Wiki Article

User:Iking5

Nguồn dữ liệu từ Wikipedia, hiển thị bởi DefZone.Net

iking5 is a wikipedian interested in lesser known conspiracy theories and obscure pieces of pop culture history. He is a supporter and narrator for Spoken Wiki with particular interest in the narration of strange, disgusting and obscure articles (Hours narrated: 4:32:45).
He is currently enrolled at George Washington University working on a Ph.D. in high-performance computing with a focus on graph algorithms and graph neural networks. He previously attended GMU where he was awarded a B.S. in Computer Science with a minor in Mathematics. He is a former member of WGMU.

Publications:

[edit]
  • Trail: A Knowledge Graph-Based Approach for Attributing Advanced Persistent Threats (2025)[1]
  • Revelio: Revealing Important Message Flows in Graph Neural Networks (2025)[2]
  • Exploring the Efficacy of Multi-Agent Reinforcement Learning for Autonomous Cyber Defence: A CAGE Challenge 4 Perspective (2025)[3][4]
  • They Knocked it Down (2025)[5]
  • I Met a Gnome Last Flag Day (2025)[6]
  • Intuitive Analysis (2025)[7]
  • The Middle Author (2024)[8]
  • Fine-grained Graph-based Anomaly Detection on Vehicle Controller Area Networks (2024)[9]
  • NetHawk: Hunting Advanced Persistent Threats via Structural and Temporal Graph Anomalies (2024)[10]
  • Maui: Black-Box Edge Privacy Attack on Graph Neural Networks (2024)[11]
  • EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection (2023)[12]
  • Graggle: A Graph-based Approach to Document Clustering (2022)[13]
  • Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction (2022)[14][15]
  • Resignation (2022)[16]
  • The Civil Disobedience Club (2021)[17]
  • The Bucket and Other Weird Stories (2019)[18]
  • Peer Reviewed webcomic (2018)[19]
  • The Sixth Kingdom and Other Essays I Wrote At Work (2018)[20]
  • Thanatology and Psychedelics (2016)[21]
[edit]

Interesting Wikis

[edit]
Zaya / Iking5
Info
OccupationComputer Stuff
Stylev a p o r w a v e
OpponentsOnly fools
CallsignPoppa Oscar Oscar Poppa
Userboxes
This user is a participant in WikiProject Spoken Wikipedia.
Hail BobThis user has slacked off today
This user is not a
Reptilian Shape-shifter
The Eye is watching this user.

This user is a PhD student at George Washington University.
GWUThis user attends or attended
George Washington University
BSThis user has a Bachelor of Science degree.
Iking5 has been active on Wikipedia for 10 years, 2 months and 18 days.

This editor is a WikiGnome.

The Novice lv 2, Awarded for being a Registered Editor for 1 month 15 days and completion of 400 edits
The Novice lv 2, Awarded for being a Registered Editor for 1 month 15 days and completion of 400 edits

  1. ^ King, Isaiah J.; Ramirez, Ramiro; Bowman, Benjamin; Huang, Howie (2025). "Trail: A Knowledge Graph-Based Approach for Attributing Advanced Persistent Threats". 2025 IEEE 41st International Conference on Data Engineering (ICDE).
  2. ^ He, Haoyu; King, Isaiah J.; Huang, H. Howie (2025). "Revelio: Revealing Important Message Flows in Graph Neural Networks". 2025 IEEE 41st International Conference on Data Engineering (ICDE).
  3. ^ Kiely, Mitchell; Ahiskali, Metin; Borde, Etienne; Bowman, Benjamin; Bowman, David; Bruggen, Dirk van; Cowan, K. C.; Dasgupta, Prithviraj; Devendorf, Erich; Edwards, Ben; Fitts, Alex; Fugate, Sunny; Gabrys, Ryan; Gould, Wayne; Huang, H. Howie (2025-04-11). "Exploring the Efficacy of Multi-Agent Reinforcement Learning for Autonomous Cyber Defence: A CAGE Challenge 4 Perspective". Proceedings of the AAAI Conference on Artificial Intelligence. 39 (28): 28907–28913. doi:10.1609/aaai.v39i28.35158. ISSN 2374-3468.
  4. ^ Kiely, Mitchell; Ahiskali, Metin; Borde, Etienne; Bowman, Benjamin; Bowman, David; Van Bruggen, Dirk; Cowan, K. C.; Dasgupta, Prithviraj; Devendorf, Erich; Edwards, Ben; Fitts, Alex; Fugate, Sunny; Gabrys, Ryan; Gould, Wayne; Huang, H. Howie (2025). "CAGE challenge 4: A scalable multi-agent reinforcement learning gym for autonomous cyber defence". AI Magazine. 46 (3): e70021. doi:10.1002/aaai.70021. ISSN 2371-9621.{{cite journal}}: CS1 maint: article number as page number (link)
  5. ^ King, Isaiah J. (Febuary 10, 2025). "They Knocked It Down by Isaiah J. King". www.pikerpress.com. Archived from the original on 6 Aug, 2025. Retrieved 2025-10-25. {{cite web}}: Check date values in: |date= and |archive-date= (help)
  6. ^ King, Isaiah J. (January 17, 2025). "I Met a Gnome Last Flag Day". Witcraft. Archived from the original on 17 January, 2025. {{cite web}}: Check date values in: |archive-date= (help)
  7. ^ King, Isaiah. "Intuitive Analysis". www.bewilderingstories.com. Archived from the original on 2025. Retrieved 2025-10-25. {{cite web}}: Check date values in: |archive-date= (help)
  8. ^ King, Isaiah J. (2024). "The Middle Author". LabLit. Archived from the original on 2025. {{cite web}}: Check date values in: |archive-date= (help)
  9. ^ King, Isaiah J.; Bowman, Benjamin; Huang, H. Howie (2024-12). "Fine-grained Graph-based Anomaly Detection on Vehicle Controller Area Networks". 2024 IEEE International Conference on Big Data (BigData): 1346–1351. doi:10.1109/BigData62323.2024.10825928. {{cite journal}}: Check date values in: |date= (help)
  10. ^ Bowman, Benjamin; King, Isaiah J.; Melamed, Rimon; Huang, H. Howie (2024-09). "NetHawk : Hunting Advanced Persistent Threats via Structural and Temporal Graph Anomalies". 2024 IEEE Conference on Communications and Network Security (CNS): 1–9. doi:10.1109/CNS62487.2024.10735484. {{cite journal}}: Check date values in: |date= (help)
  11. ^ He, Haoyu; King, Isaiah J.; Huang, H. Howie (2024). "Maui: Black-Box Edge Privacy Attack on Graph Neural Networks" (PDF). Proceedings on Privacy Enhancing Technologies. doi:10.56553/popets-2024-0121.
  12. ^ King, Isaiah J.; Shu, Xiaokui; Jang, Jiyong; Eykholt, Kevin; Lee, Taesung; Huang, H. Howie (2023). "EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection". Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. doi:10.1145/3607199.3607201.
  13. ^ King, Isaiah J.; Huang, H. Howie (2022). "Graggle: A Graph-based Approach to Document Clustering". IEEE International Conference on Big Data. doi:10.1109/BigData55660.2022.10020645.
  14. ^ King, Isaiah J.; Huang, H. Howie (2022). "Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction" (PDF). Network and Distributed System Security Symposium. doi:10.14722/ndss.2022.23107. S2CID 248223972.
  15. ^ King, Isaiah J.; Huang, H. Howie (2023-06-27). "Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction". ACM Trans. Priv. Secur. 26 (3): 35:1–35:36. doi:10.1145/3588771. ISSN 2471-2566.
  16. ^ King, Isaiah J. (2022). "Resignation". The Seattle Star. Retrieved 10/16/2022. {{cite web}}: Check date values in: |access-date= (help)
  17. ^ King, Isaiah J. (2021). "The Civil Disobedience Club". The Seattle Star. Retrieved 03/10/2022. {{cite web}}: Check date values in: |access-date= (help)
  18. ^ King, Isaiah J. (2019). The Bucket and Other Weird Stories. Isaiah J. King. ISBN 9781794765658.
  19. ^ King, Isaiah. "Peer Reviewed". GMU Fourth Estate.
  20. ^ King, Isaiah (2018). The Sixth Kingdom and Other Essays I Wrote At Work. Isaiah King. ISBN 9781387847976.
  21. ^ King, Isaiah (May 31, 2016). "Thanatology And Psychedelics".
  22. ^ King, Isaiah (May 3, 2016). "Binky Barnes: Dog or Man?".