<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://keanelucas.com/portfolio/portfolio-1/</loc>
</url>
<url>
<loc>https://keanelucas.com/portfolio/portfolio-2/</loc>
</url>
<url>
<loc>https://keanelucas.com/posts/2012/08/blog-post-1/</loc>
<lastmod>2012-08-14T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/posts/2013/08/blog-post-2/</loc>
<lastmod>2013-08-14T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/posts/2014/08/blog-post-3/</loc>
<lastmod>2014-08-14T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/posts/2012/08/blog-post-4/</loc>
<lastmod>2015-08-14T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/posts/2012/08/blog-post-4/</loc>
<lastmod>2199-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/projects/search-engine</loc>
<lastmod>2016-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/projects/doom-bot</loc>
<lastmod>2016-06-01T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/projects/cephalometric-landmarks</loc>
<lastmod>2017-05-01T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2019-06-01-creating-xbd</loc>
<lastmod>2019-06-01T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2021-06-07-malware-makeover-breaking-ml-based-static-analysis-by-modifying-executable-bytes</loc>
<lastmod>2021-06-07T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2022-05-11-anyplay-an-intrinsic-augmentation-for-zero-shot-coordination</loc>
<lastmod>2022-05-11T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2022-07-17-constrained-gradient-descent-a-powerful-and-principled-evasion-attack-against-neural-networks</loc>
<lastmod>2022-07-17T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2022-09-26-perspectives-from-a-comprehensive-evaluation-of-reconstruction-based-anomaly-detection-in-industrial-control-systems</loc>
<lastmod>2022-09-26T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2023-08-09-adversarial-training-for-raw-binary-malware-classifiers</loc>
<lastmod>2023-08-09T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2023-12-11-rs-del</loc>
<lastmod>2023-12-11T00:00:00-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2024-02-26-group-based-robustness</loc>
<lastmod>2024-02-26T00:00:00-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2024-10-15-robustness-proxies</loc>
<lastmod>2024-10-15T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/publications/2025-05-16-feasibility-llms-autonomous-network-attacks</loc>
<lastmod>2025-05-16T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/talks/2020-12-07-adversarial-training-with-a-surrogate</loc>
<lastmod>2020-12-07T00:00:00-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/talks/2021-06-07-malware-makeover-breaking-ml-based-static-analysis-by-modifying-executable-bytes</loc>
<lastmod>2021-06-07T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/talks/2022-05-11-anyplay-an-intrinsic-augmentation-for-zero-shot-coordination</loc>
<lastmod>2022-05-11T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/talks/2023-08-09-adversarial-training-for-raw-binary-malware-classifiers</loc>
<lastmod>2023-08-09T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/talks/2025-08-09-claude-climbing-a-ctf-scoreboard-near-you</loc>
<lastmod>2025-08-09T00:00:00-07:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/teaching/2014-spring-teaching-1</loc>
<lastmod>2014-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/teaching/2015-spring-teaching-1</loc>
<lastmod>2015-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/</loc>
</url>
<url>
<loc>https://keanelucas.com/archive-layout-with-content/</loc>
</url>
<url>
<loc>https://keanelucas.com/categories/</loc>
</url>
<url>
<loc>https://keanelucas.com/collection-archive/</loc>
</url>
<url>
<loc>https://keanelucas.com/cv/</loc>
</url>
<url>
<loc>https://keanelucas.com/markdown/</loc>
</url>
<url>
<loc>https://keanelucas.com/non-menu-page/</loc>
</url>
<url>
<loc>https://keanelucas.com/page-archive/</loc>
</url>
<url>
<loc>https://keanelucas.com/portfolio/</loc>
</url>
<url>
<loc>https://keanelucas.com/projects/</loc>
</url>
<url>
<loc>https://keanelucas.com/publications/</loc>
</url>
<url>
<loc>https://keanelucas.com/sitemap/</loc>
</url>
<url>
<loc>https://keanelucas.com/tags/</loc>
</url>
<url>
<loc>https://keanelucas.com/talkmap.html</loc>
</url>
<url>
<loc>https://keanelucas.com/talks/</loc>
</url>
<url>
<loc>https://keanelucas.com/teaching/</loc>
</url>
<url>
<loc>https://keanelucas.com/terms/</loc>
</url>
<url>
<loc>https://keanelucas.com/year-archive/</loc>
</url>
<url>
<loc>https://keanelucas.com/markdown_generator/</loc>
</url>
<url>
<loc>https://keanelucas.com/files/adversarial-training-surrogate-slides.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/anyplay.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/ccs24-training-robust-mlbased-rawbinary-malware-detectors.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/defcon33-claude-climbing-ctf-scoreboard-slides.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/esorics2022-ics-anomaly-detection-slides.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/esorics2022-ics-anomaly-detection.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/icml2022-better-attacks-slides.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/icml2022-better-attacks.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/malware-makeover-slides.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/malware-makeover.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/paper1.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/paper2.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/paper3.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/files/usenix-sec23-adversarial-training-malware-classifiers.pdf</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
<url>
<loc>https://keanelucas.com/talkmap/map.html</loc>
<lastmod>2026-02-22T17:04:21-08:00</lastmod>
</url>
</urlset>
