Search Results for author: Subash Neupane

Found 10 papers, 0 papers with code

Patient-Centric Knowledge Graphs: A Survey of Current Methods, Challenges, and Applications

no code implementations20 Feb 2024 Hassan S. Al Khatib, Subash Neupane, Harish Kumar Manchukonda, Noorbakhsh Amiri Golilarz, Sudip Mittal, Amin Amirlatifi, Shahram Rahimi

Patient-Centric Knowledge Graphs (PCKGs) represent an important shift in healthcare that focuses on individualized patient care by mapping the patient's health information in a holistic and multi-dimensional way.

Data Integration Disease Prediction +1

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

no code implementations18 Jan 2024 Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

In this work, we present LOCALINTEL, a novel automated knowledge contextualization system that, upon prompting, retrieves threat reports from the global threat repositories and uses its local knowledge database to contextualize them for a specific organization.

Retrieval

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

no code implementations11 Jan 2024 Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal

In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information.

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities

no code implementations12 Oct 2023 Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi

Motivated by the need to address the security concerns in AI-Robotics systems, this paper presents a comprehensive survey and taxonomy across three dimensions: attack surfaces, ethical and legal concerns, and Human-Robot Interaction (HRI) security.

Impacts and Risk of Generative AI Technology on Cyber Defense

no code implementations22 Jun 2023 Subash Neupane, Ivan A. Fernandez, Sudip Mittal, Shahram Rahimi

To combat the threats posed by GenAI, we propose leveraging the Cyber Kill Chain (CKC) to understand the lifecycle of cyberattacks, as a foundational model for cyber defense.

Face Swapping Misinformation

TwinExplainer: Explaining Predictions of an Automotive Digital Twin

no code implementations1 Feb 2023 Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Milan Parmar, Shahram Rahimi

Vehicles are complex Cyber Physical Systems (CPS) that operate in a variety of environments, and the likelihood of failure of one or more subsystems, such as the engine, transmission, brakes, and fuel, can result in unscheduled downtime and incur high maintenance or repair costs.

Decision Making

A White-Box Adversarial Attack Against a Digital Twin

no code implementations25 Oct 2022 Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi

Recent research has shown that Machine Learning/Deep Learning (ML/DL) models are particularly vulnerable to adversarial perturbations, which are small changes made to the input data in order to fool a machine learning classifier.

Adversarial Attack

A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels

no code implementations14 Sep 2022 Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Shahram Rahimi

A modern vehicle fitted with sensors, actuators, and Electronic Control Units (ECUs) can be divided into several operational subsystems called Functional Working Groups (FWGs).

Anomaly Detection

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

no code implementations13 Jul 2022 Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures and government institutions.

Explainable Artificial Intelligence (XAI) Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.