Follow
Greg Cusack
Greg Cusack
PhD, Solana Labs
Verified email at solana.com - Homepage
Title
Cited by
Cited by
Year
Machine learning-based detection of ransomware using SDN
G Cusack, O Michel, E Keller
Proceedings of the 2018 ACM international workshop on security in software …, 2018
1312018
Towards evaluation of nidss in adversarial setting
MJ Hashemi, G Cusack, E Keller
Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and …, 2019
652019
Breaking the trust dependence on third party processes for reconfigurable secure hardware
A Coughlin, G Cusack, J Wampler, E Keller, E Wustrow
Proceedings of the 2019 ACM/SIGDA international symposium on field …, 2019
192019
Software packet-level network analytics at cloud scale
O Michel, J Sonchack, G Cusack, M Nazari, E Keller, JM Smith
IEEE transactions on network and service management 18 (1), 597-610, 2021
132021
Stochastic substitute training: A gray-box approach to craft adversarial examples against gradient obfuscation defenses
M Hashemi, G Cusack, E Keller
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security …, 2018
82018
Poster: time analysis of the feasibility of vehicular blocktrees
J Joy, G Cusack, M Gerla
Proceedings of the 3rd Workshop on Experiences with the Design and …, 2017
62017
Efficient microservices with elastic containers
G Cusack, M Nazari, S Goodarzy, P Oberai, E Rozner, E Keller, R Han
Proceedings of the 15th International Conference on Emerging Networking …, 2019
42019
Escra: Event-driven, sub-second container resource allocation
G Cusack, M Nazari
IEEE International Conference on Distributed Computing Systems, 2022
32022
Enabling Application-Specific Programmable Compute Infrastructure
G Cusack
University of Colorado at Boulder, 2023
2023
Stochastic Substitute Training: A General Approach to Craft Adversarial Examples against Defenses which Obfuscate Gradients
M Hasemi, G Cusack, E Keller
ACM Workshop on Artificial Intelligence and Security (AISec), 2018
2018
Poster: Machine Learning-Based Fingerprinting of Network Traffic Using Programmable Forwarding Engines
G Cusack, O Michel, E Keller
The system can't perform the operation now. Try again later.
Articles 1–11