Follow
Rich Harang
Rich Harang
Verified email at nvidia.com
Title
Cited by
Cited by
Year
Crafting adversarial input sequences for recurrent neural networks
N Papernot, P McDaniel, A Swami, R Harang
MILCOM 2016-2016 IEEE Military Communications Conference, 49-54, 2016
4972016
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th USENIX security symposium (USENIX Security 15), 255-270, 2015
2852015
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
1542015
A neuropeptide speeds circadian entrainment by reducing intercellular synchrony
S An, R Harang, K Meeker, D Granados-Fuentes, CA Tsai, C Mazuski, ...
Proceedings of the National Academy of Sciences 110 (46), E4355-E4361, 2013
1472013
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1132017
SOREL-20M: A large scale benchmark dataset for malicious PE detection
R Harang, EM Rudd
arXiv preprint arXiv:2012.07634, 2020
892020
SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks
WY Lee, J Saxe, R Harang
Deep learning applications for cyber security, 197-210, 2019
622019
Git blame who? stylistic authorship attribution of small, incomplete source code fragments
E Dauber, A Caliskan, R Harang, R Greenstadt
Proceedings of the 40th International Conference on Software Engineering …, 2018
572018
WAVOS: a MATLAB toolkit for wavelet analysis and visualization of oscillatory systems
R Harang, G Bonnet, LR Petzold
BMC research notes 5, 1-8, 2012
552012
Rapid permissions-based detection and analysis of mobile malware using random decision forests
W Glodek, R Harang
MILCOM 2013-2013 IEEE Military Communications Conference, 980-985, 2013
532013
Methods and apparatus for detection of malicious documents using machine learning
JD Saxe, R HARANG
US Patent 11,003,774, 2021
512021
A deep learning approach to fast, format-agnostic detection of malicious web content
J Saxe, R Harang, C Wild, H Sanders
2018 IEEE Security and Privacy Workshops (SPW), 8-14, 2018
432018
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
402018
Statistical models for the number of successful cyber intrusions
NO Leslie, RE Harang, LP Knachel, A Kott
The Journal of Defense Modeling and Simulation 15 (1), 49-63, 2018
352018
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
P Mell, J Shook, R Harang, S Gavrila
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2017
332017
CATBERT: Context-aware tiny BERT for detecting social engineering emails
Y Lee, J Saxe, R Harang
arXiv preprint arXiv:2010.03484, 2020
322020
Wavelet Measurement Suggests Cause of Period Instability in Mammalian Circadian Neurons
K Meeker, R Harang, AB Webb, DK Welsh, FJ Doyle, G Bonnet, ...
Journal of Biological Rhythms 26 (4), 353-362, 2011
322011
Methods and apparatus for using machine learning on multiple file fragments to identify malware
JD Saxe, R Harang
US Patent 10,635,813, 2020
272020
{ALOHA}: Auxiliary Loss Optimization for Hypothesis Augmentation
EM Rudd, FN Ducau, C Wild, K Berlin, R Harang
28th USENIX Security Symposium (USENIX Security 19), 303-320, 2019
262019
Extremely lightweight intrusion detection (elide)
RJ Chang, RE Harang, GS Payer
ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE, 2013
242013
The system can't perform the operation now. Try again later.
Articles 1–20