Skip to main content

Showing 1–50 of 59 results for author: Shakarian, P

.
  1. arXiv:2406.12147  [pdf, other

    cs.AI

    Metacognitive AI: Framework and the Case for a Neurosymbolic Approach

    Authors: Hua Wei, Paulo Shakarian, Christian Lebiere, Bruce Draper, Nikhil Krishnaswamy, Sergei Nirenburg

    Abstract: Metacognition is the concept of reasoning about an agent's own internal processes and was originally introduced in the field of developmental psychology. In this position paper, we examine the concept of applying metacognition to artificial intelligence. We introduce a framework for understanding metacognitive artificial intelligence (AI) that we call TRAP: transparency, reasoning, adaptation, and… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2405.10345  [pdf, other

    q-bio.QM cs.AI cs.LG

    Machine Learning Driven Biomarker Selection for Medical Diagnosis

    Authors: Divyagna Bavikadi, Ayushi Agarwal, Shashank Ganta, Yunro Chung, Lusheng Song, Ji Qiu, Paulo Shakarian

    Abstract: Recent advances in experimental methods have enabled researchers to collect data on thousands of analytes simultaneously. This has led to correlational studies that associated molecular measurements with diseases such as Alzheimer's, Liver, and Gastric Cancer. However, the use of thousands of biomarkers selected from the analytes is not practical for real-world medical diagnosis and is likely unde… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

  3. arXiv:2310.06835  [pdf, other

    cs.LG cs.AI cs.LO

    Scalable Semantic Non-Markovian Simulation Proxy for Reinforcement Learning

    Authors: Kaustuv Mukherji, Devendra Parkar, Lahari Pokala, Dyuman Aditya, Paulo Shakarian, Clark Dorman

    Abstract: Recent advances in reinforcement learning (RL) have shown much promise across a variety of applications. However, issues such as scalability, explainability, and Markovian assumptions limit its applicability in certain domains. We observe that many of these shortcomings emanate from the simulator as opposed to the RL training algorithms themselves. As such, we propose a semantic proxy for simulati… ▽ More

    Submitted 14 October, 2023; v1 submitted 10 October, 2023; originally announced October 2023.

    Comments: Submitted to 2024 IEEE International Conference on Semantic Computing

  4. arXiv:2308.14250  [pdf, other

    cs.LG cs.AI cs.LO

    Rule-Based Error Detection and Correction to Operationalize Movement Trajectory Classification

    Authors: Bowen Xi, Kevin Scaria, Paulo Shakarian

    Abstract: Classification of movement trajectories has many applications in transportation. Supervised neural models represent the current state-of-the-art. Recent security applications require this task to be rapidly employed in environments that may differ from the data used to train such models for which there is little training data. We provide a neuro-symbolic rule-based framework to conduct error corre… ▽ More

    Submitted 30 April, 2024; v1 submitted 27 August, 2023; originally announced August 2023.

  5. arXiv:2308.11189  [pdf, other

    cs.CL cs.AI cs.LG

    Diversity Measures: Domain-Independent Proxies for Failure in Language Model Queries

    Authors: Noel Ngu, Nathaniel Lee, Paulo Shakarian

    Abstract: Error prediction in large language models often relies on domain-specific information. In this paper, we present measures for quantification of error in the response of a large language model based on the diversity of responses to a given prompt - hence independent of the underlying application. We describe how three such measures - based on entropy, Gini impurity, and centroid distance - can be e… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Report number: Accepted to IEEE ICSC '24

  6. arXiv:2302.13814  [pdf, other

    cs.CL cs.AI cs.LG

    An Independent Evaluation of ChatGPT on Mathematical Word Problems (MWP)

    Authors: Paulo Shakarian, Abhinav Koyyalamudi, Noel Ngu, Lakshmivihari Mareedu

    Abstract: We study the performance of a commercially available large language model (LLM) known as ChatGPT on math word problems (MWPs) from the dataset DRAW-1K. To our knowledge, this is the first independent evaluation of ChatGPT. We found that ChatGPT's performance changes dramatically based on the requirement to show its work, failing 20% of the time when it provides work compared with 84% when it does… ▽ More

    Submitted 27 February, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

    Journal ref: AAAI Spring Symposium 2023 (MAKE)

  7. arXiv:2302.13482  [pdf, other

    cs.LO cs.AI cs.PL

    PyReason: Software for Open World Temporal Logic

    Authors: Dyuman Aditya, Kaustuv Mukherji, Srikar Balasubramanian, Abhiraj Chaudhary, Paulo Shakarian

    Abstract: The growing popularity of neuro symbolic reasoning has led to the adoption of various forms of differentiable (i.e., fuzzy) first order logic. We introduce PyReason, a software framework based on generalized annotated logic that both captures the current cohort of differentiable logics and temporal extensions to support inference over finite periods of time with capabilities for open world reasoni… ▽ More

    Submitted 4 March, 2023; v1 submitted 26 February, 2023; originally announced February 2023.

    Comments: Equal contributions from first two authors. Accepted at 2023 AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering (AAAI: MAKE)

  8. arXiv:2302.12195  [pdf, other

    cs.AI

    Extensions to Generalized Annotated Logic and an Equivalent Neural Architecture

    Authors: Paulo Shakarian, Gerardo I. Simari

    Abstract: While deep neural networks have led to major advances in image recognition, language translation, data mining, and game playing, there are well-known limits to the paradigm such as lack of explainability, difficulty of incorporating prior knowledge, and modularity. Neuro symbolic hybrid systems have recently emerged as a straightforward way to extend deep neural networks by incorporating ideas fro… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Comments: Accepted to IEEE TransAI, 2022

  9. arXiv:2209.15067  [pdf, ps, other

    cs.AI

    Reasoning about Complex Networks: A Logic Programming Approach

    Authors: Paulo Shakarian, Gerardo I. Simari, Devon Callahan

    Abstract: Reasoning about complex networks has in recent years become an important topic of study due to its many applications: the adoption of commercial products, spread of disease, the diffusion of an idea, etc. In this paper, we present the MANCaLog language, a formalism based on logic programming that satisfies a set of desiderata proposed in previous work as recommendations for the development of appr… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:1301.0302

  10. arXiv:2001.04624  [pdf, other

    cs.SI

    A Feature-Driven Approach for Identifying Pathogenic Social Media Accounts

    Authors: Hamidreza Alvari, Ghazaleh Beigi, Soumajyoti Sarkar, Scott W. Ruston, Steven R. Corman, Hasan Davulcu, Paulo Shakarian

    Abstract: Over the past few years, we have observed different media outlets' attempts to shift public opinion by framing information to support a narrative that facilitate their goals. Malicious users referred to as "pathogenic social media" (PSM) accounts are more likely to amplify this phenomena by spreading misinformation to viral proportions. Understanding the spread of misinformation from account-level… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  11. arXiv:1909.11592  [pdf, other

    cs.SI cs.CR

    Mining user interaction patterns in the darkweb to predict enterprise cyber incidents

    Authors: Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian

    Abstract: With rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of possible attacks in an attempt to defend conflict during competition. In this study, we attempt to build a framework that utilizes unconventional signals from the darkweb forums by leveraging the reply network structure of user interactions with… ▽ More

    Submitted 20 June, 2020; v1 submitted 24 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1811.06537

  12. arXiv:1909.02872  [pdf, other

    cs.SI physics.soc-ph

    Can social influence be exploited to compromise security: An online experimental evaluation

    Authors: Soumajyoti Sarkar, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju

    Abstract: Social media has enabled users and organizations to obtain information about technology usage like software usage and even security feature usage. However, on the dark side it has also allowed an adversary to potentially exploit the users in a manner to either obtain information from them or influence them towards decisions that might have malicious settings or intents. While there have been subst… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1909.01409

  13. Use of a controlled experiment and computational models to measure the impact of sequential peer exposures on decision making

    Authors: Soumajyoti Sarkar, Ashkan Aleali, Paulo Shakarian, Mika Armenta, Danielle Sanchez, Kiran Lakkaraju

    Abstract: It is widely believed that one's peers influence product adoption behaviors. This relationship has been linked to the number of signals a decision-maker receives in a social network. But it is unclear if these same principles hold when the pattern by which it receives these signals vary and when peer influence is directed towards choices which are not optimal. To investigate that, we manipulate so… ▽ More

    Submitted 5 June, 2020; v1 submitted 3 September, 2019; originally announced September 2019.

  14. arXiv:1905.01556  [pdf, other

    cs.SI cs.IR cs.LG

    Detecting Pathogenic Social Media Accounts without Content or Network Structure

    Authors: Elham Shaabani, Ruocheng Guo, Paulo Shakarian

    Abstract: The spread of harmful mis-information in social media is a pressing problem. We refer accounts that have the capability of spreading such information to viral proportions as "Pathogenic Social Media" accounts. These accounts include terrorist supporters accounts, water armies, and fake news writers. We introduce an unsupervised causality-based framework that also leverages label propagation. This… ▽ More

    Submitted 4 May, 2019; originally announced May 2019.

    Comments: 8 pages, 5 figures, International Conference on Data Intelligence and Security. arXiv admin note: text overlap with arXiv:1905.01553

  15. arXiv:1905.01553  [pdf, other

    cs.SI cs.IR cs.LG

    An End-to-End Framework to Identify Pathogenic Social Media Accounts on Twitter

    Authors: Elham Shaabani, Ashkan Sadeghi-Mobarakeh, Hamidreza Alvari, Paulo Shakarian

    Abstract: Pathogenic Social Media (PSM) accounts such as terrorist supporter accounts and fake news writers have the capability of spreading disinformation to viral proportions. Early detection of PSM accounts is crucial as they are likely to be key users to make malicious information "viral". In this paper, we adopt the causal inference framework along with graph-based metrics in order to distinguish PSMs… ▽ More

    Submitted 4 May, 2019; originally announced May 2019.

    Comments: 9 pages, 8 figures, International Conference on Data Intelligence and Security. arXiv admin note: text overlap with arXiv:1905.01556

  16. arXiv:1904.05161  [pdf, other

    cs.SI physics.soc-ph

    Understanding Information Flow in Cascades Using Network Motifs

    Authors: Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian

    Abstract: A growing set of applications consider the process of network formation by using subgraphs as a tool for generating the network topology. One of the pressing research challenges is thus to be able to use these subgraphs to understand the network topology of information cascades which ultimately paves the way to theorize about how information spreads over time. In this paper, we make the first atte… ▽ More

    Submitted 8 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1903.00862

  17. arXiv:1903.01693  [pdf, other

    cs.SI

    Less is More: Semi-Supervised Causal Inference for Detecting Pathogenic Users in Social Media

    Authors: Hamidreza Alvari, Elham Shaabani, Soumajyoti Sarkar, Ghazaleh Beigi, Paulo Shakarian

    Abstract: Recent years have witnessed a surge of manipulation of public opinion and political events by malicious social media actors. These users are referred to as "Pathogenic Social Media (PSM)" accounts. PSMs are key users in spreading misinformation in social media to viral proportions. These accounts can be either controlled by real users or automated bots. Identification of PSMs is thus of utmost imp… ▽ More

    Submitted 5 March, 2019; originally announced March 2019.

    Comments: Companion Proceedings of the 2019 World Wide Web Conference

  18. arXiv:1903.00862  [pdf, other

    cs.SI

    Using network motifs to characterize temporal network evolution leading to diffusion inhibition

    Authors: Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian

    Abstract: Network motifs are patterns of over-represented node interactions in a network which have been previously used as building blocks to understand various aspects of the social networks. In this paper, we use motif patterns to characterize the information diffusion process in social networks. We study the lifecycle of information cascades to understand what leads to saturation of growth in terms of c… ▽ More

    Submitted 3 March, 2019; originally announced March 2019.

  19. arXiv:1902.10366  [pdf, other

    cs.SI physics.soc-ph

    Leveraging Motifs to Model the Temporal Dynamics of Diffusion Networks

    Authors: Soumajyoti Sarkar, Hamidreza Alvari, Paulo Shakarian

    Abstract: Information diffusion mechanisms based on social influence models are mainly studied using likelihood of adoption when active neighbors expose a user to a message. The problem arises primarily from the fact that for the most part, this explicit information of who-exposed-whom among a group of active neighbors in a social network, before a susceptible node is infected is not available. In this pape… ▽ More

    Submitted 22 March, 2020; v1 submitted 27 February, 2019; originally announced February 2019.

  20. arXiv:1902.01970  [pdf, other

    cs.SI

    Hawkes Process for Understanding the Influence of Pathogenic Social Media Accounts

    Authors: Hamidreza Alvari, Paulo Shakarian

    Abstract: Over the past years, political events and public opinion on the Web have been allegedly manipulated by accounts dedicated to spreading disinformation and performing malicious activities on social media. These accounts hereafter referred to as "Pathogenic Social Media (PSM)" accounts, are often controlled by terrorist supporters, water armies or fake news writers and hence can pose threats to socia… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

    Comments: IEEE Conference on Data Intelligence and Security (ICDIS) 2019

  21. arXiv:1902.01577  [pdf, other

    cs.SI

    Detection of Violent Extremists in Social Media

    Authors: Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian

    Abstract: The ease of use of the Internet has enabled violent extremists such as the Islamic State of Iraq and Syria (ISIS) to easily reach large audience, build personal relationships and increase recruitment. Social media are primarily based on the reports they receive from their own users to mitigate the problem. Despite efforts of social media in suspending many accounts, this solution is not guaranteed… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

    Comments: IEEE Conference on Data Intelligence and Security (ICDIS) 2019

  22. arXiv:1811.06537  [pdf, other

    cs.SI

    Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums

    Authors: Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian

    Abstract: With rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of possible attacks in an attempt to defend conflict during competition. We use information from the darkweb forums by leveraging the reply network structure of user interactions with the goal of predicting enterprise cyber attacks. We use a suite o… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: 7 pages

  23. arXiv:1810.12906  [pdf, other

    cs.CR cs.LO

    Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data

    Authors: Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian

    Abstract: With the recent prevalence of darkweb/deepweb (D2web) sites specializing in the trade of exploit kits and malware, malicious actors have easy-access to a wide-range of tools that can empower their offensive capability. In this study, we apply concepts from causal reasoning, itemset mining, and logic programming on historical cryptocurrency-related cyber incidents with intelligence collected from o… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

  24. arXiv:1810.12492  [pdf, other

    cs.CR cs.AI

    DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks

    Authors: Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki

    Abstract: Recent incidents of data breaches call for organizations to proactively identify cyber attacks on their systems. Darkweb/Deepweb (D2web) forums and marketplaces provide environments where hackers anonymously discuss existing vulnerabilities and commercialize malicious software to exploit those vulnerabilities. These platforms offer security practitioners a threat intelligence environment that allo… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

  25. arXiv:1809.09331  [pdf, other

    cs.SI cs.AI cs.LG

    Early Identification of Pathogenic Social Media Accounts

    Authors: Hamidreza Alvari, Elham Shaabani, Paulo Shakarian

    Abstract: Pathogenic Social Media (PSM) accounts such as terrorist supporters exploit large communities of supporters for conducting attacks on social media. Early detection of these accounts is crucial as they are high likely to be key users in making a harmful message "viral". In this paper, we make the first attempt on utilizing causal inference to identify PSMs within a short time frame around their act… ▽ More

    Submitted 26 September, 2018; v1 submitted 25 September, 2018; originally announced September 2018.

    Comments: IEEE Intelligence and Security Informatics (ISI) 2018

  26. arXiv:1809.06050  [pdf, other

    cs.SI physics.soc-ph

    Understanding and forecasting lifecycle events in information cascades

    Authors: Soumajyoti Sarkar, Ruocheng Guo, Paulo Shakarian

    Abstract: Most social network sites allow users to reshare a piece of information posted by a user. As time progresses, the cascade of reshares grows, eventually saturating after a certain time period. While previous studies have focused heavily on one aspect of the cascade phenomenon, specifically predicting when the cascade would go viral, in this paper, we take a more holistic approach by analyzing the o… ▽ More

    Submitted 22 March, 2020; v1 submitted 17 September, 2018; originally announced September 2018.

    Journal ref: Social Network Analysis and Mining 7.1 (2017): 55

  27. arXiv:1806.09787  [pdf, ps, other

    cs.SI cs.AI

    Causal Inference for Early Detection of Pathogenic Social Media Accounts

    Authors: Hamidreza Alvari, Paulo Shakarian

    Abstract: Pathogenic social media accounts such as terrorist supporters exploit communities of supporters for conducting attacks on social media. Early detection of PSM accounts is crucial as they are likely to be key users in making a harmful message "viral". This paper overviews my recent doctoral work on utilizing causal inference to identify PSM accounts within a short time frame around their activity.… ▽ More

    Submitted 3 August, 2018; v1 submitted 26 June, 2018; originally announced June 2018.

    Comments: Doctoral Consortium - 2018 International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation

  28. arXiv:1801.09781  [pdf, other

    cs.CR cs.CY cs.SI

    Early Warnings of Cyber Threats in Online Discussions

    Authors: Anna Sapienza, Alessandro Bessi, Saranya Damodaran, Paulo Shakarian, Kristina Lerman, Emilio Ferrara

    Abstract: We introduce a system for automatically generating warnings of imminent or current cyber-threats. Our system leverages the communication of malicious actors on the darkweb, as well as activity of cyber security experts on social media platforms like Twitter. In a time period between September, 2016 and January, 2017, our method generated 661 alerts of which about 84% were relevant to current or im… ▽ More

    Submitted 29 January, 2018; originally announced January 2018.

    Journal ref: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp:667-674, 2017

  29. arXiv:1712.09133  [pdf, other

    cs.LG

    Strongly Hierarchical Factorization Machines and ANOVA Kernel Regression

    Authors: Ruocheng Guo, Hamidreza Alvari, Paulo Shakarian

    Abstract: High-order parametric models that include terms for feature interactions are applied to various data mining tasks, where ground truth depends on interactions of features. However, with sparse data, the high- dimensional parameters for feature interactions often face three issues: expensive computation, difficulty in parameter estimation and lack of structure. Previous work has proposed approaches… ▽ More

    Submitted 5 January, 2018; v1 submitted 25 December, 2017; originally announced December 2017.

    Comments: 9 pages, to appear in SDM'18

  30. arXiv:1705.10786  [pdf, other

    cs.LG cs.AI

    Semi-Supervised Learning for Detecting Human Trafficking

    Authors: Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

    Abstract: Human trafficking is one of the most atrocious crimes and among the challenging problems facing law enforcement which demands attention of global magnitude. In this study, we leverage textual data from the website "Backpage"- used for classified advertisement- to discern potential patterns of human trafficking activities which manifest online and identify advertisements of high interest to law enf… ▽ More

    Submitted 30 May, 2017; originally announced May 2017.

  31. arXiv:1705.02399  [pdf, other

    cs.SI

    Temporal Analysis of Influence to Predict Users' Adoption in Online Social Networks

    Authors: Ericsson Marin, Ruocheng Guo, Paulo Shakarian

    Abstract: Different measures have been proposed to predict whether individuals will adopt a new behavior in online social networks, given the influence produced by their neighbors. In this paper, we show one can achieve significant improvement over these standard measures, extending them to consider a pair of time constraints. These constraints provide a better proxy for social influence, showing a stronger… ▽ More

    Submitted 5 May, 2017; originally announced May 2017.

    Comments: 6 pages, 2 figures, 2017 International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS 2017). July 5 - 8, 2017

  32. arXiv:1608.02646  [pdf, other

    cs.SI physics.soc-ph

    Toward Early and Order-of-Magnitude Cascade Prediction in Social Networks

    Authors: Ruocheng Guo, Elham Shaabani, Abhinav Bhatnagar, Paulo Shakarian

    Abstract: When a piece of information (microblog, photograph, video, link, etc.) starts to spread in a social network, an important question arises: will it spread to viral proportions - where viral can be defined as an order-of-magnitude increase. However, several previous studies have established that cascade size and frequency are related through a power-law - which leads to a severe imbalance in this cl… ▽ More

    Submitted 8 August, 2016; originally announced August 2016.

    Comments: 27 pages, 17 figures, accepted by SNAM (Social Network Analysis and Mining)

  33. arXiv:1607.08691  [pdf, other

    cs.LG stat.ML

    A Non-Parametric Learning Approach to Identify Online Human Trafficking

    Authors: Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

    Abstract: Human trafficking is among the most challenging law enforcement problems which demands persistent fight against from all over the globe. In this study, we leverage readily available data from the website "Backpage"-- used for classified advertisement-- to discern potential patterns of human trafficking activities which manifest online and identify most likely trafficking related advertisements. Du… ▽ More

    Submitted 1 August, 2016; v1 submitted 29 July, 2016; originally announced July 2016.

    Comments: Accepted in IEEE Intelligence and Security Informatics 2016 Conference (ISI 2016)

  34. arXiv:1607.08583  [pdf, other

    cs.CR cs.AI cs.CY

    Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

    Authors: Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian

    Abstract: In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining informa… ▽ More

    Submitted 28 July, 2016; originally announced July 2016.

    Comments: 6 page paper accepted to be presented at IEEE Intelligence and Security Informatics 2016 Tucson, Arizona USA September 27-30, 2016

  35. arXiv:1607.08580  [pdf

    cs.AI cs.CY

    MIST: Missing Person Intelligence Synthesis Toolkit

    Authors: Elham Shaabani, Hamidreza Alvari, Paulo Shakarian, J. E. Kelly Snyder

    Abstract: Each day, approximately 500 missing persons cases occur that go unsolved/unresolved in the United States. The non-profit organization known as the Find Me Group (FMG), led by former law enforcement professionals, is dedicated to solving or resolving these cases. This paper introduces the Missing Person Intelligence Synthesis Toolkit (MIST) which leverages a data-driven variant of geospatial abduct… ▽ More

    Submitted 29 August, 2016; v1 submitted 28 July, 2016; originally announced July 2016.

    Comments: 10 pages, 12 figures, Accepted in CIKM 2016

    ACM Class: I.2.1; J.4; G.1.6

  36. arXiv:1607.07903  [pdf, other

    cs.CR cs.LG

    Product Offerings in Malicious Hacker Markets

    Authors: Ericsson Marin, Ahmad Diab, Paulo Shakarian

    Abstract: Marketplaces specializing in malicious hacking products - including malware and exploits - have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combination of manual labeling and unsupervised clustering, we examine a corpus of products in order to understand their various categories… ▽ More

    Submitted 26 July, 2016; originally announced July 2016.

    Comments: 3 pages, 1 figure, 3 tables. Accepted for publication in IEEE Intelligence and Security Informatics (ISI2016)

  37. arXiv:1607.02171  [pdf, other

    cs.AI

    Argumentation Models for Cyber Attribution

    Authors: Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef

    Abstract: A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. It is one of the most important technical and policy challenges in cyber-security. The lack of ground truth for an individual responsible for an attack has limited previous studies. In this paper, we take a first step towards overcoming this l… ▽ More

    Submitted 7 July, 2016; originally announced July 2016.

    Comments: 8 pages paper to be presented at International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI) 2016 In conjunction with ASONAM 2016 San Francisco, CA, USA, August 19-20, 2016

  38. arXiv:1607.00720  [pdf, other

    cs.SI physics.soc-ph

    An Empirical Evaluation Of Social Influence Metrics

    Authors: Nikhil Kumar, Ruocheng Guo, Ashkan Aleali, Paulo Shakarian

    Abstract: Predicting when an individual will adopt a new behavior is an important problem in application domains such as marketing and public health. This paper examines the perfor- mance of a wide variety of social network based measurements proposed in the literature - which have not been previously compared directly. We study the probability of an individual becoming influenced based on measurements deri… ▽ More

    Submitted 23 July, 2016; v1 submitted 3 July, 2016; originally announced July 2016.

    Comments: 8 pages, 5 figures

  39. arXiv:1606.05730  [pdf, other

    cs.SI physics.soc-ph

    A Comparison of Methods for Cascade Prediction

    Authors: Ruocheng Guo, Paulo Shakarian

    Abstract: Information cascades exist in a wide variety of platforms on Internet. A very important real-world problem is to identify which information cascades can go viral. A system addressing this problem can be used in a variety of applications including public health, marketing and counter-terrorism. As a cascade can be considered as compound of the social network and the time series. However, in related… ▽ More

    Submitted 18 June, 2016; originally announced June 2016.

    Comments: 8 pages, 29 figures, ASONAM 2016 (Industry Track)

  40. arXiv:1508.03965  [pdf, other

    cs.SI physics.soc-ph

    Early Identification of Violent Criminal Gang Members

    Authors: Elham Shaabani, Ashkan Aleali, Paulo Shakarian, John Bertetto

    Abstract: Gang violence is a major problem in the United States accounting for a large fraction of homicides and other violent crime. In this paper, we study the problem of early identification of violent gang members. Our approach relies on modified centrality measures that take into account additional data of the individuals in the social network of co-arrestees which together with other arrest metadata p… ▽ More

    Submitted 17 August, 2015; originally announced August 2015.

    Comments: SIGKDD 2015

    ACM Class: J.4

  41. arXiv:1508.03371  [pdf, other

    cs.SI physics.soc-ph

    Toward Order-of-Magnitude Cascade Prediction

    Authors: Ruocheng Guo, Elham Shaabani, Abhinav Bhatnagar, Paulo Shakarian

    Abstract: When a piece of information (microblog, photograph, video, link, etc.) starts to spread in a social network, an important question arises: will it spread to "viral" proportions -- where "viral" is defined as an order-of-magnitude increase. However, several previous studies have established that cascade size and frequency are related through a power-law - which leads to a severe imbalance in this c… ▽ More

    Submitted 13 August, 2015; originally announced August 2015.

    Comments: 4 pages, 15 figures, ASONAM 2015 poster paper

  42. arXiv:1508.01192  [pdf, other

    cs.CY cs.AI

    Mining for Causal Relationships: A Data-Driven Study of the Islamic State

    Authors: Andrew Stanton, Amanda Thart, Ashish Jain, Priyank Vyas, Arpan Chatterjee, Paulo Shakarian

    Abstract: The Islamic State of Iraq and al-Sham (ISIS) is a dominant insurgent group operating in Iraq and Syria that rose to prominence when it took over Mosul in June, 2014. In this paper, we present a data-driven approach to analyzing this group using a dataset consisting of 2200 incidents of military activity surrounding ISIS and the forces that oppose it (including Iraqi, Syrian, and the American-led c… ▽ More

    Submitted 5 August, 2015; originally announced August 2015.

    Journal ref: Final version presented at KDD 2015

  43. arXiv:1507.01930  [pdf, other

    cs.CR

    Malware Task Identification: A Data Driven Approach

    Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch

    Abstract: Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - includin… ▽ More

    Submitted 7 July, 2015; originally announced July 2015.

    Comments: 8 pages full paper, accepted FOSINT-SI (2015)

  44. arXiv:1507.01922  [pdf, other

    cs.CR

    Cyber-Deception and Attribution in Capture-the-Flag Exercises

    Authors: Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little

    Abstract: Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is known. In this work, we use various clas… ▽ More

    Submitted 7 July, 2015; originally announced July 2015.

    Comments: 4 pages Short name accepted to FOSINT-SI 2015

  45. arXiv:1501.05990  [pdf

    cs.CY cs.CR

    Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks

    Authors: Jana Shakarian, Paulo Shakarian, Andrew Ruef

    Abstract: We hear it all too often in the media: an organization is attacked, its data, often containing personally identifying information, is made public, and a hacking group emerges to claim credit. In this excerpt, we discuss how such groups operate and describe the details of a few major cyber-attacks of this sort in the wider context of how they occurred. We feel that understanding how such groups hav… ▽ More

    Submitted 23 January, 2015; originally announced January 2015.

  46. arXiv:1404.6699  [pdf, ps, other

    cs.CR cs.AI cs.LO

    An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare

    Authors: Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons, Marcelo A. Falappa

    Abstract: Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and source tracking) and conventional intelligence sources (i.e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence. In this paper, we introduce a formal re… ▽ More

    Submitted 26 April, 2014; originally announced April 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1401.1475

  47. arXiv:1401.1475  [pdf, ps, other

    cs.LO cs.AI

    Belief Revision in Structured Probabilistic Argumentation

    Authors: Paulo Shakarian, Gerardo I. Simari, Marcelo A. Falappa

    Abstract: In real-world applications, knowledge bases consisting of all the information at hand for a specific domain, along with the current state of affairs, are bound to contain contradictory data coming from different sources, as well as data with varying degrees of uncertainty attached. Likewise, an important aspect of the effort associated with maintaining knowledge bases is deciding what information… ▽ More

    Submitted 7 January, 2014; originally announced January 2014.

  48. arXiv:1401.1086  [pdf, other

    cs.CR cs.MA physics.soc-ph

    Power Grid Defense Against Malicious Cascading Failure

    Authors: Paulo Shakarian, Hansheng Lei, Roy Lindelauf

    Abstract: An adversary looking to disrupt a power grid may look to target certain substations and sources of power generation to initiate a cascading failure that maximizes the number of customers without electricity. This is particularly an important concern when the enemy has the capability to launch cyber-attacks as practical concerns (i.e. avoiding disruption of service, presence of legacy systems, etc.… ▽ More

    Submitted 6 January, 2014; originally announced January 2014.

  49. arXiv:1309.6450  [pdf

    cs.CR cs.CY

    The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine

    Authors: Paulo Shakarian, Jana Shakarian, Andrew Ruef

    Abstract: Along with the USA and Russia, China is often considered one of the leading cyber-powers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990s, influenced their cyber-operations in the early 2000s. In particular, we examine the ideas of "Unrestricted Warfare" and "Active Offense" and discuss how they can permit for the theft of intellectual property. We the… ▽ More

    Submitted 25 September, 2013; originally announced September 2013.

    Comments: This is an excerpt from the upcoming book Introduction to Cyber-Warfare: A Multidisciplinary Approach published by Syngress (ISBN: 978-0124078147)

  50. arXiv:1309.2963  [pdf, other

    cs.SI physics.soc-ph

    A Scalable Heuristic for Viral Marketing Under the Tip** Model

    Authors: Paulo Shakarian, Sean Eyre, Damon Paulo

    Abstract: In a "tip**" model, each node in a social network, representing an individual, adopts a property or behavior if a certain number of his incoming neighbors currently exhibit the same. In viral marketing, a key problem is to select an initial "seed" set from the network such that the entire network adopts any behavior given to the seed. Here we introduce a method for quickly finding seed sets that… ▽ More

    Submitted 11 September, 2013; originally announced September 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1205.4431