Skip to main content

Showing 1–3 of 3 results for author: Tully, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.13023  [pdf, ps, other

    cs.AI cs.LG

    A Practical Guide for Evaluating LLMs and LLM-Reliant Systems

    Authors: Ethan M. Rudd, Christopher Andrews, Philip Tully

    Abstract: Recent advances in generative AI have led to remarkable interest in using systems that rely on large language models (LLMs) for practical applications. However, meaningful evaluation of these systems in real-world scenarios comes with a distinct set of challenges, which are not well-addressed by synthetic benchmarks and de-facto metrics that are often seen in the literature. We present a practical… ▽ More

    Submitted 15 June, 2025; originally announced June 2025.

    Comments: Pre-print of a manuscript submitted to Transactions of the Association for Computational Linguistics (TACL)

  2. arXiv:2212.02666  [pdf, other

    cs.LG cs.AI cs.CR

    Transformers for End-to-End InfoSec Tasks: A Feasibility Study

    Authors: Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully

    Abstract: In this paper, we assess the viability of transformer models in end-to-end InfoSec settings, in which no intermediate feature representations or processing steps occur outside the model. We implement transformer models for two distinct InfoSec data formats - specifically URLs and PE files - in a novel end-to-end approach, and explore a variety of architectural designs, training regimes, and experi… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

    Comments: Post-print of a manuscript accepted to ACM Asia-CCS Workshop on Robust Malware Analysis (WoRMA) 2022. 11 Pages total. arXiv admin note: substantial text overlap with arXiv:2011.03040

    Journal ref: Proceedings of the 1st Workshop on Robust Malware Analysis (2022) 21-31

  3. arXiv:1802.05196  [pdf, other

    cs.CR cs.CY cs.LG stat.ML

    Generative Models for Spear Phishing Posts on Social Media

    Authors: John Seymour, Philip Tully

    Abstract: Historically, machine learning in computer security has prioritized defense: think intrusion detection systems, malware classification, and botnet traffic identification. Offense can benefit from data just as well. Social networks, with their access to extensive personal data, bot-friendly APIs, colloquial syntax, and prevalence of shortened links, are the perfect venues for spreading machine-gene… ▽ More

    Submitted 14 February, 2018; originally announced February 2018.

    Comments: Presented at NIPS Workshop on Machine Deception (2017), 4 page limit plus references, 2 figures