Picture for Scott Freitas

Scott Freitas

Polo

Web Scale Graph Mining for Cyber Threat Intelligence

Add code
Nov 09, 2024
Viaarxiv icon

AI-Driven Guided Response for Security Operation Centers with Microsoft Copilot for Security

Add code
Jul 12, 2024
Viaarxiv icon

EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models

Add code
Mar 30, 2021
Figure 1 for EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models
Figure 2 for EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models
Figure 3 for EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models
Figure 4 for EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models
Viaarxiv icon

MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software

Add code
Jan 31, 2021
Figure 1 for MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software
Figure 2 for MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software
Figure 3 for MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software
Figure 4 for MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software
Viaarxiv icon

A Large-Scale Database for Graph Representation Learning

Add code
Nov 16, 2020
Figure 1 for A Large-Scale Database for Graph Representation Learning
Figure 2 for A Large-Scale Database for Graph Representation Learning
Figure 3 for A Large-Scale Database for Graph Representation Learning
Figure 4 for A Large-Scale Database for Graph Representation Learning
Viaarxiv icon

ELF: An Early-Exiting Framework for Long-Tailed Classification

Add code
Jun 22, 2020
Figure 1 for ELF: An Early-Exiting Framework for Long-Tailed Classification
Figure 2 for ELF: An Early-Exiting Framework for Long-Tailed Classification
Figure 3 for ELF: An Early-Exiting Framework for Long-Tailed Classification
Figure 4 for ELF: An Early-Exiting Framework for Long-Tailed Classification
Viaarxiv icon

Evaluating Graph Vulnerability and Robustness using TIGER

Add code
Jun 10, 2020
Figure 1 for Evaluating Graph Vulnerability and Robustness using TIGER
Figure 2 for Evaluating Graph Vulnerability and Robustness using TIGER
Figure 3 for Evaluating Graph Vulnerability and Robustness using TIGER
Figure 4 for Evaluating Graph Vulnerability and Robustness using TIGER
Viaarxiv icon

UnMask: Adversarial Detection and Defense Through Robust Feature Alignment

Add code
Feb 21, 2020
Figure 1 for UnMask: Adversarial Detection and Defense Through Robust Feature Alignment
Figure 2 for UnMask: Adversarial Detection and Defense Through Robust Feature Alignment
Figure 3 for UnMask: Adversarial Detection and Defense Through Robust Feature Alignment
Figure 4 for UnMask: Adversarial Detection and Defense Through Robust Feature Alignment
Viaarxiv icon

REST: Robust and Efficient Neural Networks for Sleep Monitoring in the Wild

Add code
Jan 29, 2020
Figure 1 for REST: Robust and Efficient Neural Networks for Sleep Monitoring in the Wild
Figure 2 for REST: Robust and Efficient Neural Networks for Sleep Monitoring in the Wild
Figure 3 for REST: Robust and Efficient Neural Networks for Sleep Monitoring in the Wild
Figure 4 for REST: Robust and Efficient Neural Networks for Sleep Monitoring in the Wild
Viaarxiv icon