Search Results for author: Anupam Joshi

Found 19 papers, 2 papers with code

Named Entity Recognition for Nepali Language

1 code implementation16 Aug 2019 Oyesh Mann Singh, Ankur Padia, Anupam Joshi

Named Entity Recognition have been studied for different languages like English, German, Spanish and many others but no study have focused on Nepali language.

named-entity-recognition Named Entity Recognition +1

Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs

no code implementations10 Aug 2017 Sudip Mittal, Anupam Joshi, Tim Finin

Knowledge graphs and vector space models are robust knowledge representation techniques with individual strengths and weaknesses.

Knowledge Graphs

Using Data Analytics to Detect Anomalous States in Vehicles

no code implementations25 Dec 2015 Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi

Vehicles are becoming more and more connected, this opens up a larger attack surface which not only affects the passengers inside vehicles, but also people around them.

Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence

no code implementations19 Jul 2018 Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Joshi

We create a neural network based system that takes in cybersecurity data in a different language and outputs the respective English translation.

Translation

Preventing Poisoning Attacks on AI based Threat Intelligence Systems

no code implementations19 Jul 2018 Nitika Khurana, Sudip Mittal, Anupam Joshi

As AI systems become more ubiquitous, securing them becomes an emerging challenge.

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports

no code implementations9 Aug 2018 Lorenzo Neil, Sudip Mittal, Anupam Joshi

We represent and store this threat intelligence, along with the software dependencies in a security knowledge graph.

UMBC at SemEval-2018 Task 8: Understanding Text about Malware

no code implementations SEMEVAL 2018 Ankur Padia, Arpita Roy, Taneeya Satyapanich, Francis Ferraro, SHimei Pan, Youngja Park, Anupam Joshi, Tim Finin

We describe the systems developed by the UMBC team for 2018 SemEval Task 8, SecureNLP (Semantic Extraction from CybersecUrity REports using Natural Language Processing).

Attribute

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

no code implementations7 May 2019 Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak

A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried.

Relation Relation Extraction

Cyber-All-Intel: An AI for Security related Threat Intelligence

no code implementations7 May 2019 Sudip Mittal, Anupam Joshi, Tim Finin

It uses multiple knowledge representations like, vector spaces and knowledge graphs in a 'VKG structure' to store incoming intelligence.

Knowledge Graphs

NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion

no code implementations20 Feb 2020 Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi

In this paper, we show that even if we build a classifier and train it with adversarial examples for network data, we can use adversarial attacks and successfully break the system.

BIG-bench Machine Learning Efficient Neural Network +1

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

no code implementations8 Feb 2021 Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin

We evaluate with traditional approaches and conduct a human evaluation study with cybersecurity professionals and threat hunters.

Data Poisoning Knowledge Graphs +2

CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations

no code implementations2 Aug 2022 Sai Sree Laya Chukkapalli, Anupam Joshi, Tim Finin, Robert F. Erbacher

This ability to reason over the mission sensed environment and attack context permits the autonomous IoBT system to exhibit resilience in contested conditions.

Attribute Knowledge Graphs

Recognizing and Extracting Cybersecurtity-relevant Entities from Text

no code implementations2 Aug 2022 Casey Hanks, Michael Maiden, Priyanka Ranade, Tim Finin, Anupam Joshi

Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG).

Entity Linking Knowledge Graphs +2

A Practical Entity Linking System for Tables in Scientific Literature

no code implementations12 Jun 2023 Varish Mulwad, Tim Finin, Vijay S. Kumar, Jenny Weisenberg Williams, Sharad Dixit, Anupam Joshi

Entity linking is an important step towards constructing knowledge graphs that facilitate advanced question answering over scientific documents, including the retrieval of relevant information included in tables within these documents.

Entity Linking Knowledge Graphs +2

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

no code implementations25 Jul 2023 Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi

Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainability and safety in AI systems.

Knowledge Graphs

Change Management using Generative Modeling on Digital Twins

no code implementations21 Sep 2023 Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi

These digital twins act as a non-production environment where changes can be applied, and the system can be securely tested before patch release.

Management

FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction

no code implementations20 Oct 2023 Priyanka Ranade, Anupam Joshi

Intelligence analysis is an example of a domain that can benefit tremendously from narrative construction techniques, particularly in aiding analysts during the largely manual and costly process of synthesizing event information into comprehensive intelligence reports.

Language Modelling Large Language Model +1

Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis

1 code implementation27 Nov 2023 Anantaa Kotal, Lavanya Elluri, Deepti Gupta, Varun Mandalapu, Anupam Joshi

While Big Data can provide the farming community with valuable insights and improve efficiency, there is significant concern regarding the security of this data as well as the privacy of the participants.

Privacy Preserving Synthetic Data Generation

Cannot find the paper you are looking for? You can Submit a new open access paper.