no code implementations • 23 Feb 2023 • Paulo Shakarian, Gerardo I. Simari
While deep neural networks have led to major advances in image recognition, language translation, data mining, and game playing, there are well-known limits to the paradigm such as lack of explainability, difficulty of incorporating prior knowledge, and modularity.
no code implementations • 29 Sep 2022 • Paulo Shakarian, Gerardo I. Simari, Devon Callahan
Reasoning about complex networks has in recent years become an important topic of study due to its many applications: the adoption of commercial products, spread of disease, the diffusion of an idea, etc.
no code implementations • 2 Aug 2021 • Jose N. Paredes, Juan Carlos L. Teze, Gerardo I. Simari, Maria Vanina Martinez
With the availability of large datasets and ever-increasing computing power, there has been a growing use of data-driven artificial intelligence systems, which have shown their potential for successful application in diverse areas.
Explainable artificial intelligence Explainable Artificial Intelligence (XAI)
no code implementations • 5 Mar 2019 • Maximiliano C. D. Budán, Gerardo I. Simari, Ignacio Viglizzo, Guillermo R. Simari
A classical argumentation process takes into account only the properties related to the intrinsic logical soundness of an argument in order to determine its acceptability status.
no code implementations • 30 Oct 2018 • Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki
In particular, we show that it outperforms baseline systems that attempt to generate warnings of cyber attacks related to two enterprises with an average increase in F1 score of about 45% and 57%.
no code implementations • 7 Jul 2016 • Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef
A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack.
no code implementations • 27 Apr 2014 • Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons, Marcelo A. Falappa
Attributing a cyber-operation through the use of multiple pieces of technical evidence (i. e., malware reverse-engineering and source tracking) and conventional intelligence sources (i. e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence.
no code implementations • 7 Jan 2014 • Paulo Shakarian, Gerardo I. Simari, Marcelo A. Falappa
In real-world applications, knowledge bases consisting of all the information at hand for a specific domain, along with the current state of affairs, are bound to contain contradictory data coming from different sources, as well as data with varying degrees of uncertainty attached.
no code implementations • 29 Nov 2013 • Thomas Lukasiewicz, Maria Vanina Martinez, Cristian Molinaro, Livia Predoiu, Gerardo I. Simari
Theses pieces of information of every report are then combined, along with the querying user's preferences and his/her trust into each report, to rank the query results.
no code implementations • 2 Jan 2013 • Paulo Shakarian, Gerardo I. Simari, Robert Schroeder
The modeling of cascade processes in multi-agent systems in the form of complex networks has in recent years become an important topic of study due to its many applications: the adoption of commercial products, spread of disease, the diffusion of an idea, etc.