no code implementations • 25 Oct 2022 • Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi
Recent research has shown that Machine Learning/Deep Learning (ML/DL) models are particularly vulnerable to adversarial perturbations, which are small changes made to the input data in order to fool a machine learning classifier.
no code implementations • 14 Sep 2022 • Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Shahram Rahimi
A modern vehicle fitted with sensors, actuators, and Electronic Control Units (ECUs) can be divided into several operational subsystems called Functional Working Groups (FWGs).
no code implementations • 16 Aug 2022 • William Anderson, Kaneesha Moore, Jesse Ables, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
The Human Immune System (HIS) works to protect a body from infection, illness, and disease.
no code implementations • 16 Aug 2022 • Chuyen Nguyen, Caleb Morgan, Sudip Mittal
As the practicality of Artificial Intelligence (AI) and Machine Learning (ML) based techniques grow, there is an ever increasing threat of adversarial attacks.
no code implementations • 15 Jul 2022 • Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
We leverage SOM's explainability to create both global and local explanations.
Explainable artificial intelligence
Explanation Generation
+1
no code implementations • 13 Jul 2022 • Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures and government institutions.
1 code implementation • 21 Mar 2022 • Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young
Proof of Work (PoW) based cyberdefense systems require incoming network requests to expend effort solving an arbitrary mathematical puzzle.
1 code implementation • 16 Feb 2022 • Valeria Cardellini, Emiliano Casalicchio, Stefano Iannucci, Matteo Lucantonio, Sudip Mittal, Damodar Panigrahi, Andrea Silvi
Intrusion Response is a relatively new field of research.
no code implementations • 8 Feb 2021 • Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin
We evaluate with traditional approaches and conduct a human evaluation study with cybersecurity professionals and threat hunters.
no code implementations • 1 Jun 2020 • Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adalı
Social media has become an important communication channel during high impact events, such as the COVID-19 pandemic.
no code implementations • 13 Apr 2020 • Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal
Internet of Things is a revolutionary domain that has the caliber to impact our lives and bring significant changes to the world.
no code implementations • 15 Feb 2020 • Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal
Cloud Infrastructure as a Service (IaaS) is vulnerable to malware due to its exposure to external adversaries, making it a lucrative attack vector for malicious actors.
no code implementations • 7 May 2019 • Sudip Mittal, Anupam Joshi, Tim Finin
It uses multiple knowledge representations like, vector spaces and knowledge graphs in a 'VKG structure' to store incoming intelligence.
no code implementations • 7 May 2019 • Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak
A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried.
no code implementations • 9 Aug 2018 • Lorenzo Neil, Sudip Mittal, Anupam Joshi
We represent and store this threat intelligence, along with the software dependencies in a security knowledge graph.
no code implementations • 19 Jul 2018 • Nitika Khurana, Sudip Mittal, Anupam Joshi
As AI systems become more ubiquitous, securing them becomes an emerging challenge.
no code implementations • 19 Jul 2018 • Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Joshi
We create a neural network based system that takes in cybersecurity data in a different language and outputs the respective English translation.
no code implementations • 10 Aug 2017 • Sudip Mittal, Anupam Joshi, Tim Finin
Knowledge graphs and vector space models are robust knowledge representation techniques with individual strengths and weaknesses.
no code implementations • 25 Dec 2015 • Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi
Vehicles are becoming more and more connected, this opens up a larger attack surface which not only affects the passengers inside vehicles, but also people around them.