default search action
Paul Montague
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Rollin Omari, Junae Kim, Paul Montague:
Adversarial Robustness on Image Classification With k-Means. IEEE Access 12: 28853-28859 (2024) - [c32]Sean Lamont, Michael Norrish, Amir Dezfouli, Christian Walder, Paul Montague:
BAIT: Benchmarking (Embedding) Architectures for Interactive Theorem-Proving. AAAI 2024: 10607-10615 - [c31]Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Bayesian Learned Models Can Detect Adversarial Malware for Free. ESORICS (1) 2024: 45-65 - [c30]Andrew C. Cullen, Shijie Liu, Paul Montague, Sarah Monazam Erfani, Benjamin I. P. Rubinstein:
Et Tu Certifications: Robustness Certificates Yield Better Adversarial Examples. ICML 2024 - [c29]Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein:
It's Simplex! Disaggregating Measures to Improve Certified Robustness. SP 2024: 2886-2900 - [c28]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. USENIX Security Symposium 2024 - [i22]Sean Lamont, Michael Norrish, Amir Dezfouli, Christian Walder, Paul Montague:
BAIT: Benchmarking (Embedding) Architectures for Interactive Theorem-Proving. CoRR abs/2403.03401 (2024) - [i21]Anh Tuan Bui, Khanh Doan, Trung Le, Paul Montague, Tamas Abraham, Dinh Q. Phung:
Removing Undesirable Concepts in Text-to-Image Generative Models with Learnable Prompts. CoRR abs/2403.12326 (2024) - [i20]Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Bayesian Learned Models Can Detect Adversarial Malware For Free. CoRR abs/2403.18309 (2024) - [i19]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. CoRR abs/2407.19216 (2024) - [i18]Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World. CoRR abs/2408.12122 (2024) - [i17]Sean Lamont, Christian Walder, Amir Dezfouli, Paul Montague, Michael Norrish:
3D-Prover: Diversity Driven Theorem Proving With Determinantal Point Processes. CoRR abs/2410.11133 (2024) - [i16]Anh Bui, Long Tung Vuong, Khanh Doan, Trung Le, Paul Montague, Tamas Abraham, Dinh Q. Phung:
Erasing Undesirable Concepts in Diffusion Models with Adversarial Preservation. CoRR abs/2410.15618 (2024) - 2023
- [j5]Anh Tuan Bui, Trung Le, He Zhao, Quan Hung Tran, Paul Montague, Dinh Phung:
Generating Adversarial Examples with Task Oriented Multi-Objective Optimization. Trans. Mach. Learn. Res. 2023 (2023) - [c27]Shijie Liu, Andrew C. Cullen, Paul Montague, Sarah M. Erfani, Benjamin I. P. Rubinstein:
Enhancing the Antidote: Improved Pointwise Certifications against Poisoning Attacks. AAAI 2023: 8861-8869 - [c26]Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness. AAAI 2023: 14783-14791 - [c25]Jiahui Zhou, Nayyar Abbas Zaidi, Yishuo Zhang, Paul Montague, Junae Kim, Gang Li:
Leveraging Generative Models for Combating Adversarial Attacks on Tabular Datasets. PAKDD (1) 2023: 147-158 - [i15]Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness. CoRR abs/2301.12680 (2023) - [i14]Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein:
Exploiting Certified Defences to Attack Randomised Smoothing. CoRR abs/2302.04379 (2023) - [i13]Anh Tuan Bui, Trung Le, He Zhao, Quan Hung Tran, Paul Montague, Dinh Q. Phung:
Generating Adversarial Examples with Task Oriented Multi-Objective Optimization. CoRR abs/2304.13229 (2023) - [i12]Shijie Liu, Andrew C. Cullen, Paul Montague, Sarah M. Erfani, Benjamin I. P. Rubinstein:
Enhancing the Antidote: Improved Pointwise Certifications against Poisoning Attacks. CoRR abs/2308.07553 (2023) - [i11]Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein:
It's Simplex! Disaggregating Measures to Improve Certified Robustness. CoRR abs/2309.11005 (2023) - [i10]Rollin Omari, Junae Kim, Paul Montague:
Adversarial Robustness on Image Classification with k-means. CoRR abs/2312.09533 (2023) - 2022
- [j4]Shigang Liu, Guanjun Lin, Lizhen Qu, Jun Zhang, Olivier Y. de Vel, Paul Montague, Yang Xiang:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 19(1): 438-451 (2022) - [c24]Trung Le, Anh Tuan Bui, Le Minh Tri Tue, He Zhao, Paul Montague, Quan Hung Tran, Dinh Q. Phung:
On Global-view Based Defense via Adversarial Attack and Defense Risk Guaranteed Bounds. AISTATS 2022: 11438-11460 - [c23]Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein:
Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity. NeurIPS 2022 - [c22]Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere:
Transferable Graph Backdoor Attack. RAID 2022: 321-332 - [i9]Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere:
Transferable Graph Backdoor Attack. CoRR abs/2207.00425 (2022) - [i8]Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein:
Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity. CoRR abs/2210.06077 (2022) - 2021
- [j3]Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Olivier Y. de Vel, Paul Montague, Yang Xiang:
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases. IEEE Trans. Dependable Secur. Comput. 18(5): 2469-2485 (2021) - [c21]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Dinh Phung:
Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness. AAAI 2021: 6831-6839 - [c20]Van Nguyen, Trung Le, Olivier Y. de Vel, Paul Montague, John Grundy, Dinh Phung:
Information-theoretic Source Code Vulnerability Highlighting. IJCNN 2021: 1-8 - [i7]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Seyit Camtepe, Dinh Phung:
Understanding and Achieving Efficient Robustness with Adversarial Contrastive Learning. CoRR abs/2101.10027 (2021) - 2020
- [c19]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier Y. DeVel, Tamas Abraham, Dinh Q. Phung:
Improving Adversarial Robustness by Enforcing Local and Global Compactness. ECCV (27) 2020: 209-223 - [c18]Yi Han, David Hubczenko, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah M. Erfani:
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence. IJCNN 2020: 1-8 - [c17]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, Dinh Phung:
Code Pointer Network for Binary Function Scope Identification. IJCNN 2020: 1-7 - [c16]Tuan Nguyen, Trung Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung:
Deep Cost-Sensitive Kernel Machine for Binary Software Vulnerability Detection. PAKDD (2) 2020: 164-177 - [c15]Van Nguyen, Trung Le, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung:
Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection. PAKDD (1) 2020: 699-711 - [c14]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung:
Code Action Network for Binary Function Scope Identification. PAKDD (1) 2020: 712-725 - [i6]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier Y. DeVel, Tamas Abraham, Dinh Phung:
Improving Adversarial Robustness by Enforcing Local and Global Compactness. CoRR abs/2007.05123 (2020) - [i5]Tuan-Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier Y. DeVel, Tamas Abraham, Dinh Phung:
Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness. CoRR abs/2009.09612 (2020) - [i4]He Zhao, Trung Le, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Dinh Phung:
Towards Understanding Pixel Vulnerability under Adversarial Attacks for Images. CoRR abs/2010.06131 (2020)
2010 – 2019
- 2019
- [c13]Junae Kim, David Hubczenko, Paul Montague:
Towards Attention Based Vulnerability Discovery Using Source Code Representation. ICANN (4) 2019: 731-746 - [c12]Tue Le, Tuan Nguyen, Trung Le, Dinh Q. Phung, Paul Montague, Olivier Y. de Vel, Lizhen Qu:
Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection. ICLR (Poster) 2019 - [c11]Van Nguyen, Trung Le, Tue Le, Khanh Nguyen, Olivier Y. DeVel, Paul Montague, Lizhen Qu, Dinh Q. Phung:
Deep Domain Adaptation for Vulnerable Code Function Identification. IJCNN 2019: 1-8 - [i3]Yi Han, David Hubczenko, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah M. Erfani:
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking. CoRR abs/1902.09062 (2019) - [i2]He Zhao, Trung Le, Paul Montague, Olivier Y. de Vel, Tamas Abraham, Dinh Phung:
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions. CoRR abs/1910.01329 (2019) - 2018
- [j2]Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Yang Xiang, Olivier Y. de Vel, Paul Montague:
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery. IEEE Trans. Ind. Informatics 14(7): 3289-3297 (2018) - [c10]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. GameSec 2018: 145-165 - [i1]Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. CoRR abs/1808.05770 (2018) - 2017
- [c9]Paul Montague, Junae Kim:
An efficient semi-supervised SVM for anomaly detection. IJCNN 2017: 2843-2850 - 2012
- [c8]Mark Anderson, Paul Montague, Benjamin Long:
A Context-Based Integrity Framework. APSEC 2012: 1-9
2000 – 2009
- 2005
- [c7]Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague:
GBD Threshold Cryptography with an Application to RSA Key Recovery. ACISP 2005: 394-405 - [c6]Brenton Cooper, Paul Montague:
Translation of Rights Expressions. ACSW 2005: 137-144 - [e3]Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn:
ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005. CRPIT 44, Australian Computer Society 2005, ISBN 1-920682-26-0 [contents] - 2004
- [j1]Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Int. J. Inf. Sec. 3(2): 86-98 (2004) - [e2]James M. Hogan, Paul Montague, Martin K. Purvis, Chris Steketee:
ACSW Frontiers 2004, 2004 ACSW Workshops - the Australasian Information Security Workshop (AISW2004), the Australasian Workshop on Data Mining and Web Intelligence (DMWI2004), and the Australasian Workshop on Software Internationalisation (AWSI2004) . Dunedin, New Zealand, January 2004. CRPIT 32, Australian Computer Society 2004, ISBN 1-920682-14-7 [contents] - 2003
- [c5]Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The Security of Fixed versus Random Elliptic Curves in Cryptography. ACISP 2003: 55-66 - [c4]Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague:
A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401 - [e1]Chris W. Johnson, Paul Montague, Chris Steketee:
ACSW Frontiers 2003, 2003 ACSW Workshops - the Australasian Information Security Workshop (AISW) and the Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC), Adelaide, South Australia, February 2003. CRPIT 21, Australian Computer Society 2003, ISBN 1-920682-00-7 [contents] - 2002
- [c3]Yvonne Hitchcock, Paul Montague:
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. ACISP 2002: 214-225 - 2001
- [c2]Colin Boyd, Paul Montague, Khanh Quoc Nguyen:
Elliptic Curve Based Password Authenticated Key Exchange Protocols. ACISP 2001: 487-501
1990 – 1999
- 1999
- [c1]Praveen Koduri, Anant Mahajan, Paul Montague, Philip Moseley:
An elliptic curve authenticated key exchange based approach to key infrastructure. KES 1999: 513-517
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint