Follow
Todd Huster
Todd Huster
Peraton Labs
Verified email at peratonlabs.com
Title
Cited by
Cited by
Year
Limitations of the lipschitz constant as a defense against adversarial examples
T Huster, CYJ Chiang, R Chadha
ECML PKDD 2018 Workshops: Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe …, 2019
1112019
Pareto gan: Extending the representational power of gans to heavy-tailed distributions
T Huster, J Cohen, Z Lin, K Chan, C Kamhoua, NO Leslie, CYJ Chiang, ...
International Conference on Machine Learning, 4523-4532, 2021
332021
Universal lipschitz approximation in bounded depth neural networks
JEJ Cohen, T Huster, R Cohen
arXiv preprint arXiv:1904.04861, 2019
252019
Top: Backdoor detection in neural networks via transferability of perturbation
T Huster, E Ekwedike
arXiv preprint arXiv:2103.10274, 2021
212021
Reface: Real-time adversarial attacks on face recognition systems
S Hussain, T Huster, C Mesterharm, P Neekhara, K An, M Jere, H Sikka, ...
arXiv preprint arXiv:2206.04783, 2022
82022
Towards the development of robust deep neural networks in adversarial settings
TP Huster, CYJ Chiang, R Chadha, A Swami
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 419-424, 2018
32018
Robot design with neural networks, MILP solvers and active learning
S Narain, E Mak, D Chee, T Huster, J Cohen, K Pochiraju, B Englot, ...
arXiv preprint arXiv:2010.09842, 2020
22020
Scalable knowledge database generation and transactions processing
A Vashist, C Basu, T Huster, P Lin, D Mok, IIJR Wullert
US Patent App. 17/590,143, 2022
12022
Scaled-Time-Attention Robust Edge Network
R Lau, L Yao, T Huster, W Johnson, S Arleth, J Wong, D Ridge, M Fletcher, ...
arXiv preprint arXiv:2107.04688, 2021
12021
Evaluation methodology for query-based scene understanding systems
TP Huster, TD Ross, JL Culbertson
Automatic Target Recognition XXV 9476, 43-53, 2015
12015
Solving Trojan Detection Competitions with Linear Weight Classification
T Huster, P Lin, R Stefanescu, E Ekwedike, R Chadha
arXiv preprint arXiv:2411.03445, 2024
2024
ReFace: Adversarial Transformation Networks for Real-time Attacks on Face Recognition Systems
S Hussain, T Huster, C Mesterharm, P Neekhara, F Koushanfar
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
2023
Design Space Exploration for Cyber Physical Systems
S Narain, E Mak, T Huster, J Cohen, K Pochiraju, B Englot, N Jha, ...
2019
OWL query answering using machine learning
T Huster
2015
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)| 979-8-3503-4793-7/23/$31.00© 2023 IEEE| DOI: 10.1109/DSN58367. 2023.00062
AJ Adiletta, GJ Ahn, D Alden, KA Alharthi, N Antunes, J Baek, C Bansal, ...
The system can't perform the operation now. Try again later.
Articles 1–15