Rich Harang
Rich Harang
Sophos
Verified email at sophos.com
Title
Cited by
Cited by
Year
Crafting adversarial input sequences for recurrent neural networks
N Papernot, P McDaniel, A Swami, R Harang
MILCOM 2016-2016 IEEE Military Communications Conference, 49-54, 2016
2522016
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 255-270, 2015
1702015
A neuropeptide speeds circadian entrainment by reducing intercellular synchrony
S An, R Harang, K Meeker, D Granados-Fuentes, CA Tsai, C Mazuski, ...
Proceedings of the National Academy of Sciences 110 (46), E4355-E4361, 2013
1192013
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
862015
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
European Symposium on Research in Computer Security, 65-82, 2017
452017
Rapid permissions-based detection and analysis of mobile malware using random decision forests
W Glodek, R Harang
MILCOM 2013-2013 IEEE Military Communications Conference, 980-985, 2013
422013
WAVOS: a MATLAB toolkit for wavelet analysis and visualization of oscillatory systems
R Harang, G Bonnet, LR Petzold
BMC research notes 5 (1), 1-8, 2012
412012
Wavelet Measurement Suggests Cause of Period Instability in Mammalian Circadian Neurons
K Meeker, R Harang, AB Webb, DK Welsh, FJ Doyle, G Bonnet, ...
Journal of Biological Rhythms 26 (4), 353-362, 2011
292011
Git blame who?: Stylistic authorship attribution of small, incomplete source code fragments
E Dauber, A Caliskan, R Harang, G Shearer, M Weisman, F Nelson, ...
Proceedings on Privacy Enhancing Technologies 2019 (3), 389-408, 2019
232019
SeqDroid: Obfuscated Android malware detection using stacked convolutional and recurrent neural networks
WY Lee, J Saxe, R Harang
Deep Learning Applications for Cyber Security, 197-210, 2019
222019
Statistical models for the number of successful cyber intrusions
NO Leslie, RE Harang, LP Knachel, A Kott
The Journal of Defense Modeling and Simulation 15 (1), 49-63, 2018
212018
A deep learning approach to fast, format-agnostic detection of malicious web content
J Saxe, R Harang, C Wild, H Sanders
2018 IEEE Security and Privacy Workshops (SPW), 8-14, 2018
202018
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
182018
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
P Mell, J Shook, R Harang, S Gavrila
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2017
172017
Extremely lightweight intrusion detection (elide)
RJ Chang, RE Harang, GS Payer
ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE, 2013
152013
Burstiness of intrusion detection process: Empirical evidence and a modeling approach
R Harang, A Kott
IEEE Transactions on Information Forensics and Security 12 (10), 2348-2359, 2017
142017
Clustering of Snort alerts to identify patterns and reduce analyst workload
R Harang, P Guarino
MILITARY COMMUNICATIONS CONFERENCE, 2012-MILCOM 2012, 1-6, 2012
142012
A fast kernel for attributed graphs
Y Su, F Han, RE Harang, X Yan
Proceedings of the 2016 SIAM international conference on data mining, 486-494, 2016
122016
Identifying key cyber-physical terrain
B Thompson, R Harang
Proceedings of the 3rd ACM on International Workshop on Security And Privacy …, 2017
10*2017
Methods and apparatus for using machine learning on multiple file fragments to identify malware
JD Saxe, R Harang
US Patent 10,635,813, 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20