C
Charles A. Kamhoua
Researcher at United States Army Research Laboratory
Publications - 231
Citations - 3743
Charles A. Kamhoua is an academic researcher from United States Army Research Laboratory. The author has contributed to research in topics: Game theory & Computer science. The author has an hindex of 23, co-authored 208 publications receiving 2558 citations. Previous affiliations of Charles A. Kamhoua include Raytheon & Washington University in St. Louis.
Papers
More filters
Book ChapterDOI
A Network Centrality Game for Epidemic Control
Olivier Tsemogne,Willie Kouam,Ahmed Hasan Anwar,Yezekael Hayel,Charles A. Kamhoua,Gabriel Deugoue +5 more
TL;DR: In this paper , the authors propose a new framework that takes into account the network topology, and show that the best strategy for each player at each period to optimize his/her overall outcome is to focus on the set of most influential nodes.
Proceedings ArticleDOI
Towards building actionable indicators of compromise based on a collaboration model
TL;DR: A collaboration model in certain attributes in IOC model related to the seriousness of the threat that the IOC triggers and the confidence in the IOC detection or prediction are built based on a community or collaborative model is proposed.
Journal ArticleDOI
Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach
TL;DR: In this paper , the optimal allocation of detection resources (sensors) to mitigate multi-stage attacks, in the presence of the defender's uncertainty in the attacker's intention, is studied.
Posted Content
Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions.
TL;DR: In this article, the authors examine the DNN response surface to understand its classification boundary and reveal the structural problem of DNN classification boundary that leads to the adversarial examples, and they show that there are infinitely many adversarial images given one clean sample.
Patent
Secure logic chip for resisting hardware trojan induced leakage in combinational logics
TL;DR: A secure logic chip with resistance to hardware Trojan induced data leakage was proposed in this article. But this chip is not secure in the sense that even when the design is known to an attacker and a data leakage Trojan is injected subsequently, no useful information can be obtained.