Search Results for author: Nathaniel D. Bastian

Found 30 papers, 4 papers with code

Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning

no code implementations4 Jun 2025 Huynh T. T. Tran, Jacob Sander, Achraf Cohen, Brian Jalaian, Nathaniel D. Bastian

Experimental results on the CIC-IDS-2017 dataset show that ODXU outperforms traditional neural models across six evaluation metrics, including classification accuracy and false omission rate.

Clustering Network Intrusion Detection +2

VLC Fusion: Vision-Language Conditioned Sensor Fusion for Robust Object Detection

no code implementations19 May 2025 Aditya Taparia, Noel Ngu, Mario Leiva, Joshua Shay Kricheli, John Corcoran, Nathaniel D. Bastian, Gerardo Simari, Paulo Shakarian, Ransalu Senanayake

By capturing high-level environmental context such as as darkness, rain, and camera blurring, the VLM guides the model to dynamically adjust modality weights based on the current scene.

Autonomous Driving Language Modeling +4

A Few Large Shifts: Layer-Inconsistency Based Minimal Overhead Adversarial Example Detection

1 code implementation19 May 2025 Sanggeon Yun, Ryozo Masukawa, Hyunwoo Oh, Nathaniel D. Bastian, Mohsen Imani

Deep neural networks (DNNs) are highly susceptible to adversarial examples--subtle, imperceptible perturbations that can lead to incorrect predictions.

Adversarial Attack Detection Adversarial Defense

Calibrating Uncertainty Quantification of Multi-Modal LLMs using Grounding

no code implementations30 Apr 2025 Trilok Padhi, Ramneet Kaur, Adam D. Cobb, Manoj Acharya, Anirban Roy, Colin Samplawski, Brian Matejek, Alexander M. Berenbeim, Nathaniel D. Bastian, Susmit Jha

Given that using a grounding model adds its own uncertainty in the pipeline, we apply temperature scaling - a widely accepted parametric calibration technique - to calibrate the grounding model's confidence in the accuracy of generated responses.

Question Answering Uncertainty Quantification +1

Hydra: An Agentic Reasoning Approach for Enhancing Adversarial Robustness and Mitigating Hallucinations in Vision-Language Models

no code implementations19 Apr 2025 Chung-En, Yu, Hsuan-Chih, Chen, Brian Jalaian, Nathaniel D. Bastian

To develop trustworthy Vision-Language Models (VLMs), it is essential to address adversarial robustness and hallucination mitigation, both of which impact factual accuracy in high-stakes applications such as defense and healthcare.

Adversarial Attack Adversarial Defense +3

PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning

no code implementations5 Mar 2025 Ryozo Masukawa, Sanggeon Yun, Sungheon Jeong, Wenjun Huang, Yang Ni, Ian Bryant, Nathaniel D. Bastian, Mohsen Imani

By bridging advanced machine learning techniques and practical cybersecurity needs, PacketCLIP provides a foundation for scalable, efficient, and interpretable solutions to tackle encrypted traffic classification and network intrusion detection challenges in resource-constrained environments.

Anomaly Detection Classification +3

Multiple Distribution Shift -- Aerial (MDS-A): A Dataset for Test-Time Error Detection and Model Adaptation

no code implementations18 Feb 2025 Noel Ngu, Aditya Taparia, Gerardo I. Simari, Mario Leiva, Jack Corcoran, Ransalu Senanayake, Paulo Shakarian, Nathaniel D. Bastian

We include six datasets under different simulated weather conditions along with six baseline object-detection models, as well as several test datasets that are a mix of weather conditions that we show have significant differences from the training data.

object-detection Object Detection

Probabilistic Foundations for Metacognition via Hybrid-AI

no code implementations8 Feb 2025 Paulo Shakarian, Gerardo I. Simari, Nathaniel D. Bastian

Metacognition is the concept of reasoning about an agent's own internal processes, and it has recently received renewed attention with respect to artificial intelligence (AI) and, more specifically, machine learning systems.

Deceptive Sequential Decision-Making via Regularized Policy Optimization

no code implementations30 Jan 2025 Yerin Kim, Alexander Benvenuti, Bo Chen, Mustafa Karabag, Abhishek Kulkarni, Nathaniel D. Bastian, Ufuk Topcu, Matthew Hale

Autonomous systems are increasingly expected to operate in the presence of adversaries, though an adversary may infer sensitive information simply by observing a system, without even needing to interact with it.

Decision Making Sequential Decision Making

Addressing Uncertainty in LLMs to Enhance Reliability in Generative AI

no code implementations4 Nov 2024 Ramneet Kaur, Colin Samplawski, Adam D. Cobb, Anirban Roy, Brian Matejek, Manoj Acharya, Daniel Elenius, Alexander M. Berenbeim, John A. Pavlik, Nathaniel D. Bastian, Susmit Jha

In this paper, we present a dynamic semantic clustering approach inspired by the Chinese Restaurant Process, aimed at addressing uncertainty in the inference of Large Language Models (LLMs).

Conformal Prediction Prediction +3

RGMDT: Return-Gap-Minimizing Decision Tree Extraction in Non-Euclidean Metric Space

no code implementations21 Oct 2024 Jingdi Chen, Hanhan Zhou, Yongsheng Mei, Carlee Joe-Wong, Gina Adam, Nathaniel D. Bastian, Tian Lan

Deep Reinforcement Learning (DRL) algorithms have achieved great success in solving many challenging tasks while their black-box nature hinders interpretability and real-world applicability, making it difficult for human experts to interpret and understand DRL policies.

Clustering D4RL +2

XG-NID: Dual-Modality Network Intrusion Detection using a Heterogeneous Graph Neural Network and Large Language Model

1 code implementation27 Aug 2024 Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian

This paper introduces "XG-NID," a novel framework that, to the best of our knowledge, is the first to fuse flow-level and packet-level data within a heterogeneous graph structure, offering a comprehensive analysis of network traffic.

Graph Neural Network Language Modeling +4

A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI

no code implementations3 Jun 2024 Alice Bizzarri, Chung-En Yu, Brian Jalaian, Fabrizio Riguzzi, Nathaniel D. Bastian

The prevailing approaches in Network Intrusion Detection Systems (NIDS) are often hampered by issues such as high resource consumption, significant computational demands, and poor interpretability.

Logical Reasoning Network Intrusion Detection

Real-time Network Intrusion Detection via Decision Transformers

no code implementations12 Dec 2023 Jingdi Chen, Hanhan Zhou, Yongsheng Mei, Gina Adam, Nathaniel D. Bastian, Tian Lan

Many cybersecurity problems that require real-time decision-making based on temporal observations can be abstracted as a sequence modeling problem, e. g., network intrusion detection from a sequence of arriving packets.

Decision Making Network Intrusion Detection +2

RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture

no code implementations27 Nov 2023 Jingdi Chen, Lei Zhang, Joseph Riem, Gina Adam, Nathaniel D. Bastian, Tian Lan

Deep Learning (DL) based methods have shown great promise in network intrusion detection by identifying malicious network traffic behavior patterns with high accuracy, but their applications to real-time, packet-level detections in high-speed communication networks are challenging due to the high computation time and resource requirements of Deep Neural Networks (DNNs), as well as lack of explainability.

Network Intrusion Detection

Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability Solving

no code implementations28 Sep 2023 Sumit Kumar Jha, Susmit Jha, Patrick Lincoln, Nathaniel D. Bastian, Alvaro Velasquez, Rickard Ewetz, Sandeep Neema

We posit that we can use the satisfiability modulo theory (SMT) solvers as deductive reasoning engines to analyze the generated solutions from the LLMs, produce counterexamples when the solutions are incorrect, and provide that feedback to the LLMs exploiting the dialog capability of instruct-trained LLMs.

Hallucination Question Answering +1

Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection

no code implementations14 Sep 2023 Yasir Ali Farrukh, Syed Wali, Irfan Khan, Nathaniel D. Bastian

The widespread integration of Internet of Things (IoT) devices across all facets of life has ushered in an era of interconnectedness, creating new avenues for cybersecurity challenges and underscoring the need for robust intrusion detection systems.

Network Intrusion Detection Open Set Learning

Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation

no code implementations18 May 2023 Soumyadeep Hore, Jalal Ghadermazi, Diwas Paudel, Ankit Shah, Tapas K. Das, Nathaniel D. Bastian

The knowledge gained from our study on the adversary's ability to make specific evasive perturbations to different types of malicious packets can help defenders enhance the robustness of their NIDS against evolving adversarial attacks.

Deep Reinforcement Learning Network Intrusion Detection +1

Measuring Classification Decision Certainty and Doubt

no code implementations25 Mar 2023 Alexander M. Berenbeim, Iain J. Cruickshank, Susmit Jha, Robert H. Thomson, Nathaniel D. Bastian

Quantitative characterizations and estimations of uncertainty are of fundamental importance in optimization and decision-making processes.

Classification Decision Making

Off-Policy Evaluation for Action-Dependent Non-Stationary Environments

1 code implementation24 Jan 2023 Yash Chandak, Shiv Shankar, Nathaniel D. Bastian, Bruno Castro da Silva, Emma Brunskil, Philip S. Thomas

Methods for sequential decision-making are often built upon a foundational assumption that the underlying decision process is stationary.

counterfactual Counterfactual Reasoning +3

Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework

no code implementations3 Aug 2022 Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian

The current approaches are deterministic and one-time decision-making methods, which do not consider future uncertainties when prioritizing and selecting vulnerabilities for mitigation.

Decision Making Deep Reinforcement Learning +4

Cybersecurity Anomaly Detection in Adversarial Environments

no code implementations14 May 2021 David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian

Inherent to the IoBT operating environment is the practice of adversarial machine learning, which attempts to circumvent machine learning models.

Anomaly Detection BIG-bench Machine Learning +1

Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities

no code implementations24 Sep 2020 Tyler J. Shipp, Daniel J. Clouse, Michael J. De Lucia, Metin B. Ahiskali, Kai Steverson, Jonathan M. Mullin, Nathaniel D. Bastian

Artificial intelligence (AI) and machine learning (ML) have become increasingly vital in the development of novel defense and intelligence capabilities across all domains of warfare.

BIG-bench Machine Learning

Algorithm Selection Framework for Cyber Attack Detection

no code implementations28 May 2020 Marc Chalé, Nathaniel D. Bastian, Jeffery Weir

The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.

Cyber Attack Detection Meta-Learning

Adversarial Machine Learning in Network Intrusion Detection Systems

no code implementations23 Apr 2020 Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian

Adversarial examples are inputs to a machine learning system intentionally crafted by an attacker to fool the model into producing an incorrect output.

BIG-bench Machine Learning Network Intrusion Detection +3

Intelligent Systems Design for Malware Classification Under Adversarial Conditions

no code implementations6 Jul 2019 Sean M. Devine, Nathaniel D. Bastian

The use of machine learning and intelligent systems has become an established practice in the realm of malware detection and cyber threat prevention.

BIG-bench Machine Learning Classification +2

The Spatially-Conscious Machine Learning Model

no code implementations1 Feb 2019 Timothy J. Kiely, Nathaniel D. Bastian

Successfully predicting gentrification could have many social and commercial applications; however, real estate sales are difficult to predict because they belong to a chaotic system comprised of intrinsic and extrinsic characteristics, perceived value, and market speculation.

BIG-bench Machine Learning Feature Engineering +3

Cannot find the paper you are looking for? You can Submit a new open access paper.