Picture for Erik Hemberg

Erik Hemberg

Evolving Code with A Large Language Model

Add code
Jan 13, 2024
Viaarxiv icon

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

Add code
Oct 10, 2023
Figure 1 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 2 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 3 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 4 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Viaarxiv icon

Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence

Add code
Aug 05, 2021
Figure 1 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 2 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 3 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 4 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Viaarxiv icon

Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks

Add code
Jun 25, 2021
Figure 1 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 2 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 3 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 4 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Viaarxiv icon

Proceedings - AI/ML for Cybersecurity: Challenges, Solutions, and Novel Ideas at SIAM Data Mining 2021

Add code
Apr 27, 2021
Viaarxiv icon

Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation

Add code
Apr 23, 2021
Figure 1 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 2 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 3 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 4 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Viaarxiv icon

Analyzing the Components of Distributed Coevolutionary GAN Training

Add code
Aug 03, 2020
Figure 1 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 2 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 3 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 4 for Analyzing the Components of Distributed Coevolutionary GAN Training
Viaarxiv icon

Parallel/distributed implementation of cellular training for generative adversarial neural networks

Add code
Apr 10, 2020
Figure 1 for Parallel/distributed implementation of cellular training for generative adversarial neural networks
Figure 2 for Parallel/distributed implementation of cellular training for generative adversarial neural networks
Figure 3 for Parallel/distributed implementation of cellular training for generative adversarial neural networks
Figure 4 for Parallel/distributed implementation of cellular training for generative adversarial neural networks
Viaarxiv icon

Data Dieting in GAN Training

Add code
Apr 07, 2020
Figure 1 for Data Dieting in GAN Training
Figure 2 for Data Dieting in GAN Training
Figure 3 for Data Dieting in GAN Training
Figure 4 for Data Dieting in GAN Training
Viaarxiv icon

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Add code
Apr 07, 2020
Figure 1 for Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Figure 2 for Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Figure 3 for Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Figure 4 for Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters
Viaarxiv icon