Philip Tully
Citata da
Citata da
Weaponizing Data Science for Social Engineering: Automated E2E Spearphishing on Twitter
J Seymour, PJ Tully
Black Hat USA 2016, DEF CON 24, 2016
Synaptic and nonsynaptic plasticity approximating probabilistic inference
PJ Tully, MH Hennig, A Lansner
Frontiers in synaptic neuroscience 6, 8, 2014
Spike-based Bayesian-Hebbian learning of temporal sequences
PJ Tully, H Lindn, MH Hennig, A Lansner
PLoS computational biology 12 (5), e1004954, 2016
Large-scale simulations of plastic neural networks on neuromorphic hardware
JC Knight, PJ Tully, BA Kaplan, A Lansner, SB Furber
Frontiers in neuroanatomy 10, 37, 2016
Generative models for spear phishing posts on social media
J Seymour, P Tully
arXiv preprint arXiv:1802.05196, 2018
Functional relevance of different basal ganglia pathways investigated in a spiking model with reward dependent plasticity
P Berthet, M Lindahl, PJ Tully, J Hellgren-Kotaleski, A Lansner
Frontiers in neural circuits 10, 53, 2016
Repurposing Neural Networks to Generate Synthetic Media for Information Operations
P Tully, L Foster
Black Hat USA 2020, 2020
Methods for automated social phishing
J Foster, M Price, CB Cullison, P Tully, JJ Seymour III
US Patent App. 15/944,254, 2019
Spike-Based Bayesian-Hebbian Learning in Cortical and Subcortical Microcircuits
P Tully
KTH Royal Institute of Technology, 2017
Probabilistic computation underlying sequence learning in a spiking attractor memory network
P Tully, H Lindn, MH Hennig, A Lansner
BMC Neuroscience 14 (1), 1-2, 2013
Transformers for End-to-End InfoSec Tasks: A Feasibility Study
EM Rudd, MS Rahman, P Tully
Proceedings of the 1st Workshop on Robust Malware Analysis, 21-31, 2022
A Picture is Worth a Thousand Words, Literally: Deep Neural Networks for Social Stego
P Tully, MT Raggo
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–12