Search Results for author: Sudip Mittal

Found 37 papers, 3 papers with code

AI Ethics: A Bibliometric Analysis, Critical Issues, and Key Gaps

no code implementations12 Mar 2024 Di Kevin Gao, Andrew Haverly, Sudip Mittal, Jiming Wu, Jingdao Chen

Artificial intelligence (AI) ethics has emerged as a burgeoning yet pivotal area of scholarly research.

Ethics Fairness

Patient-Centric Knowledge Graphs: A Survey of Current Methods, Challenges, and Applications

no code implementations20 Feb 2024 Hassan S. Al Khatib, Subash Neupane, Harish Kumar Manchukonda, Noorbakhsh Amiri Golilarz, Sudip Mittal, Amin Amirlatifi, Shahram Rahimi

Patient-Centric Knowledge Graphs (PCKGs) represent an important shift in healthcare that focuses on individualized patient care by mapping the patient's health information in a holistic and multi-dimensional way.

Data Integration Disease Prediction +1

Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems

no code implementations18 Jan 2024 Jesse Ables, Nathaniel Childers, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

The contributions of this work include the hybrid X-IDS architecture, the eclectic rule extraction algorithm applicable to intrusion detection datasets, and a thorough analysis of performance and explainability, demonstrating the trade-offs involved in rule extraction speed and accuracy.

Explainable artificial intelligence Explainable Artificial Intelligence (XAI) +2

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

no code implementations18 Jan 2024 Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

In this work, we present LOCALINTEL, a novel automated knowledge contextualization system that, upon prompting, retrieves threat reports from the global threat repositories and uses its local knowledge database to contextualize them for a specific organization.

Retrieval

Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities

no code implementations15 Jan 2024 Logan Cummins, Alex Sommers, Somayeh Bakhtiari Ramezani, Sudip Mittal, Joseph Jabour, Maria Seale, Shahram Rahimi

This survey on explainable predictive maintenance (XPM) discusses and presents the current methods of XAI as applied to predictive maintenance while following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 guidelines.

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

no code implementations11 Jan 2024 Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal

In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information.

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities

no code implementations12 Oct 2023 Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi

Motivated by the need to address the security concerns in AI-Robotics systems, this paper presents a comprehensive survey and taxonomy across three dimensions: attack surfaces, ethical and legal concerns, and Human-Robot Interaction (HRI) security.

URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground Traversability Estimation for Off-road Environments

1 code implementation15 Sep 2023 Charles Moore, Shaswata Mitra, Nisha Pillai, Marc Moore, Sudip Mittal, Cindy Bethel, Jingdao Chen

Results show that the proposed image segmentation and planning methods outperform conventional planning algorithms in terms of the quality and feasibility of the initial path, as well as the quality of replanned paths.

Autonomous Navigation Image Segmentation +2

Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

no code implementations25 Jul 2023 Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi

Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainability and safety in AI systems.

Knowledge Graphs

Impacts and Risk of Generative AI Technology on Cyber Defense

no code implementations22 Jun 2023 Subash Neupane, Ivan A. Fernandez, Sudip Mittal, Shahram Rahimi

To combat the threats posed by GenAI, we propose leveraging the Cyber Kill Chain (CKC) to understand the lifecycle of cyberattacks, as a foundational model for cyber defense.

Face Swapping Misinformation

REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response

no code implementations23 May 2023 Damodar Panigrahi, William Anderson, Joshua Whitman, Sudip Mittal, Benjamin A Blakely

In this paper, to enable this control functionality over an IRS, we create Rules of EngaGement for Automated cybeR Defense (REGARD) system which holds a set of Rules of Engagement (RoE) to protect the managed system according to the instructions provided by the human operator.

Intrusion Detection

Survey of Malware Analysis through Control Flow Graph using Machine Learning

no code implementations15 May 2023 Shaswata Mitra, Stephen A. Torri, Sudip Mittal

Malware is a significant threat to the security of computer systems and networks which requires sophisticated techniques to analyze the behavior and functionality for detection.

Malware Analysis Malware Detection

Explainable Intrusion Detection Systems Using Competitive Learning Techniques

no code implementations30 Mar 2023 Jesse Ables, Thomas Kirby, Sudip Mittal, Ioana Banicescu, Shahram Rahimi, William Anderson, Maria Seale

Lastly, we analyze the statistical and visual explanations generated by our architecture, and we give a strategy that users could use to help navigate the set of explanations.

Intrusion Detection Navigate

AI Security Threats against Pervasive Robotic Systems: A Course for Next Generation Cybersecurity Workforce

no code implementations15 Feb 2023 Sudip Mittal, Jingdao Chen

Robotics, automation, and related Artificial Intelligence (AI) systems have become pervasive bringing in concerns related to security, safety, accuracy, and trust.

Ethics

TwinExplainer: Explaining Predictions of an Automotive Digital Twin

no code implementations1 Feb 2023 Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Milan Parmar, Shahram Rahimi

Vehicles are complex Cyber Physical Systems (CPS) that operate in a variety of environments, and the likelihood of failure of one or more subsystems, such as the engine, transmission, brakes, and fuel, can result in unscheduled downtime and incur high maintenance or repair costs.

Decision Making

CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense

no code implementations27 Jan 2023 Trisha Chakraborty, Shaswata Mitra, Sudip Mittal

Critical servers can be secured against distributed denial of service (DDoS) attacks using proof of work (PoW) systems assisted by an Artificial Intelligence (AI) that learns contextual network request patterns.

A White-Box Adversarial Attack Against a Digital Twin

no code implementations25 Oct 2022 Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi

Recent research has shown that Machine Learning/Deep Learning (ML/DL) models are particularly vulnerable to adversarial perturbations, which are small changes made to the input data in order to fool a machine learning classifier.

Adversarial Attack

A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels

no code implementations14 Sep 2022 Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Shahram Rahimi

A modern vehicle fitted with sensors, actuators, and Electronic Control Units (ECUs) can be divided into several operational subsystems called Functional Working Groups (FWGs).

Anomaly Detection

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

no code implementations16 Aug 2022 Chuyen Nguyen, Caleb Morgan, Sudip Mittal

As the practicality of Artificial Intelligence (AI) and Machine Learning (ML) based techniques grow, there is an ever increasing threat of adversarial attacks.

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

no code implementations13 Jul 2022 Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures and government institutions.

Explainable Artificial Intelligence (XAI) Intrusion Detection

A Policy Driven AI-Assisted PoW Framework

1 code implementation21 Mar 2022 Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young

Proof of Work (PoW) based cyberdefense systems require incoming network requests to expend effort solving an arbitrary mathematical puzzle.

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

no code implementations8 Feb 2021 Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin

We evaluate with traditional approaches and conduct a human evaluation study with cybersecurity professionals and threat hunters.

Data Poisoning Knowledge Graphs +2

Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case

no code implementations13 Apr 2020 Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal

Internet of Things is a revolutionary domain that has the caliber to impact our lives and bring significant changes to the world.

Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

no code implementations15 Feb 2020 Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal

Cloud Infrastructure as a Service (IaaS) is vulnerable to malware due to its exposure to external adversaries, making it a lucrative attack vector for malicious actors.

Malware Detection

Cyber-All-Intel: An AI for Security related Threat Intelligence

no code implementations7 May 2019 Sudip Mittal, Anupam Joshi, Tim Finin

It uses multiple knowledge representations like, vector spaces and knowledge graphs in a 'VKG structure' to store incoming intelligence.

Knowledge Graphs

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

no code implementations7 May 2019 Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak

A cybersecurity knowledge graph can be paramount in aiding a security analyst to detect cyber threats because it stores a vast range of cyber threat information in the form of semantic triples which can be queried.

Relation Relation Extraction

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports

no code implementations9 Aug 2018 Lorenzo Neil, Sudip Mittal, Anupam Joshi

We represent and store this threat intelligence, along with the software dependencies in a security knowledge graph.

Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence

no code implementations19 Jul 2018 Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Joshi

We create a neural network based system that takes in cybersecurity data in a different language and outputs the respective English translation.

Translation

Preventing Poisoning Attacks on AI based Threat Intelligence Systems

no code implementations19 Jul 2018 Nitika Khurana, Sudip Mittal, Anupam Joshi

As AI systems become more ubiquitous, securing them becomes an emerging challenge.

Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs

no code implementations10 Aug 2017 Sudip Mittal, Anupam Joshi, Tim Finin

Knowledge graphs and vector space models are robust knowledge representation techniques with individual strengths and weaknesses.

Knowledge Graphs

Using Data Analytics to Detect Anomalous States in Vehicles

no code implementations25 Dec 2015 Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi

Vehicles are becoming more and more connected, this opens up a larger attack surface which not only affects the passengers inside vehicles, but also people around them.

Cannot find the paper you are looking for? You can Submit a new open access paper.