Ethan M. Rudd

ORCID: 0000-0001-8831-5514
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Face recognition and analysis
  • Anomaly Detection Techniques and Applications
  • Face and Expression Recognition
  • Adversarial Robustness in Machine Learning
  • Generative Adversarial Networks and Image Synthesis
  • Biometric Identification and Security
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Digital and Cyber Forensics
  • Bayesian Modeling and Causal Inference
  • Advanced Image and Video Retrieval Techniques
  • Advanced Neural Network Applications
  • Forensic Fingerprint Detection Methods
  • Gaussian Processes and Bayesian Inference
  • Domain Adaptation and Few-Shot Learning
  • Internet Traffic Analysis and Secure E-voting
  • Data Quality and Management
  • Machine Learning and ELM
  • Neural Networks and Applications
  • Artificial Immune Systems Applications

University of Colorado Colorado Springs
2016-2017

It is often desirable to be able recognize when inputs a recognition function learned in supervised manner correspond classes unseen at training time. With this ability, new class labels could assigned these by human operator, allowing them incorporated into the --- ideally under an efficient incremental update mechanism. While good algorithms that assume from fixed set of exist, e.g., artificial neural networks and kernel machines, it not immediately obvious how extend perform learning...

10.1109/tpami.2017.2707495 article EN publisher-specific-oa IEEE Transactions on Pattern Analysis and Machine Intelligence 2017-05-23

State-of-the-art deep neural networks suffer from a fundamental problem - they misclassify adversarial examples formed by applying small perturbations to inputs. In this paper, we present new psychometric perceptual similarity score (PASS) measure for quantifying images, introduce the notion of hard positive generation, and use diverse set not just closest ones data augmentation. We novel hot/cold approach example which provides multiple possible every single image. The generated our often...

10.1109/cvprw.2016.58 article EN 2016-06-01

As our professional, social, and financial existences become increasingly digitized as government, healthcare, military infrastructures rely more on computer technologies, they present larger lucrative targets for malware. Stealth malware in particular poses an increased threat because it is specifically designed to evade detection mechanisms, spreading dormant, the wild extended periods of time, gathering sensitive information or positioning itself a high-impact zero-day attack. Policing...

10.1109/comst.2016.2636078 article EN publisher-specific-oa IEEE Communications Surveys & Tutorials 2016-12-08

Much research has been conducted on both face identification and verification, with greater focus the latter. Research mostly focused using closed-set protocols, which assume that all probe images used in evaluation contain identities of subjects are enrolled gallery. Real systems, however, where only a fraction sample gallery, cannot make this assumption. Instead, they must an open set samples be able to reject/ignore those correspond unknown identities. In paper, we address widespread...

10.1109/cvprw.2017.85 article EN 2017-07-01

10.1016/j.patrec.2017.10.024 article EN publisher-specific-oa Pattern Recognition Letters 2017-10-23

Typically, most network intrusion detection systems use supervised learning techniques to identify anomalies. A problem exists when identifying the unknowns and automatically updating a classifier with new query classes. This is defined as an open set incremental we propose extend recently introduced method, Extreme Value Machine (EVM) address issue of classes during time. The EVM derived from statistical extreme value theory first that can perform kernel-free, nonlinear, variable bandwidth...

10.1109/icmla.2017.000-3 article EN 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA) 2017-12-01

Facial attributes are emerging soft biometrics that have the potential to reject non-matches, for example, based on mismatching gender. To be usable in stand-alone systems, facial must extracted from images automatically and reliably. In this paper, we propose a simple yet effective solution automatic attribute extraction by training deep convolutional neural network (DCNN) each separately, without using any pre-training or dataset augmentation, obtain new state-of-the-art classification...

10.1109/icpr.2016.7900114 article EN 2016-12-01

Email attachments are a growing delivery vector for malware. While machine learning (ML) has been successfully applied to portable executable (PE) malware detection, we ask, can extend static ML approaches detect across common email attachment file types, e.g., office documents and Zip archives? To this end, collected dataset of over 5 million malicious/benign Microsoft Office along with smaller data set, which use provide more realistic estimates thresholds false positive rates on...

10.1109/ths.2018.8574202 article EN 2018-10-01

Confidently distinguishing a malicious intrusion over network is an important challenge. Most detection system evaluations have been performed in closed set protocol which only classes seen during training are considered classification. Thus far, there has no realistic application novel types of behaviors unseen at - unknown as it were must be recognized for manual categorization. This paper comparatively evaluates malware classification using both and open protocols recognition on the...

10.1109/ths.2017.7943467 article EN 2017-04-01

When implementing real-world computer vision systems, researchers can use mid-level representations as a tool to adjust the trade-off between accuracy and efficiency. Unfortunately, existing that improve tend decrease efficiency, or are specifically tailored work well within one pipeline problem at exclusion of others. We introduce novel, efficient representation improves classification efficiency without sacrificing accuracy. Our Exemplar Codes based on linear classifiers probability...

10.1109/wacv.2014.6836099 article EN IEEE Winter Conference on Applications of Computer Vision 2014-03-01

In recent years, traditional cybersecurity safeguards have proven ineffective against insider threats. Famous cases of sensitive information leaks caused by insiders, including the WikiLeaks release diplomatic cables and Edward Snowden incident, greatly harmed U.S. government's relationship with other governments its own citizens. Data Leak Prevention (DLP) is a solution for detecting preventing from within an organization's network. However, state-of-art DLP detection models are only able...

10.1109/isi.2016.7745451 article EN 2016-09-01

For applications such as airport border control, biometric technologies that can process many capture subjects quickly, efficiently, with weak supervision, and minimal discomfort are desirable. Facial recognition is particularly appealing because it minimally invasive yet offers relatively good performance. Unfortunately, the combination of supervision invasiveness makes even highly accurate facial systems susceptible to spoofing via presentation attacks. Thus, there great demand for an...

10.1109/cvprw.2016.28 article EN 2016-06-01

Many security related big data problems, including document, traffic, and system log analysis require of unstructured text. Consider the task analyzing company documents for secure storage. Some might be too sensitive to put on a public cloud private storage with associated backup overhead, some may safe in encrypted form, sufficiently non-sensitive stored plain-text without encryption decryption overhead. Being able make such categorizations autonomously can significantly strengthen...

10.1109/bigdata.2016.7841028 article EN 2021 IEEE International Conference on Big Data (Big Data) 2016-12-01

The U.S Government has been the target for cyberattacks from all over world. Just recently, former President Obama accused Russian government of leaking emails to Wikileaks and declared that U.S. might be forced respond. While Russia denied involvement, it is clear take some defensive measures protect its data infrastructure. Insider threats have cause other sensitive information leaks too, including infamous Edward Snowden incident. Most recent were in form text. Due nature text data,...

10.1109/ths.2017.7943471 article EN 2017-04-01

When the cost of misclassifying a sample is high, it useful to have an accurate estimate uncertainty in prediction for that sample. There are also multiple types which best estimated different ways, example, intrinsic training set may be well-handled by Bayesian approach, while introduced shifts between and query distributions better-addressed density/support estimation. In this paper, we examine three uncertainty: model capacity uncertainty, data open review techniques been derived address...

10.48550/arxiv.1810.12278 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that Continuous Authentication Subsystem (CAS) has not been compromised, i.e., response layer which manages service/application access is fake. In this paper, we introduce CALIPER protocol, in separate Access Verification Entity (CAVE) directly challenges regime. Instead of simply returning probabilities or confidence scores, CALIPER's CAS uses live hard and soft...

10.1109/cvprw.2016.31 article EN 2016-06-01
Coming Soon ...