1 code implementation • 12 Apr 2024 • Dipkamal Bhusal, Md Tanvirul Alam, Monish K. Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi
However, we observe that both model predictions and feature attributions for input samples are sensitive to noise.
1 code implementation • 1 Nov 2022 • Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi
The framework characterizes attack patterns by capturing the phases of an attack in Android and enterprise networks and systematically maps them to the MITRE ATT\&CK pattern framework.
no code implementations • 31 Oct 2022 • Dipkamal Bhusal, Rosalyn Shin, Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi
Interpretability, trustworthiness, and usability are key considerations in high-stake security applications, especially when utilizing deep learning models.
1 code implementation • 8 Apr 2022 • Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi
Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format from heterogeneous sources on the Internet.
no code implementations • 4 Mar 2022 • Dipkamal Bhusal, Nidhi Rastogi
These approaches have resulted in a multitude of attack and defense techniques and the emergence of a field known as `adversarial machine learning.'
1 code implementation • 8 Feb 2022 • Dipkamal Bhusal, Sanjeeb Prasad Panday
Traditional methods of identifying pathologies in X-ray images rely heavily on skilled human interpretation and are often time-consuming.