Adversarial Training for Raw-Binary Malware Classifiers K. Lucas, S. Pai, W. Lin, L. Bauer, M. K. Reiter, and M. Sharif. USENIX Security '23. To appear. [BibTeX] Get details
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems C. Fung, S. Srinarasi, K. Lucas, H. B. Phee, L. Bauer. ESORICS'22. [BibTeX] Get details or download paper
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks W. Lin, K. Lucas, L. Bauer, M. K. Reiter, M. Sharif. ICML'22. [BibTeX] Get details or download paper
Any-Play: an Intrinsic Augmentation for Zero-Shot Coordination K. Lucas, R. Allen. AAMAS'22. [BibTeX] Get details or download paper
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes K. Lucas, M. Sharif, L. Bauer, M. K. Reiter, and S. Shintre. AsiaCCS'21. [BibTeX] Get details or download paper