Follow
Ryan Sheatsley
Title
Cited by
Cited by
Year
Technical report on the cleverhans v2. 1.0 adversarial examples library
N Papernot, F Faghri, N Carlini, I Goodfellow, R Feinman, A Kurakin, ...
arXiv preprint arXiv:1610.00768, 2016
800*2016
Adversarial examples in constrained domains
R Sheatsley, N Papernot, M Weisman, G Verma, P McDaniel
arXiv preprint arXiv:2011.01183, 2020
24*2020
Network traffic obfuscation: An adversarial machine learning approach
G Verma, E Ciftcioglu, R Sheatsley, K Chan, L Scott
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-6, 2018
182018
On the Robustness of Domain Constraints
R Sheatsley, B Hoak, E Pauley, Y Beugin, MJ Weisman, P McDaniel
arXiv preprint arXiv:2105.08619, 2021
152021
Curie: Policy-based secure data exchange
ZB Celik, A Acar, H Aksu, R Sheatsley, P McDaniel, AS Uluagac
Proceedings of the ninth ACM conference on data and application security and …, 2019
82019
A Vision Toward an Internet of Battlefield Things (IoBT): Autonomous Classifying Sensor Network
J Zhu, E McClave, Q Pham, S Polineni, S Reinhart, R Sheatsley, A Toth
US Army Research Laboratory Adelphi United States, 2018
72018
Generating practical adversarial network traffic flows using NIDSGAN
BE Zolbayar, R Sheatsley, P McDaniel, MJ Weisman, S Zhu, S Zhu, ...
arXiv preprint arXiv:2203.06694, 2022
62022
Improving radioactive material localization by leveraging cyber-security model optimizations
R Sheatsley, M Durbin, A Lintereur, P McDaniel
IEEE Sensors Journal 21 (8), 9994-10006, 2021
62021
Evading Machine Learning Based Network Intrusion Detection Systems with GANs
BE Zolbayar, R Sheatsley, P McDaniel, M Weisman, CA Kamhoua, ...
Game Theory and Machine Learning for Cyber Security, 335-356, 2021
32021
Detection under privileged information
ZB Celik, P McDaniel, R Izmailov, N Papernot, R Sheatsley, R Alvarez, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
32018
Measuring and Mitigating the Risk of IP Reuse on Public Clouds
E Pauley, R Sheatsley, B Hoak, Q Burke, Y Beugin, P McDaniel
2022 IEEE Symposium on Security and Privacy (SP), 558-575, 2022
22022
Physics-based misbehavior detection system for v2x communications
AAA Salazar, PD McDaniel, R Sheatsley, J Petit
SAE International Journal of Connected and Automated Vehicles 5 (12-05-03-0020), 2022
22022
Building a Privacy-Preserving Smart Camera System
Y Beugin, Q Burke, B Hoak, R Sheatsley, E Pauley, G Tan, SR Hussain, ...
Proceedings on Privacy Enhancing Technologies 2022 (2), 25-46, 2022
22022
Application Transiency: Towards a Fair Trade of Personal Information for Application Services
R Alvarez, J Levenson, R Sheatsley, P McDaniel
Security and Privacy in Communication Networks: 15th EAI International …, 2019
22019
Heterogeneous information sharing of sensor information in contested environments
JA Wampler, C Hsieh, A Toth, R Sheatsley
Ground/Air Multisensor Interoperability, Integration, and Networking for …, 2017
22017
Experimental tests of Gamma-ray Localization Aided with Machine-learning (GLAM) capabilities
M Durbin, R Sheatsley, P McDaniel, A Lintereur
Nuclear Instruments and Methods in Physics Research Section A: Accelerators …, 2022
12022
Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices
Y Beugin, Q Burke, B Hoak, R Sheatsley, E Pauley, G Tan, SR Hussain, ...
arXiv preprint arXiv:2208.09776, 2022
12022
A Machine Learning and Computer Vision Approach to Geomagnetic Storm Forecasting
K Domico, R Sheatsley, Y Beugin, Q Burke, P McDaniel
arXiv preprint arXiv:2204.05780, 2022
12022
EIPSIM: Modeling Secure IP Address Allocation at Cloud Scale
E Pauley, K Domico, B Hoak, R Sheatsley, Q Burke, Y Beugin, ...
arXiv preprint arXiv:2210.14999, 2022
2022
The Space of Adversarial Strategies
R Sheatsley, B Hoak, E Pauley, P McDaniel
arXiv preprint arXiv:2209.04521, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20