Benjamin Edwards
Benjamin Edwards
Cyentia Institute
Verified email at
Cited by
Cited by
Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
AAAI Workshop on Artificial Intelligence Safety 1 (1), 2019
Hype and heavy tails: A closer look at data breaches
B Edwards, S Hofmeyr, S Forrest
Journal of Cybersecurity 2 (1), 3-14, 2016
Adversarial Robustness Toolbox v0.3.0
BE Maria-Irina Nicolae, Mathieu Sinn, Minh Ngoc Tran, Ambrish Rawat, Martin ...
ArXiV, 2018
Enhancing privacy in participatory sensing applications with multidimensional data
MM Groat, B Edwards, J Horey, W He, S Forrest
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
Adversarial Robustness Toolbox v0. 2.2
MI Nicolae, M Sinn, TN Minh, A Rawat, M Wistuba, V Zantedeschi, ...
Defending against neural network model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
Strategic aspects of cyberattack, attribution, and blame
B Edwards, A Furnas, S Forrest, R Axelrod
Proceedings of the National Academy of Sciences 114 (11), 2825-2830, 2017
Internet topology over time
B Edwards, S Hofmeyr, G Stelle, S Forrest
arXiv preprint arXiv:1202.3993, 2012
Application and analysis of multidimensional negative surveys in participatory sensing applications
MM Groat, B Edwards, J Horey, W He, S Forrest
Pervasive and Mobile Computing 9 (3), 372-391, 2013
Modeling internet-scale policies for cleaning up malware
S Hofmeyr, T Moore, S Forrest, B Edwards, G Stelle
Economics of Information Security and Privacy III, 149-170, 2013
Beyond the blacklist: modeling malware spread and the effect of interventions
B Edwards, T Moore, G Stelle, S Hofmeyr, S Forrest
Proceedings of the 2012 New Security Paradigms Workshop, 53-66, 2012
Advit: Adversarial frames identifier based on temporal consistency in videos
C Xiao, R Deng, B Li, T Lee, B Edwards, J Yi, D Song, M Liu, I Molloy
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
Exploit Prediction Scoring System (EPSS)
J Jacobs, S Romanosky, B Edwards, I Adjerid, M Roytman
Digital Threats: Research and Practice 2 (3), 1-17, 2021
Deep Neural Network Hardening Framework
BJ Edwards, T Lee, IM Molloy, D Su
US Patent App. 15/844,442, 2019
Energy and time determine scaling in biological and computer designs
M Moses, G Bezerra, B Edwards, J Brown, S Forrest
Philosophical Transactions of the Royal Society B: Biological Sciences 371 …, 2016
Analyzing and modeling longitudinal security data: Promise and pitfalls
B Edwards, S Hofmeyr, S Forrest, M Van Eeten
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Adversarial Robustness Toolbox v1. 2.0. CoRR 1807.01069 (2018)
MI Nicolae, M Sinn, MN Tran, B Buesser, A Rawat, M Wistuba, ...
Adversarial learning of privacy protection layers for image recognition services
BJ Edwards, H Huang, T Lee, IM Molloy, D Su
US Patent 10,535,120, 2020
Borders and gateways: measuring and analyzing national as chokepoints
KG Leyba, B Edwards, C Freeman, JR Crandall, S Forrest
Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable …, 2019
Risky business: Assessing security with external measurements
B Edwards, J Jacobs, S Forrest
arXiv preprint arXiv:1904.11052, 2019
The system can't perform the operation now. Try again later.
Articles 1–20