Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 2 of 2
Full-Text Articles in Statistical Models
Applications Of Transfer Learning From Malicious To Vulnerable Binaries, Sean Patrick Mcnulty
Applications Of Transfer Learning From Malicious To Vulnerable Binaries, Sean Patrick Mcnulty
Graduate Student Theses, Dissertations, & Professional Papers
Malware detection and vulnerability detection are important cybersecurity tasks. Previous research has successfully applied a variety of machine learning methods to both. However, despite their potential synergies, previous research has yet to unite these two tasks. Given the recent success of transfer learning in many domains, such as language modeling and image recognition, this thesis investigated the use of transfer learning to improve vulnerability detection. Specifically, we pre-trained a series of models to detect malicious binaries and used the weights from those models to kickstart the detection of vulnerable binaries. In our study, we also investigated five different data representations …
A Non-Deterministic Deep Learning Based Surrogate For Ice Sheet Modeling, Hannah Jordan
A Non-Deterministic Deep Learning Based Surrogate For Ice Sheet Modeling, Hannah Jordan
Graduate Student Theses, Dissertations, & Professional Papers
Surrogate modeling is a new and expanding field in the world of deep learning, providing a computationally inexpensive way to approximate results from computationally demanding high-fidelity simulations. Ice sheet modeling is one of these computationally expensive models, the model used in this study currently requires between 10 and 20 minutes to complete one simulation. While this process is adequate for certain applications, the ability to use sampling approaches to perform statistical inference becomes infeasible. This issue can be overcome by using a surrogate model to approximate the ice sheet model, bringing the time to produce output down to a tenth …