Zobrazeno 1 - 10
of 5 613
pro vyhledávání: '"Nathaniel, D."'
Autor:
NATHANIEL, D., SOOSAI, A.
Publikováno v:
Advances in Electrical and Computer Engineering, Vol 23, Iss 4, Pp 81-88 (2023)
In recent years, machine learning (ML) has had a significant influence on the discipline of computer security. In network security, intrusion detection systems increasingly employ machine learning techniques. Approaches based on machine learning ha
Externí odkaz:
https://doaj.org/article/d08d41cba66c4e25a28607b413dc7763
Autor:
Kaur, Ramneet, Samplawski, Colin, Cobb, Adam D., Roy, Anirban, Matejek, Brian, Acharya, Manoj, Elenius, Daniel, Berenbeim, Alexander M., Pavlik, John A., Bastian, Nathaniel D., Jha, Susmit
In this paper, we present a dynamic semantic clustering approach inspired by the Chinese Restaurant Process, aimed at addressing uncertainty in the inference of Large Language Models (LLMs). We quantify uncertainty of an LLM on a given query by calcu
Externí odkaz:
http://arxiv.org/abs/2411.02381
Autor:
Chen, Jingdi, Zhou, Hanhan, Mei, Yongsheng, Joe-Wong, Carlee, Adam, Gina, Bastian, Nathaniel D., Lan, Tian
Deep Reinforcement Learning (DRL) algorithms have achieved great success in solving many challenging tasks while their black-box nature hinders interpretability and real-world applicability, making it difficult for human experts to interpret and unde
Externí odkaz:
http://arxiv.org/abs/2410.16517
In the rapidly evolving field of cybersecurity, the integration of flow-level and packet-level information for real-time intrusion detection remains a largely untapped area of research. This paper introduces "XG-NID," a novel framework that, to the b
Externí odkaz:
http://arxiv.org/abs/2408.16021
The prevailing approaches in Network Intrusion Detection Systems (NIDS) are often hampered by issues such as high resource consumption, significant computational demands, and poor interpretability. Furthermore, these systems generally struggle to ide
Externí odkaz:
http://arxiv.org/abs/2406.00938
Autor:
Nie, Yuzhou., Wang, Yanting., Jia, Jinyuan., De Lucia, Michael J., Bastian, Nathaniel D., Guo, Wenbo., Song, Dawn.
One key challenge in backdoor attacks against large foundation models is the resource limits. Backdoor attacks usually require retraining the target model, which is impractical for very large foundation models. Existing backdoor attacks are mainly de
Externí odkaz:
http://arxiv.org/abs/2405.16783
Typical models of learning assume incremental estimation of continuously-varying decision variables like expected rewards. However, this class of models fails to capture more idiosyncratic, discrete heuristics and strategies that people and animals a
Externí odkaz:
http://arxiv.org/abs/2402.16668
Many cybersecurity problems that require real-time decision-making based on temporal observations can be abstracted as a sequence modeling problem, e.g., network intrusion detection from a sequence of arriving packets. Existing approaches like reinfo
Externí odkaz:
http://arxiv.org/abs/2312.07696
Autor:
John E. G. Lawrence, Kenny Roberts, Elizabeth Tuck, Tong Li, Lira Mamanova, Petra Balogh, Inga Usher, Alice Piapi, Pavel Mazin, Nathaniel D. Anderson, Liam Bolt, Laura Richardson, Elena Prigmore, Xiaoling He, Roger A. Barker, Adrienne Flanagan, Matthew D. Young, Sarah A. Teichmann, Omer Bayraktar, Sam Behjati
Publikováno v:
Nature Communications, Vol 15, Iss 1, Pp 1-18 (2024)
Abstract Positional coding along the anterior-posterior axis is regulated by HOX genes, whose 3’ to 5’ expression correlates with location along this axis. The precise utilisation of HOX genes in different human cell types is not fully understood
Externí odkaz:
https://doaj.org/article/faf1fdd958e64b8d8005dc5935c1516e