Picture for Edward Raff

Edward Raff

University of Maryland, Baltimore County, Booz Allen Hamilton

Differentially Private Iterative Screening Rules for Linear Regression

Add code
Feb 25, 2025
Viaarxiv icon

Multi-layer Radial Basis Function Networks for Out-of-distribution Detection

Add code
Jan 05, 2025
Figure 1 for Multi-layer Radial Basis Function Networks for Out-of-distribution Detection
Figure 2 for Multi-layer Radial Basis Function Networks for Out-of-distribution Detection
Figure 3 for Multi-layer Radial Basis Function Networks for Out-of-distribution Detection
Figure 4 for Multi-layer Radial Basis Function Networks for Out-of-distribution Detection
Viaarxiv icon

Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation

Add code
Dec 24, 2024
Figure 1 for Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation
Figure 2 for Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation
Figure 3 for Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation
Figure 4 for Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation
Viaarxiv icon

Human-Readable Adversarial Prompts: An Investigation into LLM Vulnerabilities Using Situational Context

Add code
Dec 20, 2024
Figure 1 for Human-Readable Adversarial Prompts: An Investigation into LLM Vulnerabilities Using Situational Context
Figure 2 for Human-Readable Adversarial Prompts: An Investigation into LLM Vulnerabilities Using Situational Context
Figure 3 for Human-Readable Adversarial Prompts: An Investigation into LLM Vulnerabilities Using Situational Context
Figure 4 for Human-Readable Adversarial Prompts: An Investigation into LLM Vulnerabilities Using Situational Context
Viaarxiv icon

What Do Machine Learning Researchers Mean by "Reproducible"?

Add code
Dec 05, 2024
Viaarxiv icon

Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection

Add code
Nov 27, 2024
Figure 1 for Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection
Figure 2 for Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection
Figure 3 for Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection
Figure 4 for Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection
Viaarxiv icon

Stabilizing Linear Passive-Aggressive Online Learning with Weighted Reservoir Sampling

Add code
Oct 31, 2024
Figure 1 for Stabilizing Linear Passive-Aggressive Online Learning with Weighted Reservoir Sampling
Figure 2 for Stabilizing Linear Passive-Aggressive Online Learning with Weighted Reservoir Sampling
Figure 3 for Stabilizing Linear Passive-Aggressive Online Learning with Weighted Reservoir Sampling
Figure 4 for Stabilizing Linear Passive-Aggressive Online Learning with Weighted Reservoir Sampling
Viaarxiv icon

A Walsh Hadamard Derived Linear Vector Symbolic Architecture

Add code
Oct 30, 2024
Viaarxiv icon

Is Function Similarity Over-Engineered? Building a Benchmark

Add code
Oct 30, 2024
Viaarxiv icon

Position: Challenges and Opportunities for Differential Privacy in the U.S. Federal Government

Add code
Oct 21, 2024
Viaarxiv icon