Follow
Michal Shlapentokh-Rothman
Title
Cited by
Cited by
Year
Language agent tree search unifies reasoning acting and planning in language models
A Zhou, K Yan, M Shlapentokh-Rothman, H Wang, YX Wang
arXiv preprint arXiv:2310.04406, 2023
1142023
Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting
E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ...
arXiv preprint arXiv:2010.00533, 2020
732020
Learning curves for analysis of deep networks
D Hoiem, T Gupta, Z Li, M Shlapentokh-Rothman
International conference on machine learning, 4287-4296, 2021
262021
Coevolutionary modeling of cyber attack patterns and mitigations using public datasets
M Shlapentokh-Rothman, J Kelly, A Baral, E Hemberg, UM O'Reilly
Proceedings of the Genetic and Evolutionary Computation Conference, 714-722, 2021
142021
Securing the software defined perimeter with evolutionary co-optimization
M Shlapentokh-Rothman, E Hemberg, UM O'Reilly
Proceedings of the 2020 Genetic and Evolutionary Computation Conference …, 2020
102020
Webwise: Web interface control and sequential exploration with large language models
H Tao, S TV, M Shlapentokh-Rothman, D Hoiem
arXiv preprint arXiv:2310.16042, 2023
72023
Region-Based Representations Revisited
M Shlapentokh-Rothman, A Blume, Y Xiao, Y Wu, S TV, H Tao, JY Lee, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024
62024
Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting. arXiv, Feb. 10, 2021
E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ...
arXiv preprint arXiv:2010.00533, 2024
52024
Linking Threat Tactics
E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ...
Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and …, 2020
32020
WebWISE: Unlocking Web Interface Control for LLMs via Sequential Exploration
H Tao, TV Sethuraman, M Shlapentokh-Rothman, T Gupta, H Ji, D Hoiem
Findings of the Association for Computational Linguistics: NAACL 2024, 3693-3711, 2024
22024
Unifying public threat knowledge for cyber hunting
M Shlapentokh-Rothman
Massachusetts Institute of Technology, 2020
22020
BRON–Linking Attack Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations. arXiv, 2020
E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ...
22010
Can We Generate Visual Programs Without Prompting LLMs?
M Shlapentokh-Rothman, YX Wang, D Hoiem
arXiv preprint arXiv:2412.08564, 2024
2024
MIRACLE: An Online, Explainable Multimodal Interactive Concept Learning System
A Blume, KD Nguyen, Z Wang, Y Chen, M Shlapentokh-Rothman, X Jin, ...
Proceedings of the 32nd ACM International Conference on Multimedia, 11252-11254, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–14