Analysis. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Iñigo Flores Ituarte, Suraj Panicker, Hari P. N. Nagarajan, Eric Coatanéa, David W. Rosen |
Optimisation-driven design to explore and exploit the process-structure-property-performance linkages in digital manufacturing. |
J. Intell. Manuf. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | David M. Bossens, Nicholas Bishop |
Explicit Explore, Exploit, or Escape (E4): near-optimal safety-constrained reinforcement learning in polynomial time. |
Mach. Learn. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Debojyoti Biswas, Andrew G. Lamperski, Yu Yang, Kathleen Hoffman, John Guckenheimer, Eric S. Fortune, Noah J. Cowan |
Mode switching in organisms for solving explore-versus-exploit problems. |
Nat. Mac. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Sahibzada Adil Shahzad, Ammarah Hashmi, Yan-Tsung Peng, Yu Tsao 0001, Hsin-Min Wang |
AV-Lip-Sync+: Leveraging AV-HuBERT to Exploit Multimodal Inconsistency for Video Deepfake Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tong Wang 0036, Shuichi Kurabayashi |
Adaptive Multi-NeRF: Exploit Efficient Parallelism in Adaptive Multiple Scale Neural Radiance Field Rendering. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi |
EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jiren Mai, Fei Zhang, Junjie Ye, Marcus Kalander, Xian Zhang, Wankou Yang, Tongliang Liu, Bo Han 0003 |
Exploit CAM by itself: Complementary Learning System for Weakly Supervised Semantic Segmentation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ke Xu, Jiangtao Wang 0001, Hongyuan Zhu, Dingchang Zheng |
Exploit the antenna response consistency to define the alignment criteria for CSI data. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jay Jacobs, Sasha Romanosky, Octavian Suciuo, Benjamin Edwards, Armin Sarabi |
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yimeng Chen, Tianyang Hu, Fengwei Zhou, Zhenguo Li, Zhiming Ma |
Explore and Exploit the Diverse Knowledge in Model Zoo for Domain Generalization. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Andrea Apicella 0001, Luca Di Lorenzo, Francesco Isgrò, Andrea Pollastro, Roberto Prevete |
Strategies to exploit XAI to improve classification systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian 0001, Niraj K. Jha |
ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version). |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Bharath Muppasani, Vishal Pallagani, Biplav Srivastava, Raghava Mutharaju, Michael N. Huhns, Vignesh Narayanan |
A Planning Ontology to Represent and Exploit Planning Knowledge for Performance Efficiency. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Francesco Bacchiocchi, Matteo Castiglioni, Alberto Marchesi 0001, Nicola Gatti 0001 |
Learning Optimal Contracts: How to Exploit Small Action Spaces. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 9558 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|