Search Results for author: Ryan Sheatsley

Found 9 papers, 1 papers with code

The Space of Adversarial Strategies

no code implementations9 Sep 2022 Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel

From our evaluation we find that attack performance to be highly contextual: the domain, model robustness, and threat model can have a profound influence on attack efficacy.

Adversarial Plannning

no code implementations1 May 2022 Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin Chan, Trent Jaeger, Patrick McDaniel

We evaluate the performance of the algorithms against two dominant planning algorithms used in commercial applications (D* Lite and Fast Downward) and show both are vulnerable to extremely limited adversarial action.

Autonomous Vehicles Management

HoneyModels: Machine Learning Honeypots

no code implementations21 Feb 2022 Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler Shipp, Patrick McDaniel

To harden these systems the ever-growing field of Adversarial Machine Learning has proposed new attack and defense mechanisms.

BIG-bench Machine Learning Computational Efficiency

Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations

no code implementations21 Feb 2022 Ryan Sheatsley, Matthew Durbin, Azaree Lintereur, Patrick McDaniel

With four and eight detector arrays, we collect counts of gamma-rays as features for a suite of machine learning models to localize radioactive material.

Malware Detection

On the Robustness of Domain Constraints

no code implementations18 May 2021 Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel

Machine learning is vulnerable to adversarial examples-inputs designed to cause models to perform poorly.

valid

Adversarial Examples in Constrained Domains

no code implementations2 Nov 2020 Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel

To assess how these algorithms perform, we evaluate them in constrained (e. g., network intrusion detection) and unconstrained (e. g., image recognition) domains.

Network Intrusion Detection

Detection under Privileged Information

no code implementations31 Mar 2016 Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami

In this paper, we consider an alternate learning approach that trains models using "privileged" information--features available at training time but not at runtime--to improve the accuracy and resilience of detection systems.

Face Recognition Malware Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.