Seguir
Erin Lanus
Erin Lanus
Dirección de correo verificada de vt.edu
Título
Citado por
Citado por
Año
Asymptotic and constructive methods for covering perfect hash families and covering arrays
CJ Colbourn, E Lanus, K Sarkar
Designs, Codes and Cryptography 86, 907-937, 2018
332018
Combinatorial testing metrics for machine learning
E Lanus, LJ Freeman, DR Kuhn, RN Kacker
2021 IEEE International Conference on Software Testing, Verification and …, 2021
272021
Systematic training and testing for machine learning using combinatorial interaction testing
T Cody, E Lanus, DD Doyle, L Freeman
2022 IEEE International Conference on Software Testing, Verification and …, 2022
162022
Test and evaluation framework for multi-agent systems of autonomous intelligent agents
E Lanus, I Hernandez, A Dachowicz, LJ Freeman, M Grande, A Lang, ...
2021 16th International Conference of System of Systems Engineering (SoSE …, 2021
132021
Analysis of the Secure Remote Password protocol using CPSA
E Lanus, AT Sherman, R Chang, E Golaszewski, R Wnuk-Fink, C Bonyadi, ...
High Confidence Software and Systems Conference (HCSS), 2020
12*2020
Subspace restrictions and affine composition for covering perfect hash families
CJ Colbourn, E Lanus
The Art of Discrete and Applied Mathematics 1 (2), # P2. 03-# P2. 03, 2018
102018
Partitioned search with column resampling for locating array construction
E Lanus, CJ Colbourn, DC Montgomery
2019 IEEE International Conference on Software Testing, Verification and …, 2019
92019
ATTL: An Automated Targeted Transfer Learning with Deep Neural Networks
SF Ahamed, P Aggarwal, S Shetty, E Lanus, LJ Freeman
2021 IEEE Global Communications Conference (GLOBECOM), 1-7, 2021
52021
Genetic algorithms for affine transformations to existential t-restrictions
RE Dougherty, E Lanus, CJ Colbourn, S Forrest
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2019
32019
Analysis of a forced-latency defense against man-in-the-middle attacks
EF Lanus, EV Zieglar
Journal of Information Warfare 16 (2), 66-78, 2017
32017
Test & Evaluation Best Practices for Machine Learning-Enabled Systems
J Chandrasekaran, T Cody, N McCarthy, E Lanus, L and Freeman
arXiv preprint arXiv:2310.06800, 2023
12023
Algorithms for Constructing Anonymizing Arrays
E Lanus, CJ Colbourn
International Workshop on Combinatorial Algorithms, 382-394, 2020
12020
Interaction testing, fault location, and anonymous attribute-based authorization
E Lanus
Arizona State University, 2019
12019
Assured Autonomy Through Combinatorial Methods
DR Kuhn, MS Raunak, RN Kacker, J Chandrasekaran, E Lanus, T Cody, ...
Computer 57 (5), 86-90, 2024
2024
Why Cyber Threat Modeling Needs Human Factors Expansion: A Position Paper
S Travis, D Gračanin, E Lanus
2023 3rd Intelligent Cybersecurity Conference (ICSC), 110-118, 2023
2023
Guaranteeing Anonymity in Attribute-Based Authorization
E Lanus, CJ Colbourn, GJ Ahn
arXiv preprint arXiv:2310.04896, 2023
2023
A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning
P Roy, J Chadrasekaran, E Lanus, L Freeman, J Werner
arXiv preprint arXiv:2310.04513, 2023
2023
Training Generative Adversarial Networks on Small Datasets by way of Transfer Learning
B Lee, L Eisenbeiser, E Lanus
ITEA Journal of Test and Evaluation 44 (2), 2023
2023
Best practices for addressing new challenges in testing and evaluating artificial intelligence-enabled systems
LJ Freeman, J Kauffman, D Sobien, T Cody, E Lanus
ITEA Journal of Test and Evaluation 43 (3), 174-180, 2022
2022
Evaluating Automated Driving Planner Robustness against Adversarial Influence
A Molina-Markham, SG Ionescu, E Lanus, D Ng, S Sommerer, ...
Workshop on Deception Against Planning Systems and Planning in Adversarial …, 2022
2022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20