Language agent tree search unifies reasoning acting and planning in language models A Zhou, K Yan, M Shlapentokh-Rothman, H Wang, YX Wang arXiv preprint arXiv:2310.04406, 2023 | 114 | 2023 |
Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ... arXiv preprint arXiv:2010.00533, 2020 | 73 | 2020 |
Learning curves for analysis of deep networks D Hoiem, T Gupta, Z Li, M Shlapentokh-Rothman International conference on machine learning, 4287-4296, 2021 | 26 | 2021 |
Coevolutionary modeling of cyber attack patterns and mitigations using public datasets M Shlapentokh-Rothman, J Kelly, A Baral, E Hemberg, UM O'Reilly Proceedings of the Genetic and Evolutionary Computation Conference, 714-722, 2021 | 14 | 2021 |
Securing the software defined perimeter with evolutionary co-optimization M Shlapentokh-Rothman, E Hemberg, UM O'Reilly Proceedings of the 2020 Genetic and Evolutionary Computation Conference …, 2020 | 10 | 2020 |
Webwise: Web interface control and sequential exploration with large language models H Tao, S TV, M Shlapentokh-Rothman, D Hoiem arXiv preprint arXiv:2310.16042, 2023 | 7 | 2023 |
Region-Based Representations Revisited M Shlapentokh-Rothman, A Blume, Y Xiao, Y Wu, S TV, H Tao, JY Lee, ... Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024 | 6 | 2024 |
Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting. arXiv, Feb. 10, 2021 E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ... arXiv preprint arXiv:2010.00533, 2024 | 5 | 2024 |
Linking Threat Tactics E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ... Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and …, 2020 | 3 | 2020 |
WebWISE: Unlocking Web Interface Control for LLMs via Sequential Exploration H Tao, TV Sethuraman, M Shlapentokh-Rothman, T Gupta, H Ji, D Hoiem Findings of the Association for Computational Linguistics: NAACL 2024, 3693-3711, 2024 | 2 | 2024 |
Unifying public threat knowledge for cyber hunting M Shlapentokh-Rothman Massachusetts Institute of Technology, 2020 | 2 | 2020 |
BRON–Linking Attack Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations. arXiv, 2020 E Hemberg, J Kelly, M Shlapentokh-Rothman, B Reinstadler, K Xu, ... | 2 | 2010 |
Can We Generate Visual Programs Without Prompting LLMs? M Shlapentokh-Rothman, YX Wang, D Hoiem arXiv preprint arXiv:2412.08564, 2024 | | 2024 |
MIRACLE: An Online, Explainable Multimodal Interactive Concept Learning System A Blume, KD Nguyen, Z Wang, Y Chen, M Shlapentokh-Rothman, X Jin, ... Proceedings of the 32nd ACM International Conference on Multimedia, 11252-11254, 2024 | | 2024 |