Anshuman Singh
Anshuman Singh
Associate Professor, University of Missouri St Louis
Verified email at umsl.edu
Title
Cited by
Cited by
Year
Tracking concept drift in malware families
A Singh, A Walenstein, A Lakhotia
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
432012
Vilo: a rapid learning nearest-neighbor classifier for malware triage
A Lakhotia, A Walenstein, C Miles, A Singh
Journal of Computer Virology and Hacking Techniques 9 (3), 109-123, 2013
362013
Zero-inflated Poisson (ZIP) distribution: parameter estimation and applications to model data from natural calamities
S Beckett, J Jee, T Ncube, S Pompilus, Q Washington, A Singh, N Pal
Involve, a Journal of Mathematics 7 (6), 751-767, 2014
272014
Context-sensitive analysis of obfuscated x86 executables
A Lakhotia, DR Boccardo, A Singh, A Manacero Jr
Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and …, 2010
142010
Context-sensitive analysis without calling-context
A Lakhotia, DR Boccardo, A Singh, A Manacero
Higher-Order and Symbolic Computation 23 (3), 275-313, 2010
122010
Game-theoretic design of an information exchange model for detecting packed malware
A Singh, A Lakhotia
2011 6th International Conference on Malicious and Unwanted Software, 1-7, 2011
112011
Dimensional Scalability of Supervised and Unsupervised Concept Drift Detection: An Empirical Study
JDD Lavaire, A Singh, M Yousef, S Singh, X Yue
Advances in High Dimensional Big Data: IEEE Big Data, pp 2212-2218, 2015
62015
Machine learning techniques in exploring microRNA gene discovery, targets, and functions
S Singh, RG Benton, A Singh, A Singh
Bioinformatics in MicroRNA Research, 211-224, 2017
32017
On Concept Drift, Deployability, and Adversarial Selection in Machine Learning-Based Malware Detection
A Singh
University of Louisiana at Lafayette, 2012
12012
On Temporal Population Drift in Malware Families
A Singh, A Walenstein, A Lakhoita
Proceedings of 22nd Virus Bulletin Conference., 20, 2012
12012
On optimal AV system strategies against obfuscated malware
A Singh, B Mai, A Lakhotia, A Walenstein
4th Annual Symposium on Information Assurance (ASIA’09), 30, 2009
12009
USING GAME THEORY TO ASSESS THE STRENGTH OF AN AV SYSTEM AGAINST EVOLVING OFFENCES
B Mai, A Singh, A Walenstein, A Lakhotia
Proceedings of 18th Virus Bulletin Conference., 147, 2008
12008
Improving Multi-Prime RSA Crypto-computations
A Singh
University of Louisiana at Lafayette, 2006
12006
AI Maturity in Cybersecurity Assessments
KJ Anshuman Singh, Vivek Kumar Singh
HICSS Symposium on Cybersecurity Big Data Analytics, 2020
2020
A conceptual framework for designing a big data course
A Singh, S Singh, M Yousef
Journal of Computing Sciences in Colleges 33 (5), 192-198, 2018
2018
Deployable classifiers for malware detection
A Singh, S Singh, A Walenstein, A Lakhotia
International Conference on Information Systems, Technology and Management …, 2012
2012
On deployable adversarial classification models
A Singh, S Singh, A Walenstein, A Lakhotia
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
2011
Strategic methods in adversarial classifier combination
A Singh, A Lakhotia
CRW’10: 3rd Cyberspace Research Workshop, 2010
2010
MALWARE ANALYSIS USING MACHINE LEARNING
A Singh, CAE TechTalk
Program Analysis For Sensing Mutant Cyberweapons
A Walenstein, A Lakhotia, A Singh, G Seetharaman
The system can't perform the operation now. Try again later.
Articles 1–20