default search action
Jack W. Stokes
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Ying-Chun Lin, Jennifer Neville, Jack W. Stokes, Longqi Yang, Tara Safavi, Mengting Wan, Scott Counts, Siddharth Suri, Reid Andersen, Xiaofeng Xu, Deepak Gupta, Sujay Kumar Jauhar, Xia Song, Georg Buscher, Saurabh Tiwary, Brent J. Hecht, Jaime Teevan:
Interpretable User Satisfaction Estimation for Conversational Systems with Large Language Models. ACL (1) 2024: 11100-11115 - [i14]Mingyu Guan, Jack W. Stokes, Qinlong Luo, Fuchen Liu, Purvanshi Mehta, Elnaz Nouri, Taesoo Kim:
HetTree: Heterogeneous Tree Graph Neural Network. CoRR abs/2402.13496 (2024) - [i13]Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li:
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks. CoRR abs/2403.01038 (2024) - [i12]Ying-Chun Lin, Jennifer Neville, Jack W. Stokes, Longqi Yang, Tara Safavi, Mengting Wan, Scott Counts, Siddharth Suri, Reid Andersen, Xiaofeng Xu, Deepak Gupta, Sujay Kumar Jauhar, Xia Song, Georg Buscher, Saurabh Tiwary, Brent J. Hecht, Jaime Teevan:
Interpretable User Satisfaction Estimation for Conversational Systems with Large Language Models. CoRR abs/2403.12388 (2024) - [i11]Xuefeng Du, Reshmi Ghosh, Robert Sim, Ahmed Salem, Vitor Carvalho, Emily Lawton, Yixuan Li, Jack W. Stokes:
VLMGuard: Defending VLMs against Malicious Prompts via Unlabeled Data. CoRR abs/2410.00296 (2024) - 2022
- [j2]Maryam Zulfiqar, Muhammad Umar Janjua, Muhammad Hassan, Talha Ahmad, Tania Saleem, Jack W. Stokes:
Tracking adoption of revocation and cryptographic features in X.509 certificates. Int. J. Inf. Sec. 21(3): 653-668 (2022) - [c45]Rakshit Agrawal, Jack W. Stokes, Lukas Rist, Ryan Littlefield, Xun Fan, Ken Hollis, Zane Coppedge, Noah Chesterman, Christian Seifert:
Long-Term Study of Honeypots in a Public Cloud. DSN (Supplements) 2022: 1-4 - [c44]Yue Gao, Jack W. Stokes, Manoj Ajith Prasad, Andrew T. Marshall, Kassem Fawaz, Emre Kiciman:
I Know Your Triggers: Defending Against Textual Backdoor Attacks with Benign Backdoor Augmentation. MILCOM 2022: 442-449 - [i10]Jurijs Nazarovs, Jack W. Stokes, Melissa Turcotte, Justin Carroll, Itai Grady:
Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks. CoRR abs/2205.14759 (2022) - 2021
- [c43]Jinyuan Jia, Zheng Dong, Jie Li, Jack W. Stokes:
Detection Of Malicious DNS and Web Servers using Graph-Based Approaches. ICASSP 2021: 2625-2629 - [c42]Jack W. Stokes, Paul England, Kevin Kane:
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance. MILCOM 2021: 181-188 - [c41]Vikash Sehwag, Jack W. Stokes, Cha Zhang:
Beyond $L_{p}$ Norms: Delving Deeper into Robustness to Physical Image Transformations. MILCOM 2021: 189-196 - [c40]Pranav Maneriker, Jack W. Stokes, Edir Garcia Lazo, Diana Carutasu, Farid Tajaddodianfar, Arun Gururajan:
URLTran: Improving Phishing URL Detection Using Transformers. MILCOM 2021: 197-204 - [c39]Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Rebecca Burke-Aguero, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, John Deutscher, Shabnam Erfani, Matt Gaylor, Andrew Jenks, Kevin Kane, Elissa M. Redmiles, Alex Shamis, Isha Sharma, John C. Simmons, Sam Wenker, Anika Zaman:
AMP: authentication of media via provenance. MMSys 2021: 108-121 - [c38]Imani N. Sherman, Jack W. Stokes, Elissa M. Redmiles:
Designing Media Provenance Indicators to Combat Fake Media. RAID 2021: 324-339 - [c37]Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt:
Living-Off-The-Land Command Detection Using Active Learning. RAID 2021: 442-455 - [i9]Jack W. Stokes, Paul England, Kevin Kane:
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance. CoRR abs/2105.10051 (2021) - [i8]Pranav Maneriker, Jack W. Stokes, Edir Garcia Lazo, Diana Carutasu, Farid Tajaddodianfar, Arun Gururajan:
URLTran: Improving Phishing URL Detection Using Transformers. CoRR abs/2106.05256 (2021) - [i7]Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt:
Living-Off-The-Land Command Detection Using Active Learning. CoRR abs/2111.15039 (2021) - 2020
- [c36]Yu Wang, Jack W. Stokes, Mady Marinescu:
Actor Critic Deep Reinforcement Learning for Neural Malware Control. AAAI 2020: 1005-1012 - [c35]Edward J. Chou, Arun Gururajan, Kim Laine, Nitin Kumar Goel, Anna Bertiger, Jack W. Stokes:
Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption. ICASSP 2020: 2792-2796 - [c34]Farid Tajaddodianfar, Jack W. Stokes, Arun Gururajan:
Texception: A Character/Word-Level Deep Learning Model for Phishing URL Detection. ICASSP 2020: 2857-2861 - [c33]Jack W. Stokes, Rakshit Agrawal, Geoff McDonald:
Detection of Malicious Vbscript Using Static and Dynamic Analysis with Recurrent Deep Learning. ICASSP 2020: 2887-2891 - [c32]Behnaz Arzani, Selim Ciraci, Stefan Saroiu, Alec Wolman, Jack W. Stokes, Geoff Outhred, Lechao Diwu:
PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud. NSDI 2020: 797-815 - [i6]Paul England, Henrique S. Malvar, Eric Horvitz, Jack W. Stokes, Cédric Fournet, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Shabnam Erfani, Kevin Kane, Alex Shamis:
AMP: Authentication of Media via Provenance. CoRR abs/2001.07886 (2020) - [i5]Imani N. Sherman, Elissa M. Redmiles, Jack W. Stokes:
Designing Indicators to Combat Fake Media. CoRR abs/2010.00544 (2020)
2010 – 2019
- 2019
- [c31]Md Amran Siddiqui, Jack W. Stokes, Christian Seifert, Evan Argyle, Robert McCann, Joshua Neil, Justin Carroll:
Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback. ICASSP 2019: 2872-2876 - [c30]Rakshit Agrawal, Jack W. Stokes, Karthik Selvaraj, Mady Marinescu:
Attention in Recurrent Neural Networks for Ransomware Detection. ICASSP 2019: 3222-3226 - [c29]Jack W. Stokes, Rakshit Agrawal, Geoff McDonald, Matthew J. Hausknecht:
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection. MILCOM 2019: 1-8 - [c28]Jack W. Stokes, Christian Seifert, Jerry Li, Nizar Hejazi:
Detection of Prevalent Malware Families with Deep Learning. MILCOM 2019: 1-8 - [c27]Yu Wang, Jack W. Stokes, Mady Marinescu:
Neural Malware Control with Deep Reinforcement Learning. MILCOM 2019: 1-8 - [i4]Jack W. Stokes, Rakshit Agrawal, Geoff McDonald, Matthew J. Hausknecht:
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection. CoRR abs/1904.01126 (2019) - 2018
- [c26]Rakshit Agrawal, Jack W. Stokes, Mady Marinescu, Karthik Selvaraj:
Neural Sequential Malware Detection with Parameters. ICASSP 2018: 2656-2660 - [c25]Rakshit Agrawal, Jack W. Stokes, Mady Marinescu, Karthik Selvaraj:
Robust Neural Malware Detection Models for Emulation Sequence Learning. MILCOM 2018: 1-8 - [c24]Qingyun Liu, Jack W. Stokes, Rob Mead, Tim Burrell, Ian Hellen, John Lambert, Andrey Marochko, Weidong Cui:
Latte: Large-Scale Lateral Movement Detection. MILCOM 2018: 1-6 - [c23]Jack W. Stokes, De Wang, Mady Marinescu, Marc Marino, Brian Bussone:
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models. MILCOM 2018: 1-8 - [i3]Jack W. Stokes, Rakshit Agrawal, Geoff McDonald:
Neural Classification of Malicious Scripts: A study with JavaScript and VBScript. CoRR abs/1805.05603 (2018) - [i2]Rakshit Agrawal, Jack W. Stokes, Mady Marinescu, Karthik Selvaraj:
Robust Neural Malware Detection Models for Emulation Sequence Learning. CoRR abs/1806.10741 (2018) - 2017
- [c22]Ben Athiwaratkun, Jack W. Stokes:
Malware classification with LSTM and GRU language models and a character-level CNN. ICASSP 2017: 2482-2486 - [c21]Shayok Chakraborty, Jack W. Stokes, Lin Xiao, Dengyong Zhou, Mady Marinescu, Anil Thomas:
Hierarchical learning for automated malware classification. MILCOM 2017: 23-28 - [i1]Jack W. Stokes, De Wang, Mady Marinescu, Marc Marino, Brian Bussone:
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models. CoRR abs/1712.05919 (2017) - 2016
- [c20]Wenyi Huang, Jack W. Stokes:
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification. DIMVA 2016: 399-418 - [c19]Jack W. Stokes, Ashish Kapoor, Debajyoti Ray:
Asking for a second opinion: Re-querying of noisy multi-class labels. ICASSP 2016: 2329-2333 - [c18]Jack W. Stokes, Himanshu Chandola, Christian Seifert, Tim Burrell:
MART: Targeted attack detection on a compromised network. MILCOM 2016: 988-997 - 2015
- [c17]Razvan Pascanu, Jack W. Stokes, Hermineh Sanossian, Mady Marinescu, Anil Thomas:
Malware classification with recurrent networks. ICASSP 2015: 1916-1920 - 2013
- [c16]Gang Wang, Jack W. Stokes, Cormac Herley, David Felstead:
Detecting malicious landing pages in Malware Distribution Networks. DSN 2013: 1-11 - [c15]Christian Seifert, Jack W. Stokes, Christina Colcernian, John C. Platt, Long Lu:
Robust scareware image detection. ICASSP 2013: 2920-2924 - [c14]George E. Dahl, Jack W. Stokes, Li Deng, Dong Yu:
Large-scale malware classification using random projections and neural networks. ICASSP 2013: 3422-3426 - 2012
- [c13]Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu:
Using File Relationships in Malware Classification. DIMVA 2012: 1-20 - [c12]Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu:
Scalable Telemetry Classification for Automated Malware Detection. ESORICS 2012: 788-805 - 2011
- [c11]Junjie Zhang, Christian Seifert, Jack W. Stokes, Wenke Lee:
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads. WWW 2011: 187-196 - 2010
- [c10]Jack W. Stokes, Reid Andersen, Christian Seifert, Kumar Chellapilla:
WebCop: Locating Neighborhoods of Malware on the Web. LEET 2010
2000 – 2009
- 2008
- [c9]Gregory Buehrer, Jack W. Stokes, Kumar Chellapilla:
A large-scale study of automated web search traffic. AIRWeb 2008: 1-8 - [c8]Diego A. Bendersky, Jack W. Stokes, Henrique S. Malvar:
Nonlinear residual acoustic echo suppression for high levels of harmonic distortion. ICASSP 2008: 261-264 - [c7]Kevin Bartz, Jack W. Stokes, John C. Platt, Ryan Kivett, David Grant, Silviu Calinoiu, Gretchen Loihle:
Finding Similar Failures Using Callstack Similarity. SysML 2008 - [c6]Gregory Buehrer, Jack W. Stokes, Kumar Chellapilla, John C. Platt:
Classification of Automated Search Traffic. Weaving Services and People on the World Wide Web 2008: 3-26 - 2007
- [c5]Asif Iqbal Mohammad, Jack W. Stokes, Steven L. Grant:
Normalized Double-Talk Detection Based on Microphone and AEC Error Cross-Correlation. ICME 2007: 360-363 - 2006
- [c4]Jack W. Stokes, John C. Platt:
Robust Rls with Round Robin Regularization Including Application to Stereo Acoustic Echo Cancellation. ICASSP (3) 2006: 736-739 - [c3]Amit Chhetri, Jack W. Stokes, Dinei A. F. Florêncio:
Acoustic Echo Cancelation for High Noise Environments. ICME 2006: 905-908 - [c2]Jack W. Stokes, John C. Platt, Sumit Basu:
Speaker Identification using a Microphone Array and a Joint HMM with Speech Spectrum and Angle of Arrival. ICME 2006: 1381-1384 - 2004
- [c1]Jack W. Stokes, Henrique S. Malvar:
Acoustic echo cancellation with arbitrary playback sampling rate. ICASSP (4) 2004: 153-156 - 2001
- [j1]Jack W. Stokes, James A. Ritcey:
Performance analysis of DS/CDMA systems with shadowing and flat fading. Signal Process. 81(12): 2555-2571 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint