Follow
Erin Lanus
Erin Lanus
Verified email at vt.edu
Title
Cited by
Cited by
Year
Asymptotic and constructive methods for covering perfect hash families and covering arrays
CJ Colbourn, E Lanus, K Sarkar
Designs, Codes and Cryptography 86, 907-937, 2018
332018
Combinatorial testing metrics for machine learning
E Lanus, LJ Freeman, DR Kuhn, RN Kacker
2021 IEEE International Conference on Software Testing, Verification and …, 2021
262021
Systematic training and testing for machine learning using combinatorial interaction testing
T Cody, E Lanus, DD Doyle, L Freeman
2022 IEEE International Conference on Software Testing, Verification and …, 2022
162022
Test and evaluation framework for multi-agent systems of autonomous intelligent agents
E Lanus, I Hernandez, A Dachowicz, LJ Freeman, M Grande, A Lang, ...
2021 16th International Conference of System of Systems Engineering (SoSE …, 2021
132021
Formal methods analysis of the secure remote password protocol
AT Sherman, E Lanus, M Liskov, E Zieglar, R Chang, E Golaszewski, ...
Logic, Language, and Security: Essays Dedicated to Andre Scedrov on the …, 2020
122020
Subspace restrictions and affine composition for covering perfect hash families
CJ Colbourn, E Lanus
The Art of Discrete and Applied Mathematics 1 (2), # P2. 03-# P2. 03, 2018
102018
Partitioned search with column resampling for locating array construction
E Lanus, CJ Colbourn, DC Montgomery
2019 IEEE International Conference on Software Testing, Verification and …, 2019
92019
ATTL: An Automated Targeted Transfer Learning with Deep Neural Networks
SF Ahamed, P Aggarwal, S Shetty, E Lanus, LJ Freeman
2021 IEEE Global Communications Conference (GLOBECOM), 1-7, 2021
52021
Genetic algorithms for affine transformations to existential t-restrictions
RE Dougherty, E Lanus, CJ Colbourn, S Forrest
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2019
32019
Analysis of a forced-latency defense against man-in-the-middle attacks
EF Lanus, EV Zieglar
Journal of Information Warfare 16 (2), 66-78, 2017
32017
Test & Evaluation Best Practices for Machine Learning-Enabled Systems
J Chandrasekaran, T Cody, N McCarthy, E Lanus, L and Freeman
arXiv preprint arXiv:2310.06800, 2023
12023
Algorithms for Constructing Anonymizing Arrays
E Lanus, CJ Colbourn
International Workshop on Combinatorial Algorithms, 382-394, 2020
12020
Interaction testing, fault location, and anonymous attribute-based authorization
E Lanus
Arizona State University, 2019
12019
Why Cyber Threat Modeling Needs Human Factors Expansion: A Position Paper
S Travis, D Gračanin, E Lanus
2023 3rd Intelligent Cybersecurity Conference (ICSC), 110-118, 2023
2023
Guaranteeing Anonymity in Attribute-Based Authorization
E Lanus, CJ Colbourn, GJ Ahn
arXiv preprint arXiv:2310.04896, 2023
2023
A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning
P Roy, J Chadrasekaran, E Lanus, L Freeman, J Werner
arXiv preprint arXiv:2310.04513, 2023
2023
Training Generative Adversarial Networks on Small Datasets by way of Transfer Learning
B Lee, L Eisenbeiser, E Lanus
ITEA Journal of Test and Evaluation 44 (2), 2023
2023
Best practices for addressing new challenges in testing and evaluating artificial intelligence-enabled systems
LJ Freeman, J Kauffman, D Sobien, T Cody, E Lanus
ITEA Journal of Test and Evaluation 43 (3), 174-180, 2022
2022
Evaluating Automated Driving Planner Robustness against Adversarial Influence
A Molina-Markham, SG Ionescu, E Lanus, D Ng, S Sommerer, ...
Workshop on Deception Against Planning Systems and Planning in Adversarial …, 2022
2022
Developing Hierarchies for Image Classification Model Evaluation
S Wood, E Lanus, DD Doyle, J Ogorzalek, CT Franck, L Freeman
2021 4th International Conference on Artificial Intelligence for Industries …, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20