Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Ranade, Priyanka"'
Autor:
Ranade, Priyanka, Joshi, Anupam
Publikováno v:
2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Narrative construction is the process of representing disparate event information into a logical plot structure that models an end to end story. Intelligence analysis is an example of a domain that can benefit tremendously from narrative construction
Externí odkaz:
http://arxiv.org/abs/2310.13848
Scaling Studies for Efficient Parameter Search and Parallelism for Large Language Model Pre-training
Autor:
Benington, Michael, Phan, Leo, Paul, Chris Pierre, Shoemaker, Evan, Ranade, Priyanka, Collett, Torstein, Perez, Grant Hodgson, Krieger, Christopher
Publikováno v:
Supercomputing 2023 (SC23) Student Research Poster Track
AI accelerator processing capabilities and memory constraints largely dictate the scale in which machine learning workloads (e.g., training and inference) can be executed within a desirable time frame. Training a state of the art, transformer-based m
Externí odkaz:
http://arxiv.org/abs/2310.05350
Publikováno v:
Workshop on Machine Learning for Cybersecurity, 2022 International Conference on Machine Learning
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG). There is a strong need to devel
Externí odkaz:
http://arxiv.org/abs/2208.01693
Cyber-defense systems are being developed to automatically ingest Cyber Threat Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge graphs. A potential risk is that fake CTI can be generated and spread through Open-
Externí odkaz:
http://arxiv.org/abs/2102.04351
The multilingual nature of the Internet increases complications in the cybersecurity community's ongoing efforts to strategically mine threat intelligence from OSINT data on the web. OSINT sources such as social media, blogs, and dark web vulnerabili
Externí odkaz:
http://arxiv.org/abs/1807.07517
Proceedings of the 39th International Conference on Machine Learning, Baltimore, Maryland, USA
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ffadc67c6b898f6330fb96f936b685f1
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Ranade, Priyanka
Cybersecurity threats, exploits, and intelligence sources have evolved to be largely cross-regional over the course of time. Although the security community perpetually addresses this topic, its scope is continually stretching and introducing new are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a892fabc90be87ad8bbc80675586e9ab