Search Results for author: David Liebowitz

Found 8 papers, 1 papers with code

Contextual Chart Generation for Cyber Deception

no code implementations7 Apr 2024 David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba

Honeyfiles are a type of honeypot that mimic real, sensitive documents, creating the illusion of the presence of valuable data.

Data Interaction Image Generation +1

Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions

1 code implementation18 Dec 2023 David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere

In many real-world applications, from robotics to pedestrian trajectory prediction, there is a need to predict multiple real-valued outputs to represent several potential scenarios.

Multiple-choice Pedestrian Trajectory Prediction +1

DualVAE: Controlling Colours of Generated and Real Images

no code implementations30 May 2023 Keerth Rathakumar, David Liebowitz, Christian Walder, Kristen Moore, Salil S. Kanhere

The disentangled representation is obtained by two novel mechanisms: (i) a dual branch architecture that separates image colour attributes from geometric attributes, and (ii) a new ELBO that trains the combined colour and geometry representations.

Image Generation

Deception for Cyber Defence: Challenges and Opportunities

no code implementations15 Aug 2022 David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar

Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft.

TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

no code implementations15 Mar 2022 Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere

Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders.

Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

no code implementations14 Mar 2022 Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere

We experimented with four different categories of documents in the Monsanto dataset and observed that BERT achieves better F2 scores by 24. 13\% to 65. 79\% for GHOST, 30. 14\% to 54. 88\% for TOXIC, 39. 22\% for CHEMI, 53. 57\% for REGUL compared to existing sensitive information detection models.

SchemaDB: Structures in Relational Datasets

no code implementations24 Nov 2021 Cody James Christopher, Kristen Moore, David Liebowitz

In this paper we introduce the SchemaDB data-set; a collection of relational database schemata in both sql and graph formats.

Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception

no code implementations21 Nov 2021 Kristen Moore, Cody J. Christopher, David Liebowitz, Surya Nepal, Renee Selvey

Cyber deception is emerging as a promising approach to defending networks and systems against attackers and data thieves.

Language Modelling

Cannot find the paper you are looking for? You can Submit a new open access paper.