Follow
Jacob Harer
Jacob Harer
MIT Lincoln Labs
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
Automated vulnerability detection in source code using deep representation learning
R Russell, L Kim, L Hamilton, T Lazovich, J Harer, O Ozdemir, ...
2018 17th IEEE international conference on machine learning and applications …, 2018
6052018
Automated software vulnerability detection with machine learning
JA Harer, LY Kim, RL Russell, O Ozdemir, LR Kosta, A Rangamani, ...
arXiv preprint arXiv:1803.04497, 2018
2032018
Learning to repair software vulnerabilities with generative adversarial networks
J Harer, O Ozdemir, T Lazovich, C Reale, R Russell, L Kim
Advances in neural information processing systems 31, 2018
822018
Deep learning-based classification and anomaly detection of side-channel signals
X Wang, Q Zhou, J Harer, G Brown, S Qiu, Z Dou, J Wang, A Hinton, ...
Cyber Sensing 2018 10630, 37-44, 2018
462018
Tree-transformer: A transformer-based method for correction of tree-structured data
J Harer, C Reale, P Chin
arXiv preprint arXiv:1908.00449, 2019
442019
Countering physical eavesdropper evasion with adversarial training
KW McClintick, J Harer, B Flowers, WC Headley, AM Wyglinski
IEEE Open Journal of the Communications Society 3, 1820-1833, 2022
92022
A mathematical analysis of network controllability through driver nodes
SP Chin, J Cohen, A Albin, M Hayvanovych, E Reilly, G Brown, J Harer
IEEE Transactions on Computational Social Systems 4 (2), 40-51, 2017
82017
Predicting local field potentials with recurrent neural networks
L Kim, J Harer, A Rangamani, J Moran, PD Parks, A Widge, E Eskandar, ...
2016 38th Annual International Conference of the IEEE Engineering in …, 2016
82016
Nodedrop: A method for finding sufficient network architecture size
L Jensen, J Harer, S Chin
2020 International Joint Conference on Neural Networks (IJCNN), 1-9, 2020
72020
Automated software vulnerability detection with machine learning.(2018)
JA Harer, LY Kim, RL Russell, O Ozdemir, LR Kosta, A Rangamani, ...
arXiv preprint cs.SE/1803.04497, 2018
72018
Automated vulnerability detection in source code using deep representation learning. CoRR abs/1807.04320 (2018)
RL Russell, LY Kim, LH Hamilton, T Lazovich, JA Harer, O Ozdemir, ...
arXiv preprint arXiv:1807.04320, 2018
72018
Automated software vulnerability detection with machine learning. arXiv 2018
JA Harer, LY Kim, RL Russell, O Ozdemir, LR Kosta, A Rangamani, ...
arXiv preprint arXiv:1803.04497, 0
7
Tomo,"
JA Harer, LY Kim, RL Russell, O Ozdemir, LR Kosta, A Rangamani, ...
Automated software vulnerability detection with machine learning," arXiv 55, 2018
32018
Deep learning for minimal-context block tracking through side-channel analysis
L Jensen, G Brown, X Wang, J Harer, S Chin
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
22019
Automated repair of bugs and security vulnerabilities in software
J Harer, T Lazovich, R Russell, O Ozdemir, L Kim
US Patent 10,866,877, 2020
12020
Improved neural machine translation systems for low resource correction tasks
J Harer
Boston University, 2019
12019
Modeling local field potentials with recurrent neural networks
A Rangamani, J Harer, A Sinha, A Widge, E Eskandar, D Dougherty, ...
networks 77, 4, 2015
12015
NodeDrop: A Condition for Reducing Network Size without Effect on Output
L Jensen, J Harer, S Chin
arXiv preprint arXiv:1906.01026, 2019
2019
Draper Mining and Understanding Software Enclaves (MUSE)
P Ellingwood, H Enxing, L Hamilton, J Harer, T Jost, L Kim, L Kosta, ...
2019
Learning to Repair Software Vulnerabilities with Generative Adversarial Networks-Supplementary Material
JA Harer, O Ozdemir, T Lazovich, CP Reale, RL Russell, LY Kim, P Chin
The system can't perform the operation now. Try again later.
Articles 1–20