Identification of security related bug reports via text mining using supervised and unsupervised classification K Goseva-Popstojanova, J Tyo 2018 IEEE International Conference on Software Quality, Reliability and …, 2018 | 92 | 2018 |
On the state of the art in authorship attribution and authorship verification J Tyo, B Dhingra, ZC Lipton arXiv preprint arXiv:2209.06869, 2022 | 17 | 2022 |
Siamese Bert for Authorship Verification. J Tyo, B Dhingra, ZC Lipton CLEF (Working Notes), 2169-2177, 2021 | 16 | 2021 |
Experience report: security vulnerability profiles of mission critical software: empirical analysis of security related bug reports K Goseva-Popstojanova, J Tyo 2017 IEEE 28th International Symposium on Software Reliability Engineering …, 2017 | 15 | 2017 |
Empirical analysis and automated classification of security bug reports JP Tyo West Virginia University, 2016 | 11 | 2016 |
How transferable are the representations learned by deep Q agents? J Tyo, Z Lipton arXiv preprint arXiv:2002.10021, 2020 | 9 | 2020 |
Evaluation of OSUS at TTCP CUE 2017 JP Tyo, WR Hughes Ground/Air Multisensor Interoperability, Integration, and Networking for …, 2018 | 3 | 2018 |
A practical guide to the open standards for unattended sensors (osus) J Tyo, JB Kovach US Army Research Laboratory, 2018 | 3 | 2018 |
Multi-armed bandits with delayed and aggregated rewards J Tyo, O Neopane, J Byrd, C Gupta, C Igoe, ... DEVCOM Army Res. Lab., White Oak, MD, USA, Tech. Rep. ARL-TR-8754, 2019 | 2 | 2019 |
Reinforcement Learning with Unknown Reward Functions B Eysenbach, J Tyo, S Gu, R Salakhutdinov, Z Lipton, S Levine | 2 | 2019 |
The future of web data mining: Insights from multimodal and code-based extraction methods E Fellman, J Tyo, ZC Lipton Proceedings of the 7th Workshop on Challenges and Applications of Automated …, 2024 | 1 | 2024 |
MUDD: A New Re-Identification Dataset with Efficient Annotation for Off-Road Racers in Extreme Conditions J Tyo, M Olarinre, Y Chung, ZC Lipton arXiv preprint arXiv:2311.08488, 2023 | 1 | 2023 |
Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports K Goseva-Popstojanova, JP Tyo, B Sizemore | 1 | 2017 |
Beyond the Mud: Datasets and Benchmarks for Computer Vision in Off-Road Racing J Tyo, M Olarinre, Y Chung, ZC Lipton arXiv preprint arXiv:2402.08025, 2024 | | 2024 |
Contrastive Multiple Instance Learning for Weakly Supervised Person ReID J Tyo, ZC Lipton arXiv preprint arXiv:2402.07685, 2024 | | 2024 |
Reading Between the Mud: A Challenging Motorcycle Racer Number Dataset J Tyo, Y Chung, M Olarinre, ZC Lipton arXiv preprint arXiv:2311.09256, 2023 | | 2023 |
Valla: Standardizing and Benchmarking Authorship Attribution and Verification Through Empirical Evaluation and Comparative Analysis J Tyo, B Dhingra, ZC Lipton Proceedings of the 13th International Joint Conference on Natural Language …, 2023 | | 2023 |
Meta-Learning Mini-Batch Risk Functionals J Tyo, ZC Lipton arXiv preprint arXiv:2301.11724, 2023 | | 2023 |