Picture for Nicole Nichols

Nicole Nichols

Pacific Northwest National Laboratory

Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies

Add code
Nov 30, 2022
Viaarxiv icon

Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments

Add code
Sep 26, 2020
Figure 1 for Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments
Figure 2 for Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments
Figure 3 for Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments
Figure 4 for Machine Learning Algorithms for Active Monitoring of High Performance Computing as a Service (HPCaaS) Cloud Environments
Viaarxiv icon

Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers

Add code
Apr 24, 2020
Figure 1 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 2 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 3 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Figure 4 for Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers
Viaarxiv icon

Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers

Add code
Oct 16, 2018
Figure 1 for Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers
Figure 2 for Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers
Figure 3 for Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers
Figure 4 for Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers
Viaarxiv icon

Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection

Add code
Mar 13, 2018
Figure 1 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 2 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 3 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Figure 4 for Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
Viaarxiv icon

Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams

Add code
Dec 15, 2017
Figure 1 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 2 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 3 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Figure 4 for Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams
Viaarxiv icon

Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection

Add code
Dec 02, 2017
Figure 1 for Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
Figure 2 for Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
Figure 3 for Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
Figure 4 for Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly Detection
Viaarxiv icon

Faster Fuzzing: Reinitialization with Deep Neural Models

Add code
Nov 08, 2017
Figure 1 for Faster Fuzzing: Reinitialization with Deep Neural Models
Figure 2 for Faster Fuzzing: Reinitialization with Deep Neural Models
Figure 3 for Faster Fuzzing: Reinitialization with Deep Neural Models
Viaarxiv icon