Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
A Systematic Comparison of Large Language Models Performance for Intrusion Detection
- Minh-Thanh Bui,
- Matteo Boffa,
- Rodolfo Vieira Valentim,
- Jose Manuel Navarro,
- Fuxing Chen,
- Xiaosheng Bao,
- Zied Ben Houidi,
- Dario Rossi
Proceedings of the ACM on Networking (PACMNET), Volume 2, Issue CoNEXT4Article No.: 22, Pages 1–23https://doi.org/10.1145/3696379We explore the capabilities of Large Language Models (LLMs) to assist or substitute devices (i.e., firewalls) and humans (i.e., security experts) respectively in the detection and analysis of security incidents. We leverage transformer-based technologies,...
- short-paperDecember 2024
Adaptive Network Intrusion Detection Systems Against Performance Degradation via Model Agnostic Meta-Learning
AACD '24: Proceedings of the 11th ACM Workshop on Adaptive and Autonomous Cyber DefensePages 23–26https://doi.org/10.1145/3689935.3690396Network Intrusion Detection Systems (NIDS) are essential for identifying and mitigating cyber threats in dynamic network environments. However, maintaining high performance over time is challenging due to factors such as initial model limitations, data ...
- research-articleOctober 2024
Learning Socio-Temporal Graphs for Multi-Agent Trajectory Prediction
HCMA'24: Proceedings of the 5th International Workshop on Human-centric Multimedia AnalysisPages 55–64https://doi.org/10.1145/3688865.3689481In order to predict a pedestrian's trajectory in a crowd accurately, one has to take into account her/his underlying socio-temporal interactions with other pedestrians consistently. Unlike existing work that represents the relevant information separately,...
- abstractOctober 2024
Tutorial: Large Language-Vision Model in Society
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 11298–11299https://doi.org/10.1145/3664647.3689175The tutorial "Large Vision-Language Model in the Society" aims to provide a comprehensive overview of state-of-the-art techniques and applications of large vision-language models (LVLMs), which integrate visual and textual data to transform multimedia ...
- research-articleJune 2024
Context or Clutter? Efficiently Matching Objects Across Scenes
ICMR '24: Proceedings of the 2024 International Conference on Multimedia RetrievalPages 404–413https://doi.org/10.1145/3652583.3658090Annotated images are required for numerous computer vision tasks; however, the annotation process can be time-consuming for crowdworkers and experts. Previous work has investigated novel interaction techniques and task reformulation to speed up this ...
-
- research-articleMay 2024
Fuzzy Logic Decision Making Approach to identify the maximum influencing factor on productivity
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceArticle No.: 11, Pages 1–5https://doi.org/10.1145/3647444.3647837Enhancing productivity is a core objective of any organization whether it is manufacturing or service one. Several factors both technological and human related are responsible for an improved performance. Beyond continuous improvement in process, sound ...
- research-articleOctober 2023
Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices
MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile ComputingPages 370–375https://doi.org/10.1145/3565287.3616529The rapid expansion of IoT brings unmatched convenience and connectivity, but it also raises significant security concerns. The prioritization of functionality over security in IoT devices exposes vulnerabilities like default credentials, outdated ...
- research-articleMay 2023
Modeling multi-attribute and implicit relationship factors with self-supervised learning for recommender systems
Intelligent Data Analysis (INDA), Volume 27, Issue 3Pages 691–708https://doi.org/10.3233/IDA-226576Interactions of users and items can be naturally modeled as a user-item bipartite graph in recommender systems, and emerging research is devoted to exploring user-item graphs for collaborative filtering methods. In reality, user-item interaction usually ...
- research-articleJanuary 2022
Federated learning: Applications, challenges and future directions
International Journal of Hybrid Intelligent Systems (IJHIS), Volume 18, Issue 1-2Pages 19–35https://doi.org/10.3233/HIS-220006Federated learning (FL) refers to a system in which a central aggregator coordinates the efforts of several clients to solve the issues of machine learning. This setting allows the training data to be dispersed in order to protect the privacy of ...
- research-articleJanuary 2021
Sentiment analysis: a review and framework foundations
International Journal of Data Analysis Techniques and Strategies (IJDATS), Volume 13, Issue 4Pages 336–355https://doi.org/10.1504/ijdats.2021.120100The rise of social media as a platform for opinion expression and social interactions motivated the need for an automated data analysis technique for business value extraction with optimal investment considerations. In this respect, sentiment analysis (SA)...
- research-articleOctober 2021
Unsupervised-learning financial reconciliation: a robust, accurate approach inspired by machine translation
ICAIF '20: Proceedings of the First ACM International Conference on AI in FinanceArticle No.: 46, Pages 1–12https://doi.org/10.1145/3383455.3422517Financial reconciliation (cross-checking independent sources of data) is a time-honored and widespread function in finance and audit. Its objectives are to ensure completeness, timeliness, and accuracy of recording of transactions.
With the ...
- research-articleJuly 2018
Infrastructure Quality Assessment in Africa using Satellite Imagery and Deep Learning
- Barak Oshri,
- Annie Hu,
- Peter Adelson,
- Xiao Chen,
- Pascaline Dupas,
- Jeremy Weinstein,
- Marshall Burke,
- David Lobell,
- Stefano Ermon
KDD '18: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data MiningPages 616–625https://doi.org/10.1145/3219819.3219924The UN Sustainable Development Goals allude to the importance of infrastructure quality in three of its seventeen goals. However, monitoring infrastructure quality in developing regions remains prohibitively expensive and impedes efforts to measure ...
- research-articleDecember 2016
Effective attention-based neural architectures for sentence compression with bidirectional long short-term memory
SoICT '16: Proceedings of the 7th Symposium on Information and Communication TechnologyPages 123–130https://doi.org/10.1145/3011077.3011111We propose a novel model that apply an extension of the Long Short-Term Memory neural network for sentence compression task. In our model, only the most relevant context of each word is concentrated to avoid the redundant information. Our model is based ...
- articleDecember 2016
2D Vector field approximation using linear neighborhoods
The Visual Computer: International Journal of Computer Graphics (VISC), Volume 32, Issue 12Pages 1563–1578https://doi.org/10.1007/s00371-015-1140-9We present a vector field approximation for two-dimensional vector fields that preserves their topology and significantly reduces the memory footprint. This approximation is based on a segmentation. The flow within each segmentation region is ...
- research-articleJuly 2015
Novelty-Based Evolutionary Design of Morphing Underwater Robots
GECCO '15: Proceedings of the 2015 Annual Conference on Genetic and Evolutionary ComputationPages 145–152https://doi.org/10.1145/2739480.2754686Recent developments in robotics demonstrated that bioinspiration and embodiement are powerful tools to achieve robust behavior in presence of little control. In this context morphological design is usually performed by humans, following a set of ...
- research-articleMarch 2014
Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 26, Issue 3Pages 577–594https://doi.org/10.1109/TKDE.2013.33There are numerous applications where we wish to discover unexpected activities in a sequence of time-stamped observation data--for instance, we may want to detect inexplicable events in transactions at a website or in video of an airport tarmac. In ...
- articleSeptember 2012
The Phosphorylation of the Heat Shock Factor as a Modulator for the Heat Shock Response
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), Volume 9, Issue 5Pages 1326–1337https://doi.org/10.1109/TCBB.2012.66The heat shock response is a well-conserved defence mechanism against the accumulation of misfolded proteins due to prolonged elevated heat. The cell responds to heat shock by raising the levels of heat shock proteins (hsp), which are responsible for ...
- research-articleSeptember 2012
An Artificial Player for a Language Game
IEEE Intelligent Systems (IEEECS-INTELLI-NEW), Volume 27, Issue 5Pages 36–43https://doi.org/10.1109/MIS.2011.37A knowledge infusion process gives a system the linguistic and cultural knowledge—normally the prerogative of human beings—required to play a complex language game.
- articleJuly 2012
Hierarchical Online Problem Classification for IT Support Services
IEEE Transactions on Services Computing (ITSC), Volume 5, Issue 3Pages 345–357https://doi.org/10.1109/TSC.2011.3The overwhelming amount of various monitoring and log data generated in multitier IT systems makes problem determination one of the most expensive and labor-intensive tasks in IT Services arena. Particularly the initial step of problem classification is ...
- articleJune 2011
The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems
IEEE Transactions on Mobile Computing (ITMV), Volume 10, Issue 6Pages 783–796https://doi.org/10.1109/TMC.2010.222Dealing with large, critical mobile systems and infrastructures where ongoing changes and resilience are paramount leads to very complex and difficult challenges for system evaluation. These challenges call for approaches that are able to integrate ...