A survey of inverse reinforcement learning S Adams, T Cody, PA Beling Artificial Intelligence Review 55 (6), 4307-4346, 2022 | 64 | 2022 |
Using cyber terrain in reinforcement learning for penetration testing R Gangupantulu, T Cody, P Park, A Rahman, L Eisenbeiser, D Radke, ... 2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS …, 2022 | 31 | 2022 |
A systems theory of transfer learning T Cody, PA Beling IEEE Systems Journal 17 (1), 26-37, 2023 | 24 | 2023 |
A systems theoretic perspective on transfer learning T Cody, S Adams, PA Beling 2019 IEEE International Systems Conference (SysCon), 1-7, 2019 | 22 | 2019 |
Discovering exfiltration paths using reinforcement learning with attack graphs T Cody, A Rahman, C Redino, L Huang, R Clark, A Kakkar, D Kushwaha, ... 2022 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2022 | 17 | 2022 |
A utilitarian approach to adversarial learning in credit card fraud detection T Cody, S Adams, PA Beling 2018 Systems and Information Engineering Design Symposium (SIEDS), 237-242, 2018 | 17 | 2018 |
Systematic training and testing for machine learning using combinatorial interaction testing T Cody, E Lanus, DD Doyle, L Freeman 2022 IEEE International Conference on Software Testing, Verification and …, 2022 | 16 | 2022 |
Crown jewels analysis using reinforcement learning with attack graphs R Gangupantulu, T Cody, A Rahma, C Redino, R Clark, P Park 2021 IEEE Symposium Series on Computational Intelligence (SSCI), 1-6, 2021 | 16 | 2021 |
Generative adversarial networks for data augmentation and transfer in credit card fraud detection A Langevin, T Cody, S Adams, P Beling Journal of the Operational Research Society 73 (1), 153-180, 2022 | 14* | 2022 |
Mesarovician abstract learning systems T Cody Artificial General Intelligence: 14th International Conference, AGI 2021 …, 2022 | 14 | 2022 |
A layered reference model for penetration testing with reinforcement learning and attack graphs T Cody 2022 IEEE 29th Annual Software Technology Conference (STC), 41-50, 2022 | 13 | 2022 |
Empirically measuring transfer distance for system design and operation T Cody, S Adams, PA Beling IEEE Systems Journal 16 (3), 4962-4973, 2022 | 11 | 2022 |
Motivating a systems theory of AI T Cody, S Adams, P Beling Insight 23 (1), 37-40, 2020 | 9 | 2020 |
Closed systems paradigm for intelligent systems N Shadab, T Cody, A Salado, P Beling 2022 IEEE International Systems Conference (SysCon), 1-8, 2022 | 8 | 2022 |
Transferring random samples in actuator systems for binary damage detection T Cody, S Adams, PA Beling, S Polter, K Farinholt, N Hipwell, A Chaudhry, ... 2019 IEEE International Conference on Prognostics and Health Management …, 2019 | 8 | 2019 |
Exposing surveillance detection routes via reinforcement learning, attack graphs, and cyber terrain L Huang, T Cody, C Redino, A Rahman, A Kakkar, D Kushwaha, C Wang, ... 2022 21st IEEE International Conference on Machine Learning and Applications …, 2022 | 7 | 2022 |
Homomorphisms between transfer, multi-task, and meta-learning systems T Cody International Conference on Artificial General Intelligence, 199-208, 2022 | 5 | 2022 |
Heterogeneous transfer in deep learning for spectrogram classification in cognitive communications T Cody, PA Beling 2021 IEEE Cognitive Communications for Aerospace Applications Workshop …, 2021 | 4 | 2021 |
Application of machine learning to rotorcraft health monitoring T Cody, PJ Dempsey | 4 | 2017 |
Deterring Adversarial Learning in Penetration Testing by Exploiting Domain Adaptation Theory S Bera, L Glenn, A Raghavan, E Meno, T Cody, PA Beling 2023 Systems and Information Engineering Design Symposium (SIEDS), 314-318, 2023 | 3 | 2023 |