default search action
Richard Lippmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Richard Lippmann:
Understanding and Applying Deep Learning. Neural Comput. 35(3): 287-308 (2023)
2010 – 2019
- 2015
- [c44]Neal Wagner, Richard Lippmann, Michael L. Winterrose, James Riordan, Tamara Yu, William W. Streilein:
Agent-based simulation for assessing network security risk due to unauthorized hardware. SpringSim (ADS) 2015: 18-26 - 2010
- [j16]Pavel Laskov, Richard Lippmann:
Machine learning in adversarial environments. Mach. Learn. 81(2): 115-119 (2010) - [c43]Kevin M. Carter, Richard Lippmann, Stephen W. Boyer:
Temporally oblivious anomaly detection on large networks using functional peers. Internet Measurement Conference 2010: 465-471 - [c42]Tamara Yu, Richard Lippmann, James Riordan, Stephen W. Boyer:
EMBER: a global perspective on extreme malicious behavior. VizSEC 2010: 1-12 - [c41]Matthew Chu, Kyle Ingols, Richard Lippmann, Seth E. Webster, Stephen W. Boyer:
Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR. VizSEC 2010: 22-33
2000 – 2009
- 2009
- [c40]Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E. Webster, Stephen W. Boyer:
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs. ACSAC 2009: 117-126 - 2008
- [c39]Leevar Williams, Richard Lippmann, Kyle Ingols:
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. VizSEC 2008: 44-59 - [e5]Richard Lippmann, Engin Kirda, Ari Trachtenberg:
Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings. Lecture Notes in Computer Science 5230, Springer 2008, ISBN 978-3-540-87402-7 [contents] - 2007
- [c38]Leevar Williams, Richard Lippmann, Kyle Ingols:
An Interactive Attack Graph Cascade and Reachability Display. VizSEC 2007: 221-236 - [e4]Christopher Krügel, Richard Lippmann, Andrew J. Clark:
Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings. Lecture Notes in Computer Science 4637, Springer 2007, ISBN 978-3-540-74319-4 [contents] - 2006
- [j15]Philip K. Chan, Richard Lippmann:
Machine Learning for Computer Security. J. Mach. Learn. Res. 7: 2669-2672 (2006) - [c37]Kyle Ingols, Richard Lippmann, Keith Piwowarski:
Practical Attack Graph Generation for Network Defense. ACSAC 2006: 121-130 - [c36]Seth E. Webster, Richard Lippmann, Marc A. Zissman:
Experience Using Active and Passive Mapping for Network Situational Awareness. NCA 2006: 19-26 - 2004
- [c35]Misha Zitser, Richard Lippmann, Tim Leek:
Testing static analysis tools using exploitable buffer overflows from open source code. SIGSOFT FSE 2004: 97-106 - [e3]Carla E. Brodley, Philip Chan, Richard Lippmann, William Yurcik:
1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-974-8 [contents] - 2002
- [c34]Richard Lippmann, Seth E. Webster, Douglas Stetson:
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. RAID 2002: 307-326 - [c33]Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
Automated Generation and Analysis of Attack Graphs. S&P 2002: 273-284 - 2001
- [j14]Robert K. Cunningham, Richard Lippmann, Seth E. Webster:
Detecting and displaying novel computer attacks with Macroscope. IEEE Trans. Syst. Man Cybern. Part A 31(4): 275-281 (2001) - 2000
- [j13]Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das:
The 1999 DARPA off-line intrusion detection evaluation. Comput. Networks 34(4): 579-595 (2000) - [j12]Richard Lippmann, Robert K. Cunningham:
Improving intrusion detection performance using keyword selection and neural networks. Comput. Networks 34(4): 597-603 (2000) - [c32]Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das:
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. Recent Advances in Intrusion Detection 2000: 162-182
1990 – 1999
- 1999
- [c31]Richard Lippmann, Robert K. Cunningham:
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. Recent Advances in Intrusion Detection 1999 - [c30]Richard Lippmann, Robert K. Cunningham, David J. Fried, Isaac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman:
Results of the DARPA 1998 Offline Intrusion Detection Evaluation. Recent Advances in Intrusion Detection 1999 - 1997
- [j11]John Lazzaro, John Wawrzynek, Richard P. Lippmann:
A micropower analog circuit implementation of hidden Markov model state decoding. IEEE J. Solid State Circuits 32(8): 1200-1209 (1997) - [j10]Richard P. Lippmann:
Speech recognition by machines and humans. Speech Commun. 22(1): 1-15 (1997) - [j9]Eric I. Chang, Richard P. Lippmann:
High-performance low-complexity wordspotting using neural networks. IEEE Trans. Signal Process. 45(11): 2864-2870 (1997) - [c29]Richard P. Lippmann, Beth A. Carlson:
Using missing feature theory to actively select features for robust speech recognition with interruptions, filtering and noise KN-37. EUROSPEECH 1997 - 1996
- [j8]Richard P. Lippmann:
Recognition by humans and machines: miles to go before we sleep. Speech Commun. 18(3): 247-248 (1996) - [j7]Richard P. Lippmann:
Accurate consonant perception without mid-frequency speech energy. IEEE Trans. Speech Audio Process. 4(1): 66 (1996) - [c28]Eric I. Chang, Richard P. Lippmann:
Improving wordspotting performance with artificially generated data. ICASSP 1996: 526-529 - [c27]John Lazzaro, John Wawrzynek, Richard Lippmann:
A Micropower Analog VLSI HMM State Decoder for Wordspotting. NIPS 1996: 727-733 - 1995
- [j6]Charles R. Jankowski Jr., Hoang-Doan H. Vo, Richard P. Lippmann:
A comparison of signal processing front ends for automatic word recognition. IEEE Trans. Speech Audio Process. 3(4): 286-293 (1995) - 1994
- [j5]Richard Lippmann:
Book Review: Neural Networks, a Comprehensive Foundation, by Simon Haykin. Int. J. Neural Syst. 5(4): 363-364 (1994) - [c26]Richard Lippmann, Eric I. Chang, Charles R. Jankowski Jr.:
Wordspotter training using figure-of-merit back propagation. ICASSP (1) 1994: 389-392 - [c25]Eric I. Chang, Richard Lippmann:
Using Voice Transformations to Create Additional Training Talkers for Word Spotting. NIPS 1994: 875-882 - [c24]Richard Lippmann, Linda Kukolich, David Shahian:
Predicting the Risk of Complications in Coronary Artery Bypass Operations using Neural Networks. NIPS 1994: 1055-1062 - 1993
- [c23]Richard P. Lippmann, Elliot Singer:
Hybrid neural-network/HMM approaches to wordspotting. ICASSP (1) 1993: 565-568 - [c22]Richard P. Lippmann:
Evaluation and Analysis of Auditory Model Front Ends for Robust Speech Recognition Program Summary. HLT 1993 - [c21]Eric I. Chang, Richard Lippmann:
Figure of Merit Training for Detection and Spotting. NIPS 1993: 1019-1026 - 1992
- [c20]Charles R. Jankowski Jr., Richard P. Lippmann:
Comparison of Auditory Models for Robust Speech Recognition. HLT 1992 - [c19]Richard P. Lippmann:
Evaluation and Analysis of Auditory Model Front Ends for Robust Speech Recognition Program Summary. HLT 1992 - [c18]Eric I. Chang, Richard Lippmann:
A Boundary Hunting Radial Basis Function Classifier which Allocates Centers Constructively. NIPS 1992: 139-146 - [e2]John E. Moody, Stephen Jose Hanson, Richard Lippmann:
Advances in Neural Information Processing Systems 4, [NIPS Conference, Denver, Colorado, USA, December 2-5, 1991]. Morgan Kaufmann 1992, ISBN 1-55860-222-4 [contents] - 1991
- [j4]Michael D. Richard, Richard P. Lippmann:
Neural Network Classifiers Estimate Bayesian a posteriori Probabilities. Neural Comput. 3(4): 461-483 (1991) - [c17]Richard C. Rose, Eric I. Chang, Richard Lippmann:
Techniques for information retrieval from voice messages. ICASSP 1991: 317-320 - [c16]Elliot Singer, Richard Lippmann:
Improved Hidden Markov Models Speech Recognition Using Radial Basis Function Networks. NIPS 1991: 159-166 - [e1]Richard Lippmann, John E. Moody, David S. Touretzky:
Advances in Neural Information Processing Systems 3, [NIPS Conference, Denver, Colorado, USA, November 26-29, 1990]. Morgan Kaufmann 1991, ISBN 1-55860-184-8 [contents] - 1990
- [c15]Thao K. P. Nguyen, Richard P. Lippmann, Bernard Gold, Douglas B. Paul:
A physiologically motivated front-end for speech recognition. IJCNN 1990: 503-508 - [c14]Eric I. Chang, Richard P. Lippmann, D. W. Tong:
Using genetic algorithms to select and create features for pattern classification. IJCNN 1990: 747-752 - [c13]Eric I. Chang, Richard Lippmann:
Using Genetic Algorithms to Improve Pattern Classification Performance. NIPS 1990: 797-803 - [c12]Kenney Ng, Richard Lippmann:
Practical Characteristics of Neural Network and Conventional Patterns Classifiers. NIPS 1990: 970-976
1980 – 1989
- 1989
- [j3]Richard P. Lippmann:
Pattern classification using neural networks. IEEE Commun. Mag. 27(11): 47-50 (1989) - [j2]Richard P. Lippmann:
Review of Neural Networks for Speech Recognition. Neural Comput. 1(1): 1-38 (1989) - [c11]Yuchun Lee, Richard Lippmann:
Practical Characteristics of Neural Network and Conventional Pattern Classifiers on Artificial and Speech Problems. NIPS 1989: 168-177 - [c10]William Y. Huang, Richard Lippmann:
HMM Speech Recognition with Neural Net Discrimination. NIPS 1989: 194-202 - 1988
- [j1]Richard P. Lippmann:
An introduction to computing with neural nets. SIGARCH Comput. Archit. News 16(1): 7-25 (1988) - [c9]Richard P. Lippmann:
Neural nets for computing. ICASSP 1988: 1-6 - [c8]Bernard Gold, Richard P. Lippmann:
A neural network for isolated-word recognition. ICASSP 1988: 44-47 - [c7]Richard P. Lippmann, Edward A. Martin:
Discriminant clustering using an HMM isolated-word recognizer. ICASSP 1988: 48-51 - [c6]Edward A. Martin, Richard P. Lippmann, Douglas B. Paul:
Dynamic adaptation of Hidden Markov models for robust isolated-word speech recognition. ICASSP 1988: 52-54 - [c5]William Huang, Richard Lippmann, Ben Gold:
A neural net approach to speech recognition. ICASSP 1988: 99-102 - [c4]Richard Lippmann, Paul Beckman:
Adaptive Neural Net Preprocessing for Signal Detection in Non-Gaussian Noise. NIPS 1988: 124-132 - 1987
- [c3]Richard P. Lippmann, Edward A. Martin, Douglas B. Paul:
Multi-style training for robust isolated-word speech recognition. ICASSP 1987: 705-708 - [c2]Edward A. Martin, Richard P. Lippmann, Douglas B. Paul:
Two-stage discriminant analysis for improved isolated-word recognition. ICASSP 1987: 709-712 - [c1]William Y. Huang, Richard Lippmann:
Neural Net and Traditional Classifiers. NIPS 1987: 387-396
1970 – 1979
- 1978
- [b1]Richard P. Lippmann:
The effect of amplitude compression on the intelligibility of speech for persons with sensorineural hearing loss. Massachusetts Institute of Technology, Cambridge, MA, USA, 1978
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-20 00:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint