User:Iking5

From Wikipedia, the free encyclopedia

OccupationComputer Stuff
OccupationComputer Stuff
Stylev a p o r w a v e
OpponentsOnly fools
More information Zaya / Iking5, Info ...
iking5 is a wikipedian interested in lesser known conspiracy theories and obscure pieces of pop culture history. He is a supporter and narrator for Spoken Wiki with particular interest in the narration of strange, disgusting and obscure articles (Hours narrated: 4:32:45).
He is currently enrolled at George Washington University working on a Ph.D. in high-performance computing with a focus on graph algorithms and graph neural networks. He previously attended GMU where he was awarded a B.S. in Computer Science with a minor in Mathematics. He is a former member of WGMU.

Publications:

  • Trail: A Knowledge Graph-Based Approach for Attributing Advanced Persistent Threats (2025)[1]
  • Revelio: Revealing Important Message Flows in Graph Neural Networks (2025)[2]
  • Exploring the Efficacy of Multi-Agent Reinforcement Learning for Autonomous Cyber Defence: A CAGE Challenge 4 Perspective (2025)[3][4]
  • They Knocked it Down (2025)[5]
  • I Met a Gnome Last Flag Day (2025)[6]
  • Intuitive Analysis (2025)[7]
  • The Middle Author (2024)[8]
  • Fine-grained Graph-based Anomaly Detection on Vehicle Controller Area Networks (2024)[9]
  • NetHawk: Hunting Advanced Persistent Threats via Structural and Temporal Graph Anomalies (2024)[10]
  • Maui: Black-Box Edge Privacy Attack on Graph Neural Networks (2024)[11]
  • EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection (2023)[12]
  • Graggle: A Graph-based Approach to Document Clustering (2022)[13]
  • Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction (2022)[14][15]
  • Resignation (2022)[16]
  • The Civil Disobedience Club (2021)[17]
  • The Bucket and Other Weird Stories (2019)[18]
  • Peer Reviewed webcomic (2018)[19]
  • The Sixth Kingdom and Other Essays I Wrote At Work (2018)[20]
  • Thanatology and Psychedelics (2016)[21]

Interesting Wikis

Zaya / Iking5
Info
OccupationComputer Stuff
Stylev a p o r w a v e
OpponentsOnly fools
CallsignPoppa Oscar Oscar Poppa
Userboxes
This user is a participant in WikiProject Spoken Wikipedia.
Hail BobThis user has slacked off today
This user is not a
Reptilian Shape-shifter
The Eye is watching this user.

This user is a PhD student at George Washington University.
GWUThis user attends or attended
George Washington University
BSThis user has a Bachelor of Science degree.
Iking5 has been active on Wikipedia for 10 years, 4 months and 24 days.

This editor is a WikiGnome.

The Novice lv 2, Awarded for being a Registered Editor for 1 month 15 days and completion of 400 edits
The Novice lv 2, Awarded for being a Registered Editor for 1 month 15 days and completion of 400 edits

Close
  1. King, Isaiah J.; Ramirez, Ramiro; Bowman, Benjamin; Huang, Howie (2025). "Trail: A Knowledge Graph-Based Approach for Attributing Advanced Persistent Threats". 2025 IEEE 41st International Conference on Data Engineering (ICDE).
  2. He, Haoyu; King, Isaiah J.; Huang, H. Howie (2025). "Revelio: Revealing Important Message Flows in Graph Neural Networks". 2025 IEEE 41st International Conference on Data Engineering (ICDE).
  3. Kiely, Mitchell; Ahiskali, Metin; Borde, Etienne; Bowman, Benjamin; Bowman, David; Bruggen, Dirk van; Cowan, K. C.; Dasgupta, Prithviraj; Devendorf, Erich; Edwards, Ben; Fitts, Alex; Fugate, Sunny; Gabrys, Ryan; Gould, Wayne; Huang, H. Howie (2025-04-11). "Exploring the Efficacy of Multi-Agent Reinforcement Learning for Autonomous Cyber Defence: A CAGE Challenge 4 Perspective". Proceedings of the AAAI Conference on Artificial Intelligence. 39 (28): 28907–28913. doi:10.1609/aaai.v39i28.35158. ISSN 2374-3468.
  4. Kiely, Mitchell; Ahiskali, Metin; Borde, Etienne; Bowman, Benjamin; Bowman, David; Van Bruggen, Dirk; Cowan, K. C.; Dasgupta, Prithviraj; Devendorf, Erich; Edwards, Ben; Fitts, Alex; Fugate, Sunny; Gabrys, Ryan; Gould, Wayne; Huang, H. Howie (2025). "CAGE challenge 4: A scalable multi-agent reinforcement learning gym for autonomous cyber defence". AI Magazine. 46 (3): e70021. doi:10.1002/aaai.70021. ISSN 2371-9621.{{cite journal}}: CS1 maint: article number as page number (link)
  5. King, Isaiah J. (Febuary 10, 2025). "They Knocked It Down by Isaiah J. King". www.pikerpress.com. Archived from the original on 6 Aug, 2025. Retrieved 2025-10-25. {{cite web}}: Check date values in: |date= and |archive-date= (help)
  6. King, Isaiah J. (January 17, 2025). "I Met a Gnome Last Flag Day". Witcraft. Archived from the original on 17 January, 2025. {{cite web}}: Check date values in: |archive-date= (help)
  7. King, Isaiah. "Intuitive Analysis". www.bewilderingstories.com. Archived from the original on 2025. Retrieved 2025-10-25. {{cite web}}: Check date values in: |archive-date= (help)
  8. King, Isaiah J. (2024). "The Middle Author". LabLit. Archived from the original on 2025. {{cite web}}: Check date values in: |archive-date= (help)
  9. King, Isaiah J.; Bowman, Benjamin; Huang, H. Howie (2024-12). "Fine-grained Graph-based Anomaly Detection on Vehicle Controller Area Networks". 2024 IEEE International Conference on Big Data (BigData): 1346–1351. doi:10.1109/BigData62323.2024.10825928. {{cite journal}}: Check date values in: |date= (help)
  10. Bowman, Benjamin; King, Isaiah J.; Melamed, Rimon; Huang, H. Howie (2024-09). "NetHawk : Hunting Advanced Persistent Threats via Structural and Temporal Graph Anomalies". 2024 IEEE Conference on Communications and Network Security (CNS): 1–9. doi:10.1109/CNS62487.2024.10735484. {{cite journal}}: Check date values in: |date= (help)
  11. He, Haoyu; King, Isaiah J.; Huang, H. Howie (2024). "Maui: Black-Box Edge Privacy Attack on Graph Neural Networks" (PDF). Proceedings on Privacy Enhancing Technologies. doi:10.56553/popets-2024-0121.
  12. King, Isaiah J.; Shu, Xiaokui; Jang, Jiyong; Eykholt, Kevin; Lee, Taesung; Huang, H. Howie (2023). "EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection". Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. doi:10.1145/3607199.3607201.
  13. King, Isaiah J.; Huang, H. Howie (2022). "Graggle: A Graph-based Approach to Document Clustering". IEEE International Conference on Big Data. doi:10.1109/BigData55660.2022.10020645.
  14. King, Isaiah J.; Huang, H. Howie (2023-06-27). "Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction". ACM Trans. Priv. Secur. 26 (3): 35:1–35:36. doi:10.1145/3588771. ISSN 2471-2566.
  15. King, Isaiah J. (2022). "Resignation". The Seattle Star. Retrieved 10/16/2022. {{cite web}}: Check date values in: |access-date= (help)
  16. King, Isaiah J. (2021). "The Civil Disobedience Club". The Seattle Star. Retrieved 03/10/2022. {{cite web}}: Check date values in: |access-date= (help)
  17. King, Isaiah J. (2019). The Bucket and Other Weird Stories. Isaiah J. King. ISBN 9781794765658.
  18. King, Isaiah. "Peer Reviewed". GMU Fourth Estate.
  19. King, Isaiah (2018). The Sixth Kingdom and Other Essays I Wrote At Work. Isaiah King. ISBN 9781387847976.
  20. King, Isaiah (May 31, 2016). "Thanatology And Psychedelics".
  21. King, Isaiah (May 3, 2016). "Binky Barnes: Dog or Man?".

Related Articles

Wikiwand AI