no code implementations • 1st International Conference on Cyber Security and Computing (CyberComp) 2024 • Akshayraj Madhubalan, Priya Tiwary, Amit Gautam
The digitization and public cloud adoption has led to a massive data surge, necessitating the development of efficient intrusion detection systems.
no code implementations • International Conference on Artificial Intelligence, Metaverse and Cybersecurity (ICAMAC) 2024 • Priya Tiwary, Akshayraj Madhubalan, Amit Gautam, Raj Darji
This research proposes a novel approach that leverages the power of deep learning models to capture complex, hierarchical patterns in user behavior, enabling the early detection of malicious insider activity.
Ranked #1 on
Classification
on Insider Threat Test Dataset
no code implementations • Bioinformatics 2022 • Priya Tiwary, Akshayraj M, Amit Gautam
Through this paper, we investigate various bio model’s embeddings(BioBERT, BioE- LECTRA, PubMedBERT) on their understanding of "negation and speculation context" wherein we found that these models were unable to differentiate "negated context" vs "non-negated context".