Skip to content

Commit 119f2a7

Browse files
committed
adding 2025 papers to publication page, memberships section on home page
1 parent 66c94d3 commit 119f2a7

File tree

6 files changed

+147
-0
lines changed

6 files changed

+147
-0
lines changed

_data/publications/bibliography.bib

Lines changed: 125 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,128 @@
1+
@inproceedings{DBLP:conf/gecco/JorgensenHTO25,
2+
author = {Steven Jorgensen and
3+
Erik Hemberg and
4+
Jamal Toutouh and
5+
Una{-}May O'Reilly},
6+
editor = {Bogdan Filipic},
7+
title = {Guiding Evolutionary AutoEncoder Training with Activation-Based Pruning
8+
Operators},
9+
booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference,
10+
{GECCO} 2025, {NH} Malaga Hotel, Malaga, Spain, July 14-18, 2025},
11+
pages = {386--396},
12+
publisher = {{ACM}},
13+
year = {2025},
14+
url = {https://doi.org/10.1145/3712256.3726449},
15+
doi = {10.1145/3712256.3726449},
16+
timestamp = {Sat, 09 Aug 2025 01:00:00 +0200},
17+
biburl = {https://dblp.org/rec/conf/gecco/JorgensenHTO25.bib},
18+
bibsource = {dblp computer science bibliography, https://dblp.org}
19+
}
20+
21+
@inproceedings{DBLP:conf/naacl/WestenfelderHMOC25,
22+
author = {Finnian Westenfelder and
23+
Erik Hemberg and
24+
Stephen Moskal and
25+
Una{-}May O'Reilly and
26+
Silviu Chiricescu},
27+
editor = {Luis Chiruzzo and
28+
Alan Ritter and
29+
Lu Wang},
30+
title = {LLM-Supported Natural Language to Bash Translation},
31+
booktitle = {Proceedings of the 2025 Conference of the Nations of the Americas
32+
Chapter of the Association for Computational Linguistics: Human Language
33+
Technologies, {NAACL} 2025 - Volume 1: Long Papers, Albuquerque, New
34+
Mexico, USA, April 29 - May 4, 2025},
35+
pages = {11135--11147},
36+
publisher = {Association for Computational Linguistics},
37+
year = {2025},
38+
url = {https://doi.org/10.18653/v1/2025.naacl-long.555},
39+
doi = {10.18653/V1/2025.NAACL-LONG.555},
40+
timestamp = {Thu, 14 Aug 2025 11:28:41 +0200},
41+
biburl = {https://dblp.org/rec/conf/naacl/WestenfelderHMOC25.bib},
42+
bibsource = {dblp computer science bibliography, https://dblp.org}
43+
}
44+
45+
@article{DBLP:journals/corr/abs-2502-06858,
46+
author = {Finnian Westenfelder and
47+
Erik Hemberg and
48+
Miguel Tulla and
49+
Stephen Moskal and
50+
Una{-}May O'Reilly and
51+
Silviu Chiricescu},
52+
title = {LLM-Supported Natural Language to Bash Translation},
53+
journal = {CoRR},
54+
volume = {abs/2502.06858},
55+
year = {2025},
56+
url = {https://doi.org/10.48550/arXiv.2502.06858},
57+
doi = {10.48550/ARXIV.2502.06858},
58+
eprinttype = {arXiv},
59+
eprint = {2502.06858},
60+
timestamp = {Wed, 12 Mar 2025 00:00:00 +0100},
61+
biburl = {https://dblp.org/rec/journals/corr/abs-2502-06858.bib},
62+
bibsource = {dblp computer science bibliography, https://dblp.org}
63+
}
64+
65+
@article{DBLP:journals/corr/abs-2504-07287,
66+
author = {Miguel Tulla and
67+
Andrea Vignali and
68+
Christian Colon and
69+
Giancarlo Sperl{\`{\i}} and
70+
Simon Pietro Romano and
71+
Masataro Asai and
72+
Una{-}May O'Reilly and
73+
Erik Hemberg},
74+
title = {ALFA-Chains: AI-Supported Discovery of Privilege Escalation and Remote
75+
Exploit Chains},
76+
journal = {CoRR},
77+
volume = {abs/2504.07287},
78+
year = {2025},
79+
url = {https://doi.org/10.48550/arXiv.2504.07287},
80+
doi = {10.48550/ARXIV.2504.07287},
81+
eprinttype = {arXiv},
82+
eprint = {2504.07287},
83+
timestamp = {Wed, 21 May 2025 01:00:00 +0200},
84+
biburl = {https://dblp.org/rec/journals/corr/abs-2504-07287.bib},
85+
bibsource = {dblp computer science bibliography, https://dblp.org}
86+
}
87+
88+
@article{DBLP:journals/corr/abs-2505-05138,
89+
author = {Steven Jorgensen and
90+
Erik Hemberg and
91+
Jamal Toutouh and
92+
Una{-}May O'Reilly},
93+
title = {Guiding Evolutionary AutoEncoder Training with Activation-Based Pruning
94+
Operators},
95+
journal = {CoRR},
96+
volume = {abs/2505.05138},
97+
year = {2025},
98+
url = {https://doi.org/10.48550/arXiv.2505.05138},
99+
doi = {10.48550/ARXIV.2505.05138},
100+
eprinttype = {arXiv},
101+
eprint = {2505.05138},
102+
timestamp = {Fri, 20 Jun 2025 01:00:00 +0200},
103+
biburl = {https://dblp.org/rec/journals/corr/abs-2505-05138.bib},
104+
bibsource = {dblp computer science bibliography, https://dblp.org}
105+
}
106+
107+
@article{DBLP:journals/corr/abs-2507-05534,
108+
author = {Erik Hemberg and
109+
Eric Liu and
110+
Lucille Fuller and
111+
Stephen Moskal and
112+
Una{-}May O'Reilly},
113+
title = {Evolutionary and Coevolutionary Multi-Agent Design Choices and Dynamics},
114+
journal = {CoRR},
115+
volume = {abs/2507.05534},
116+
year = {2025},
117+
url = {https://doi.org/10.48550/arXiv.2507.05534},
118+
doi = {10.48550/ARXIV.2507.05534},
119+
eprinttype = {arXiv},
120+
eprint = {2507.05534},
121+
timestamp = {Tue, 12 Aug 2025 01:00:00 +0200},
122+
biburl = {https://dblp.org/rec/journals/corr/abs-2507-05534.bib},
123+
bibsource = {dblp computer science bibliography, https://dblp.org}
124+
}
125+
1126
@article{DBLP:journals/dtrap/HembergTRO24,
2127
author = {Erik Hemberg and
3128
Matthew J. Turner and

_data/research/memberships.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
- name: MIT CSAIL Alliances
2+
photo: csail_alliances.png
3+
4+
- name: CAMS - Cyber at MIT Sloan
5+
photo: mitsloan.png

_includes/memberships.html

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
<div class="row clearfix">
2+
{% for member in include.data %}
3+
<div class="col-sm-3 text-center">
4+
<!-- <h4 style="margin:0">{{ member.name }}</h4> -->
5+
<img src="{{ site.url }}{{ site.baseurl }}/images/home/memberships/{{ member.photo }}"
6+
width="100%"
7+
class="img-fluid"
8+
style="margin-bottom:1em"
9+
alt="{{ member.name }}"/>
10+
</div>
11+
{% endfor %}
12+
</div>

_pages/home.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,11 @@ Adversarial Intelligence is the thinking underlying adversarial behavior. Adve
1414

1515
In all cases, conflicting objectives drive adversaries to clash (or more formally “engage”) using different repertoires of behavior (called asymmetric action spaces), each side trying to outwit the other. Adversarial behavior recruits planning, learning, technical skills, expert knowledge, novelty, discovery, open-ended thinking, and other facets of intelligence related to asymmetric competition. ALFA’s goal is to computationally replicate Adversarial Intelligence. We work in the domains of regulatory compliance, information security, and cyber security. We are optimistic our efforts will reveal new insights into the nature of Adversarial Intelligence and Adversarial Behavior, including questions like: How can it be used to strengthen defenses? How can it be used to anticipate what an adversary may do? How and why does it continue or cease? How does it lead to escalation?
1616

17+
### Memberships
18+
<div class="row">
19+
{% include memberships.html data=site.data.research.memberships%}
20+
</div>
21+
1722
### Sponsors
1823
ALFA's research would not be possible without the past and ongoing support of our industry sponsors
1924
<img src="{{ site.url }}{{ site.baseurl }}/images/home/Alfa-Sponsors2025.png" style="display: block; margin: auto; width: 100%;">
203 KB
Loading
52.7 KB
Loading

0 commit comments

Comments
 (0)