default search action
Edward Bowen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen:
FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks. CCWC 2024: 28-35 - [c18]Harika Abburi, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya:
Team Deloitte at PAN: A Novel Approach for Generative AI Text Detection. CLEF (Working Notes) 2024: 2507-2510 - [c17]Cheng Wang, Christopher Redino, Ryan Clark, Abdul Rahman, Sal Aguinaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen:
Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations. CSR 2024: 262-269 - [c16]Dhruv Nandakumar, Devin Quinn, Elijah Soba, Eunyoung Kim, Christopher Redino, Chris Chan, Kevin Choi, Abdul Rahman, Edward Bowen:
Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks. ICNC 2024: 168-174 - [c15]Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen:
Cross-Temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach. ICNC 2024: 423-429 - [c14]Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning. ICNC 2024: 635-640 - [c13]Haohui Wang, Yuzhen Mao, Yujun Yan, Yaoqing Yang, Jianhui Sun, Kevin Choi, Balaji Veeramani, Alison Hu, Edward Bowen, Tyler Cody, Dawei Zhou:
EvoluNet: Advancing Dynamic Non-IID Transfer Learning on Graphs. ICML 2024 - [i21]Cheng Wang, Akshay Kakkar, Christopher Redino, Abdul Rahman, Ajinsyam S, Ryan Clark, Daniel Radke, Tyler Cody, Lanxiao Huang, Edward Bowen:
Discovering Command and Control Channels Using Reinforcement Learning. CoRR abs/2401.07154 (2024) - [i20]Cheng Wang, Christopher Redino, Abdul Rahman, Ryan Clark, Daniel Radke, Tyler Cody, Dhruv Nandakumar, Edward Bowen:
Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning. CoRR abs/2402.09200 (2024) - [i19]Cheng Wang, Christopher Redino, Ryan Clark, Abdul Rahman, Sal Aguinaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen:
Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations. CoRR abs/2406.17576 (2024) - [i18]Sayyed Farid Ahamed, Soumya Banerjee, Sandip Roy, Devin Quinn, Marc Vucovich, Kevin Choi, Abdul Rahman, Alison Hu, Edward Bowen, Sachin Shetty:
Accuracy-Privacy Trade-off in the Mitigation of Membership Inference Attack in Federated Learning. CoRR abs/2407.19119 (2024) - [i17]Krishanu Das Baksi, Elijah Soba, John J. Higgins, Ravi Saini, Jaden Wood, Jane Cook, Jack Scott, Nirmala Pudota, Tim Weninger, Edward Bowen, Sanmitra Bhattacharya:
MedCodER: A Generative AI Assistant for Medical Coding. CoRR abs/2409.15368 (2024) - 2023
- [j1]Michael Suesserman, Samantha Gorny, Daniel Lasaga, John Helms, Dan Olson, Edward Bowen, Sanmitra Bhattacharya:
Procedure code overutilization detection from healthcare claims using unsupervised deep learning methods. BMC Medical Informatics Decis. Mak. 23(1): 196 (2023) - [c12]Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen:
Enhancing Exfiltration Path Analysis Using Reinforcement Learning. CAMLIS 2023: 77-90 - [c11]Kai Wang, Daniel Lasaga, John Helms, Edward Bowen, Sanmitra Bhattacharya:
How far is too far? Identifying suspicious travel patterns in healthcare claims using machine learning. ICMLA 2023: 610-617 - [c10]Anvesh Matta, Michael Suesserman, David McNamee, Daniel Lasaga, Dan Olson, Edward Bowen, Sanmitra Bhattacharya:
Embedding Representations of Diagnosis Codes for Outlier Payment Detection. ICMLA 2023: 2153-2160 - [c9]Dhruv Nandakumar, Sathvik Murli, Ankur Khosla, Kevin Choi, Abdul Rahman, Drew Walsh, Scott Riede, Eric Dull, Edward Bowen:
A Novel Approach to User Agent String Parsing for Vulnerability Analysis Using Multi-Headed Attention. ICMLC 2023: 105-113 - [c8]Sal Aguinaga, Daniel Lasaga, Shivashankar Danthuri, John Helms, Edward Bowen, Sanmitra Bhattacharya:
Identification of Providers with Similar Risk Profiles in Healthcare Claims Using Graphs. ISDFS 2023: 1-6 - [c7]Marc Vucovich, Amogh Kamat Tarcar, Penjo Rebelo, Abdul Rahman, Dhruv Nandakumar, Christopher Redino, Kevin Choi, Robert Schiller, Sanmitra Bhattacharya, Balaji Veeramani, Alex West, Edward Bowen:
Anomaly Detection via Federated Learning. ITNAC 2023: 259-266 - [c6]Sumit Pai, Vivek Kumar Singh, Sanvi Gupta, Pavani Chavali, Siddhartha Siddhartha, Edward Bowen, Sunil R. Tiyyagura:
Graph Representational Learning for Internal Audit. ISWC (Posters/Demos/Industry) 2023 - [c5]Harika Abburi, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya:
Generative AI Text Classification using Ensemble LLM Approaches. IberLEF@SEPLN 2023 - [c4]Harika Abburi, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya:
An Ensemble-Based Approach for Generative Language Model Attribution. WISE 2023: 699-709 - [i16]Dhruv Nandakumar, Devin Quinn, Elijah Soba, Eunyoung Kim, Christopher Redino, Chris Chan, Kevin Choi, Abdul Rahman, Edward Bowen:
Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks. CoRR abs/2305.15488 (2023) - [i15]Dhruv Nandakumar, Sathvik Murli, Ankur Khosla, Kevin Choi, Abdul Rahman, Drew Walsh, Scott Riede, Eric Dull, Edward Bowen:
A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention. CoRR abs/2306.03733 (2023) - [i14]Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen:
Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach. CoRR abs/2309.00700 (2023) - [i13]Harika Abburi, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya:
Generative AI Text Classification using Ensemble LLM Approaches. CoRR abs/2309.07755 (2023) - [i12]Harika Abburi, Tanya Chaudhary, Haider Ilyas, Lakshmi Manne, Deepak Mittal, Don Williams, Derek Snaidauf, Edward Bowen, Balaji Veeramani:
A Closer Look at Bearing Fault Classification Approaches. CoRR abs/2309.17001 (2023) - [i11]Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen:
Enhancing Exfiltration Path Analysis Using Reinforcement Learning. CoRR abs/2310.03667 (2023) - [i10]Harika Abburi, Kalyani Roy, Michael Suesserman, Nirmala Pudota, Balaji Veeramani, Edward Bowen, Sanmitra Bhattacharya:
A Simple yet Efficient Ensemble Approach for AI-generated Text Detection. CoRR abs/2311.03084 (2023) - [i9]Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning. CoRR abs/2312.00051 (2023) - [i8]Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen:
FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks. CoRR abs/2312.04587 (2023) - 2022
- [c3]Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter A. Beling, Edward Bowen:
Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs. DSC 2022: 1-8 - [c2]Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha:
Zero Day Threat Detection Using Metric Learning Autoencoders. ICMLA 2022: 1318-1325 - [c1]Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter A. Beling, Edward Bowen:
Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain. ICMLA 2022: 1350-1357 - [i7]Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter A. Beling, Edward Bowen:
Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs. CoRR abs/2201.12416 (2022) - [i6]Christopher Redino, Dhruv Nandakumar, Robert Schiller, Kevin Choi, Abdul Rahman, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila:
Zero Day Threat Detection Using Graph and Flow Based Security Telemetry. CoRR abs/2205.02298 (2022) - [i5]J. Lian, Kevin Choi, Balaji Veeramani, Alison Hu, L. Freeman, Edward Bowen, X. Deng:
Do-AIQ: A Design-of-Experiment Approach to Quality Evaluation of AI Mislabel Detection Algorithm. CoRR abs/2208.09953 (2022) - [i4]Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila:
Lateral Movement Detection Using User Behavioral Analysis. CoRR abs/2208.13524 (2022) - [i3]Marc Vucovich, Amogh Kamat Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani:
Anomaly Detection via Federated Learning. CoRR abs/2210.06614 (2022) - [i2]Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha:
Zero Day Threat Detection Using Metric Learning Autoencoders. CoRR abs/2211.00441 (2022) - [i1]Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter A. Beling, Edward Bowen:
Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain. CoRR abs/2211.03027 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint