Search Results for author: Shahram Rahimi

Found 17 papers, 0 papers with code

Patient-Centric Knowledge Graphs: A Survey of Current Methods, Challenges, and Applications

no code implementations20 Feb 2024 Hassan S. Al Khatib, Subash Neupane, Harish Kumar Manchukonda, Noorbakhsh Amiri Golilarz, Sudip Mittal, Amin Amirlatifi, Shahram Rahimi

Patient-Centric Knowledge Graphs (PCKGs) represent an important shift in healthcare that focuses on individualized patient care by mapping the patient's health information in a holistic and multi-dimensional way.

Data Integration Disease Prediction +1

Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems

no code implementations18 Jan 2024 Jesse Ables, Nathaniel Childers, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

The contributions of this work include the hybrid X-IDS architecture, the eclectic rule extraction algorithm applicable to intrusion detection datasets, and a thorough analysis of performance and explainability, demonstrating the trade-offs involved in rule extraction speed and accuracy.

Explainable artificial intelligence Explainable Artificial Intelligence (XAI) +2

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

no code implementations18 Jan 2024 Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

In this work, we present LOCALINTEL, a novel automated knowledge contextualization system that, upon prompting, retrieves threat reports from the global threat repositories and uses its local knowledge database to contextualize them for a specific organization.

Retrieval

Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities

no code implementations15 Jan 2024 Logan Cummins, Alex Sommers, Somayeh Bakhtiari Ramezani, Sudip Mittal, Joseph Jabour, Maria Seale, Shahram Rahimi

This survey on explainable predictive maintenance (XPM) discusses and presents the current methods of XAI as applied to predictive maintenance while following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 guidelines.

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities

no code implementations12 Oct 2023 Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi

Motivated by the need to address the security concerns in AI-Robotics systems, this paper presents a comprehensive survey and taxonomy across three dimensions: attack surfaces, ethical and legal concerns, and Human-Robot Interaction (HRI) security.

Impacts and Risk of Generative AI Technology on Cyber Defense

no code implementations22 Jun 2023 Subash Neupane, Ivan A. Fernandez, Sudip Mittal, Shahram Rahimi

To combat the threats posed by GenAI, we propose leveraging the Cyber Kill Chain (CKC) to understand the lifecycle of cyberattacks, as a foundational model for cyber defense.

Face Swapping Misinformation

Explainable Intrusion Detection Systems Using Competitive Learning Techniques

no code implementations30 Mar 2023 Jesse Ables, Thomas Kirby, Sudip Mittal, Ioana Banicescu, Shahram Rahimi, William Anderson, Maria Seale

Lastly, we analyze the statistical and visual explanations generated by our architecture, and we give a strategy that users could use to help navigate the set of explanations.

Intrusion Detection Navigate

TwinExplainer: Explaining Predictions of an Automotive Digital Twin

no code implementations1 Feb 2023 Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Milan Parmar, Shahram Rahimi

Vehicles are complex Cyber Physical Systems (CPS) that operate in a variety of environments, and the likelihood of failure of one or more subsystems, such as the engine, transmission, brakes, and fuel, can result in unscheduled downtime and incur high maintenance or repair costs.

Decision Making

A White-Box Adversarial Attack Against a Digital Twin

no code implementations25 Oct 2022 Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi

Recent research has shown that Machine Learning/Deep Learning (ML/DL) models are particularly vulnerable to adversarial perturbations, which are small changes made to the input data in order to fool a machine learning classifier.

Adversarial Attack

A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels

no code implementations14 Sep 2022 Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Shahram Rahimi

A modern vehicle fitted with sensors, actuators, and Electronic Control Units (ECUs) can be divided into several operational subsystems called Functional Working Groups (FWGs).

Anomaly Detection

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

no code implementations13 Jul 2022 Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures and government institutions.

Explainable Artificial Intelligence (XAI) Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.