Search Results for author: Youngja Park

Found 14 papers, 3 papers with code

DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements

no code implementations12 Nov 2013 Shandian Zhe, Yuan Qi, Youngja Park, Ian Molloy, Suresh Chari

To overcome this limitation, we present Distributed Infinite Tucker (DINTUCKER), a large-scale nonlinear tensor decomposition algorithm on MAPREDUCE.

Tensor Decomposition Variational Inference

UMBC at SemEval-2018 Task 8: Understanding Text about Malware

no code implementations SEMEVAL 2018 Ankur Padia, Arpita Roy, Taneeya Satyapanich, Francis Ferraro, SHimei Pan, Youngja Park, Anupam Joshi, Tim Finin

We describe the systems developed by the UMBC team for 2018 SemEval Task 8, SecureNLP (Semantic Extraction from CybersecUrity REports using Natural Language Processing).

Attribute

Predicting Malware Attributes from Cybersecurity Texts

no code implementations NAACL 2019 Arpita Roy, Youngja Park, SHimei Pan

Text analytics is a useful tool for studying malware behavior and tracking emerging threats.

Attribute

Supervising Unsupervised Open Information Extraction Models

no code implementations IJCNLP 2019 Arpita Roy, Youngja Park, Taesung Lee, SHimei Pan

We propose a novel supervised open information extraction (Open IE) framework that leverages an ensemble of unsupervised Open IE systems and a small amount of labeled data to improve system performance.

Open Information Extraction Relation +1

Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks

no code implementations11 Jun 2020 Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy

Backdoor attacks mislead machine-learning models to output an attacker-specified class when presented a specific trigger at test time.

Ontology-driven Knowledge Graph for Android Malware

no code implementations3 Sep 2021 Ryan Christian, Sharmishtha Dutta, Youngja Park, Nidhi Rastogi

This ontology forms the basis for the malware threat intelligence knowledge graph, MalKG, which we exemplify using three different, non-overlapping demonstrations.

Malware Analysis

CyNER: A Python Library for Cybersecurity Named Entity Recognition

1 code implementation8 Apr 2022 Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format from heterogeneous sources on the Internet.

named-entity-recognition Named Entity Recognition +1

Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI

1 code implementation1 Nov 2022 Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

The framework characterizes attack patterns by capturing the phases of an attack in Android and enterprise networks and systematically maps them to the MITRE ATT\&CK pattern framework.

Split-NER: Named Entity Recognition via Two Question-Answering-based Classifications

1 code implementation30 Oct 2023 Jatin Arora, Youngja Park

In this work, we address the NER problem by splitting it into two logical sub-tasks: (1) Span Detection which simply extracts entity mention spans irrespective of entity type; (2) Span Classification which classifies the spans into their entity types.

named-entity-recognition Named Entity Recognition +2

Towards Generating Informative Textual Description for Neurons in Language Models

no code implementations30 Jan 2024 Shrayani Mondal, Rishabh Garodia, Arbaaz Qureshi, Taesung Lee, Youngja Park

We leverage the potential of generative language models to discover human-interpretable descriptors present in a dataset and use an unsupervised approach to explain neurons with these descriptors.

World Knowledge

Cannot find the paper you are looking for? You can Submit a new open access paper.