no code implementations • 25 Sep 2024 • Anantaa Kotal, Anupam Joshi
The novel framework augments the training of generative models with supplementary context about attribute values and enforces domain constraints during training.
no code implementations • 26 May 2024 • Anantaa Kotal, Brandon Luton, Anupam Joshi
To address these challenges, we propose a Privacy-Driven framework that utilizes a knowledge-infused Generative Adversarial Network for generating synthetic network activity data (KiNETGAN).
Ranked #1 on Synthetic Data Generation on UNSW-NB15
no code implementations • 30 Apr 2024 • Leon Garza, Lavanya Elluri, Anantaa Kotal, Aritran Piplai, Deepti Gupta, Anupam Joshi
Using Retrieval Augmented Generation, we identify the relevant sections in a privacy policy with corresponding regulatory rules.
1 code implementation • 27 Nov 2023 • Anantaa Kotal, Lavanya Elluri, Deepti Gupta, Varun Mandalapu, Anupam Joshi
While Big Data can provide the farming community with valuable insights and improve efficiency, there is significant concern regarding the security of this data as well as the privacy of the participants.
no code implementations • 20 Oct 2023 • Priyanka Ranade, Anupam Joshi
Intelligence analysis is an example of a domain that can benefit tremendously from narrative construction techniques, particularly in aiding analysts during the largely manual and costly process of synthesizing event information into comprehensive intelligence reports.
no code implementations • 21 Sep 2023 • Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi
These digital twins act as a non-production environment where changes can be applied, and the system can be securely tested before patch release.
no code implementations • 25 Jul 2023 • Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi
Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainability and safety in AI systems.
no code implementations • 12 Jun 2023 • Varish Mulwad, Tim Finin, Vijay S. Kumar, Jenny Weisenberg Williams, Sharad Dixit, Anupam Joshi
Entity linking is an important step towards constructing knowledge graphs that facilitate advanced question answering over scientific documents, including the retrieval of relevant information included in tables within these documents.
no code implementations • 2 Aug 2022 • Casey Hanks, Michael Maiden, Priyanka Ranade, Tim Finin, Anupam Joshi
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG).
no code implementations • 2 Aug 2022 • Sai Sree Laya Chukkapalli, Anupam Joshi, Tim Finin, Robert F. Erbacher
This ability to reason over the mission sensed environment and attack context permits the autonomous IoBT system to exhibit resilience in contested conditions.
no code implementations • 8 Feb 2021 • Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin
We evaluate with traditional approaches and conduct a human evaluation study with cybersecurity professionals and threat hunters.
no code implementations • 1 Jun 2020 • Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adalı
Social media has become an important communication channel during high impact events, such as the COVID-19 pandemic.
no code implementations • 20 Feb 2020 • Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi
In this paper, we show that even if we build a classifier and train it with adversarial examples for network data, we can use adversarial attacks and successfully break the system.
1 code implementation • 16 Aug 2019 • Oyesh Mann Singh, Ankur Padia, Anupam Joshi
Named Entity Recognition have been studied for different languages like English, German, Spanish and many others but no study have focused on Nepali language.
no code implementations • 7 May 2019 • Sudip Mittal, Anupam Joshi, Tim Finin
It uses multiple knowledge representations like, vector spaces and knowledge graphs in a 'VKG structure' to store incoming intelligence.
no code implementations • 7 May 2019 • Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak
A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried.
no code implementations • 9 Aug 2018 • Lorenzo Neil, Sudip Mittal, Anupam Joshi
We represent and store this threat intelligence, along with the software dependencies in a security knowledge graph.
no code implementations • 19 Jul 2018 • Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Joshi
We create a neural network based system that takes in cybersecurity data in a different language and outputs the respective English translation.
no code implementations • 19 Jul 2018 • Nitika Khurana, Sudip Mittal, Anupam Joshi
As AI systems become more ubiquitous, securing them becomes an emerging challenge.
no code implementations • SEMEVAL 2018 • Ankur Padia, Arpita Roy, Taneeya Satyapanich, Francis Ferraro, SHimei Pan, Youngja Park, Anupam Joshi, Tim Finin
We describe the systems developed by the UMBC team for 2018 SemEval Task 8, SecureNLP (Semantic Extraction from CybersecUrity REports using Natural Language Processing).
no code implementations • 10 Aug 2017 • Sudip Mittal, Anupam Joshi, Tim Finin
Knowledge graphs and vector space models are robust knowledge representation techniques with individual strengths and weaknesses.
no code implementations • 25 Dec 2015 • Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi
Vehicles are becoming more and more connected, this opens up a larger attack surface which not only affects the passengers inside vehicles, but also people around them.