no code implementations • 5 Dec 2024 • Subash Neupane, Himanshu Tripathi, Shaswata Mitra, Sean Bozorgzad, Sudip Mittal, Shahram Rahimi, Amin Amirlatifi
This paper presents ClinicSum, a novel framework designed to automatically generate clinical summaries from patient-doctor conversations.
no code implementations • 23 Nov 2024 • Damodar Panigrahi, Shaswata Mitra, Subash Neupane, Sudip Mittal, Benjamin A. Blakely
Continuous monitoring of the enterprise infrastructure is an essential TTP the IRS uses.
no code implementations • 1 Nov 2024 • Alicia Russell-Gilbert, Alexander Sommers, Andrew Thompson, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold, Joshua Church
The research aims to improve the transferability of anomaly detection models by leveraging Large Language Models (LLMs) and seeks to validate the enhanced effectiveness of the proposed approach in data-sparse industrial applications.
no code implementations • 19 Oct 2024 • Elias Hossain, Tasfia Nuzhat, Shamsul Masum, Shahram Rahimi, Sudip Mittal, Noorbakhsh Amiri Golilarz
This scarcity of annotated data impedes the development of effective machine learning models for cancer document classification.
no code implementations • 12 Sep 2024 • Aaryan Panda, Damodar Panigrahi, Shaswata Mitra, Sudip Mittal, Shahram Rahimi
The field of Computer Vision (CV) has faced challenges.
no code implementations • 21 Aug 2024 • Logan Cummins, Alexander Sommers, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold
Inside of the field of explainable artificial intelligence, counterfactual explanations can give that information in the form of what changes to make to put the data point into the opposing class, in this case "healthy".
no code implementations • 27 Jun 2024 • Ivan A. Fernandez, Subash Neupane, Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Nisha Pillai, Jingdao Chen, Shahram Rahimi
Industry 4. 0 has witnessed the rise of complex robots fueled by the integration of Artificial Intelligence/Machine Learning (AI/ML) and Digital Twin (DT) technologies.
no code implementations • 4 Jun 2024 • Alexander Sommers, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold
Generative AI has received much attention in the image and language domains, with the transformer neural network continuing to dominate the state of the art.
no code implementations • 13 May 2024 • Subash Neupane, Elias Hossain, Jason Keith, Himanshu Tripathi, Farbod Ghiasi, Noorbakhsh Amiri Golilarz, Amin Amirlatifi, Sudip Mittal, Shahram Rahimi
This paper presents BARKPLUG V. 2, a Large Language Model (LLM)-based chatbot system built using Retrieval Augmented Generation (RAG) pipelines to enhance the user experience and access to information within academic settings. The objective of BARKPLUG V. 2 is to provide information to users about various campus resources, including academic departments, programs, campus facilities, and student resources at a university setting in an interactive fashion.
no code implementations • 12 Apr 2024 • Alexander Sommers, Somayeh Bakhtiari Ramezani, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure
Data augmentation is an important facilitator of deep learning applications in the time series domain.
no code implementations • 13 Mar 2024 • Subash Neupane, Shaswata Mitra, Sudip Mittal, Noorbakhsh Amiri Golilarz, Shahram Rahimi, Amin Amirlatifi
Large Language Models (LLMs) have shown impressive capabilities in generating human-like responses.
no code implementations • 12 Mar 2024 • Di Kevin Gao, Andrew Haverly, Sudip Mittal, Jiming Wu, Jingdao Chen
Artificial intelligence (AI) ethics has emerged as a burgeoning yet pivotal area of scholarly research.
no code implementations • 20 Feb 2024 • Hassan S. Al Khatib, Subash Neupane, Harish Kumar Manchukonda, Noorbakhsh Amiri Golilarz, Sudip Mittal, Amin Amirlatifi, Shahram Rahimi
Patient-Centric Knowledge Graphs (PCKGs) represent an important shift in healthcare that focuses on individualized patient care by mapping the patient's health information in a holistic and multi-dimensional way.
no code implementations • 18 Jan 2024 • Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi
In this work, we present LOCALINTEL, a novel automated knowledge contextualization system that, upon prompting, retrieves threat reports from the global threat repositories and uses its local knowledge database to contextualize them for a specific organization.
no code implementations • 18 Jan 2024 • Jesse Ables, Nathaniel Childers, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
The contributions of this work include the hybrid X-IDS architecture, the eclectic rule extraction algorithm applicable to intrusion detection datasets, and a thorough analysis of performance and explainability, demonstrating the trade-offs involved in rule extraction speed and accuracy.
Explainable artificial intelligence Explainable Artificial Intelligence (XAI) +2
no code implementations • 15 Jan 2024 • Logan Cummins, Alex Sommers, Somayeh Bakhtiari Ramezani, Sudip Mittal, Joseph Jabour, Maria Seale, Shahram Rahimi
This survey on explainable predictive maintenance (XPM) discusses and presents the current methods of XAI as applied to predictive maintenance while following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 guidelines.
no code implementations • 11 Jan 2024 • Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal
In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information.
no code implementations • 12 Oct 2023 • Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi
Motivated by the need to address the security concerns in AI-Robotics systems, this paper presents a comprehensive survey and taxonomy across three dimensions: attack surfaces, ethical and legal concerns, and Human-Robot Interaction (HRI) security.
1 code implementation • 15 Sep 2023 • Charles Moore, Shaswata Mitra, Nisha Pillai, Marc Moore, Sudip Mittal, Cindy Bethel, Jingdao Chen
Results show that the proposed image segmentation and planning methods outperform conventional planning algorithms in terms of the quality and feasibility of the initial path, as well as the quality of replanned paths.
no code implementations • 25 Jul 2023 • Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi
Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainability and safety in AI systems.
no code implementations • 22 Jun 2023 • Subash Neupane, Ivan A. Fernandez, Sudip Mittal, Shahram Rahimi
To combat the threats posed by GenAI, we propose leveraging the Cyber Kill Chain (CKC) to understand the lifecycle of cyberattacks, as a foundational model for cyber defense.
no code implementations • 23 May 2023 • Damodar Panigrahi, William Anderson, Joshua Whitman, Sudip Mittal, Benjamin A Blakely
In this paper, to enable this control functionality over an IRS, we create Rules of EngaGement for Automated cybeR Defense (REGARD) system which holds a set of Rules of Engagement (RoE) to protect the managed system according to the instructions provided by the human operator.
no code implementations • 15 May 2023 • Shaswata Mitra, Stephen A. Torri, Sudip Mittal
Malware is a significant threat to the security of computer systems and networks which requires sophisticated techniques to analyze the behavior and functionality for detection.
no code implementations • 30 Mar 2023 • Jesse Ables, Thomas Kirby, Sudip Mittal, Ioana Banicescu, Shahram Rahimi, William Anderson, Maria Seale
Lastly, we analyze the statistical and visual explanations generated by our architecture, and we give a strategy that users could use to help navigate the set of explanations.
no code implementations • 15 Feb 2023 • Sudip Mittal, Jingdao Chen
Robotics, automation, and related Artificial Intelligence (AI) systems have become pervasive bringing in concerns related to security, safety, accuracy, and trust.
no code implementations • 1 Feb 2023 • Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Milan Parmar, Shahram Rahimi
Vehicles are complex Cyber Physical Systems (CPS) that operate in a variety of environments, and the likelihood of failure of one or more subsystems, such as the engine, transmission, brakes, and fuel, can result in unscheduled downtime and incur high maintenance or repair costs.
no code implementations • 27 Jan 2023 • Trisha Chakraborty, Shaswata Mitra, Sudip Mittal
Critical servers can be secured against distributed denial of service (DDoS) attacks using proof of work (PoW) systems assisted by an Artificial Intelligence (AI) that learns contextual network request patterns.
no code implementations • 25 Oct 2022 • Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi
Recent research has shown that Machine Learning/Deep Learning (ML/DL) models are particularly vulnerable to adversarial perturbations, which are small changes made to the input data in order to fool a machine learning classifier.
no code implementations • 14 Sep 2022 • Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Shahram Rahimi
A modern vehicle fitted with sensors, actuators, and Electronic Control Units (ECUs) can be divided into several operational subsystems called Functional Working Groups (FWGs).
no code implementations • 16 Aug 2022 • William Anderson, Kaneesha Moore, Jesse Ables, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
The Human Immune System (HIS) works to protect a body from infection, illness, and disease.
no code implementations • 16 Aug 2022 • Chuyen Nguyen, Caleb Morgan, Sudip Mittal
As the practicality of Artificial Intelligence (AI) and Machine Learning (ML) based techniques grow, there is an ever increasing threat of adversarial attacks.
no code implementations • 15 Jul 2022 • Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
We leverage SOM's explainability to create both global and local explanations.
Explainable artificial intelligence Explainable Artificial Intelligence (XAI) +2
no code implementations • 13 Jul 2022 • Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures and government institutions.
Explainable Artificial Intelligence (XAI) Intrusion Detection
1 code implementation • 21 Mar 2022 • Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young
Proof of Work (PoW) based cyberdefense systems require incoming network requests to expend effort solving an arbitrary mathematical puzzle.
1 code implementation • 16 Feb 2022 • Valeria Cardellini, Emiliano Casalicchio, Stefano Iannucci, Matteo Lucantonio, Sudip Mittal, Damodar Panigrahi, Andrea Silvi
Intrusion Response is a relatively new field of research.
no code implementations • 8 Feb 2021 • Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin
We evaluate with traditional approaches and conduct a human evaluation study with cybersecurity professionals and threat hunters.
no code implementations • 1 Jun 2020 • Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adalı
Social media has become an important communication channel during high impact events, such as the COVID-19 pandemic.
no code implementations • 13 Apr 2020 • Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal
Internet of Things is a revolutionary domain that has the caliber to impact our lives and bring significant changes to the world.
no code implementations • 15 Feb 2020 • Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal
Cloud Infrastructure as a Service (IaaS) is vulnerable to malware due to its exposure to external adversaries, making it a lucrative attack vector for malicious actors.
no code implementations • 7 May 2019 • Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak
A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried.
no code implementations • 7 May 2019 • Sudip Mittal, Anupam Joshi, Tim Finin
It uses multiple knowledge representations like, vector spaces and knowledge graphs in a 'VKG structure' to store incoming intelligence.
no code implementations • 9 Aug 2018 • Lorenzo Neil, Sudip Mittal, Anupam Joshi
We represent and store this threat intelligence, along with the software dependencies in a security knowledge graph.
no code implementations • 19 Jul 2018 • Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Joshi
We create a neural network based system that takes in cybersecurity data in a different language and outputs the respective English translation.
no code implementations • 19 Jul 2018 • Nitika Khurana, Sudip Mittal, Anupam Joshi
As AI systems become more ubiquitous, securing them becomes an emerging challenge.
no code implementations • 10 Aug 2017 • Sudip Mittal, Anupam Joshi, Tim Finin
Knowledge graphs and vector space models are robust knowledge representation techniques with individual strengths and weaknesses.
no code implementations • 25 Dec 2015 • Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi
Vehicles are becoming more and more connected, this opens up a larger attack surface which not only affects the passengers inside vehicles, but also people around them.