We designed a GAN based classifier which improves the accuracy to detect suspicious network activity. We trained our classifier on a pretty big dataset. The GAN based classifier relaxed the class boundaries which should have made this immune to adversarial attacks. However, we proved that the GAN based classifier is susceptible to adversarial attacks, after a certain number of iterations.
Tags: Generative Adversarial Networks, AI, Adversarial Attacks,Network security
We created a novel ontology to represent the data coming from smart farms. This could be extended to other CPS systems
Tags: Smart Security, Knowledge Graphs
We combined knowledge graphs and used the prior knowledge to influence RL algorithm's parameters for malware analysis
Tags: Reinforcement Learning, Knowledge Graphs
We combined knowledge graphs and used the prior knowledge to influence RL algorithm's parameters for simulated cyber-attacks and defenses. We investigated the effect of knowledge influence
Tags: Reinforcement Learning, Knowledge Graphs
We explored if we can create fake cyber threat intelligence through GPT. Turns out they are good enough to fool experts.
Tags: LLM, Generative Models, Knowledge Graphs
We explored if we can make conservative Q-Learning, not so conservative with knowledge graphs and guidance
Tags: Offline Reinforcement Learning, Knowledge Graphs