Skip to main content

Showing 1–5 of 5 results for author: Ranade, P

.
  1. FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction

    Authors: Priyanka Ranade, Anupam Joshi

    Abstract: Narrative construction is the process of representing disparate event information into a logical plot structure that models an end to end story. Intelligence analysis is an example of a domain that can benefit tremendously from narrative construction techniques, particularly in aiding analysts during the largely manual and costly process of synthesizing event information into comprehensive intelli… ▽ More

    Submitted 1 June, 2024; v1 submitted 20 October, 2023; originally announced October 2023.

    Journal ref: 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

  2. arXiv:2310.05350  [pdf

    cs.DC cs.LG

    Scaling Studies for Efficient Parameter Search and Parallelism for Large Language Model Pre-training

    Authors: Michael Benington, Leo Phan, Chris Pierre Paul, Evan Shoemaker, Priyanka Ranade, Torstein Collett, Grant Hodgson Perez, Christopher Krieger

    Abstract: AI accelerator processing capabilities and memory constraints largely dictate the scale in which machine learning workloads (e.g., training and inference) can be executed within a desirable time frame. Training a state of the art, transformer-based model today requires use of GPU-accelerated high performance computers with high-speed interconnects. As datasets and models continue to increase in si… ▽ More

    Submitted 10 October, 2023; v1 submitted 8 October, 2023; originally announced October 2023.

    Journal ref: Supercomputing 2023 (SC23) Student Research Poster Track

  3. arXiv:2208.01693  [pdf, other

    cs.CL cs.AI cs.CR

    Recognizing and Extracting Cybersecurtity-relevant Entities from Text

    Authors: Casey Hanks, Michael Maiden, Priyanka Ranade, Tim Finin, Anupam Joshi

    Abstract: Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG). There is a strong need to develop community-accessible datasets to train existing AI-based cybersecurity pipelines to efficiently and accurately extract meaningful insights from CTI… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Journal ref: Workshop on Machine Learning for Cybersecurity, 2022 International Conference on Machine Learning

  4. arXiv:2102.04351  [pdf, other

    cs.CR cs.AI

    Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

    Authors: Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin

    Abstract: Cyber-defense systems are being developed to automatically ingest Cyber Threat Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge graphs. A potential risk is that fake CTI can be generated and spread through Open-Source Intelligence (OSINT) communities or on the Web to effect a data poisoning attack on these systems. Adversaries can use fake CTI examples as tra… ▽ More

    Submitted 18 June, 2021; v1 submitted 8 February, 2021; originally announced February 2021.

    Comments: In Proceedings of International Joint Conference on Neural Networks 2021 (IJCNN 2021), July 2021

  5. arXiv:1807.07517  [pdf, other

    cs.CL cs.CR

    Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence

    Authors: Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Joshi

    Abstract: The multilingual nature of the Internet increases complications in the cybersecurity community's ongoing efforts to strategically mine threat intelligence from OSINT data on the web. OSINT sources such as social media, blogs, and dark web vulnerability markets exist in diverse languages and hinder security analysts, who are unable to draw conclusions from intelligence in languages they don't under… ▽ More

    Submitted 19 July, 2018; originally announced July 2018.