Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

portfolio

publications

Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses

Published in ACM Workshop on Artificial Intelligence and Security (AISec) with the 25th ACM Conference on Computer and Communications Security (CCS), 2018

Download paper here

Recommended citation: M. Hashemi, G. Cusack, E. Keller. "Stochastic Substitute Training: A Gray-box Approach to Craft Adversarial Examples Against Gradient Obfuscation Defenses" ACM Workshop on Artificial Intelligence and Security (AISec), 2018 https://gregcusack.github.io/files/Stochastic-Subsitute-Training-AISec18.pdf

Breaking The Trust Dependence on Third Party Processes For Reconfigurable Secure Hardware

Published in 27th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2019

Download paper here

Recommended citation: M. Coughlin, G. Cusack, J. Wampler, E. Keller, E. Wustrow. "Breaking The Trust Dependence on Third Party Processes For Reconfigurable Secure Hardware" International Symposium on Field-Programmable Gate Arrays, 2019 https://gregcusack.github.io/files/Coughlin-Cusack-Wampler-Keller-Wustrow-Reconfigurable-Secure-Hardware.pdf

Towards the Evaluation of NIDSs in Adversarial Settings

Published in Big-DAMA 2019: ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks, 2019

Download paper here

Recommended citation: M. Hashemi, G. Cusack, E. Keller. " Towards Evaluation of NIDSs in Adversarial Setting" ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks (Big-DAMA), 2019 https://gregcusack.github.io/files/Hashemi-Cusack-Keller-Towards-the-Evaluation-of-NIDSs-in-Adversarial-Setting.pdf

talks

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.