Skip to main content

Showing 1–21 of 21 results for author: Abdelsalam, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.17190  [pdf, other

    cs.CR

    SoK: Leveraging Transformers for Malware Analysis

    Authors: Pradip Kunwar, Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Elisa Bertino

    Abstract: The introduction of transformers has been an important breakthrough for AI research and application as transformers are the foundation behind Generative AI. A promising application domain for transformers is cybersecurity, in particular the malware domain analysis. The reason is the flexibility of the transformer models in handling long sequential features and understanding contextual relationship… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2405.01728  [pdf, other

    cs.CR

    Explainability Guided Adversarial Evasion Attacks on Malware Detectors

    Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh

    Abstract: As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical. In the malware domain, this adversarial sample generation relies heavily on the accuracy and placement of crafted perturbation with the goal of evading a trained classifier. This work focuses on applying explainabilit… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  3. arXiv:2403.06428  [pdf, other

    cs.CR

    Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File

    Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh

    Abstract: Windows malware is predominantly available in cyberspace and is a prime target for deliberate adversarial evasion attacks. Although researchers have investigated the adversarial malware attack problem, a multitude of important questions remain unanswered, including (a) Are the existing techniques to inject adversarial perturbations in Windows Portable Executable (PE) malware files effective enough… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  4. arXiv:2402.09097  [pdf, other

    cs.RO cs.AI eess.SY

    A Digital Twin prototype for traffic sign recognition of a learning-enabled autonomous vehicle

    Authors: Mohamed AbdElSalam, Loai Ali, Saddek Bensalem, Weicheng He, Panagiotis Katsaros, Nikolaos Kekatos, Doron Peled, Anastasios Temperekidis, Changshun Wu

    Abstract: In this paper, we present a novel digital twin prototype for a learning-enabled self-driving vehicle. The primary objective of this digital twin is to perform traffic sign recognition and lane kee**. The digital twin architecture relies on co-simulation and uses the Functional Mock-up Interface and SystemC Transaction Level Modeling standards. The digital twin consists of four clients, i) a vehi… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  5. arXiv:2310.08312  [pdf, other

    cs.CV cs.LG

    GePSAn: Generative Procedure Step Anticipation in Cooking Videos

    Authors: Mohamed Ashraf Abdelsalam, Samrudhdhi B. Rangrej, Isma Hadji, Nikita Dvornik, Konstantinos G. Derpanis, Afsaneh Fazly

    Abstract: We study the problem of future step anticipation in procedural videos. Given a video of an ongoing procedural activity, we predict a plausible next procedure step described in rich natural language. While most previous work focus on the problem of data scarcity in procedural video datasets, another core challenge of future anticipation is how to account for multiple plausible future realizations i… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: published at ICCV 2023

  6. arXiv:2303.01679  [pdf, other

    cs.CR

    Automated Machine Learning for Deep Learning based Malware Detection

    Authors: Austin Brown, Maanak Gupta, Mahmoud Abdelsalam

    Abstract: Deep learning (DL) has proven to be effective in detecting sophisticated malware that is constantly evolving. Even though deep learning has alleviated the feature engineering problem, finding the most optimal DL model, in terms of neural architecture search (NAS) and the model's optimal set of hyper-parameters, remains a challenge that requires domain expertise. In addition, many of the proposed s… ▽ More

    Submitted 3 November, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

  7. arXiv:2301.01044  [pdf, other

    cs.CR

    Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector

    Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam

    Abstract: With the increase in machine learning (ML) applications in different domains, incentives for deceiving these models have reached more than ever. As data is the core backbone of ML algorithms, attackers shifted their interest toward polluting the training data. Data credibility is at even higher risk with the rise of state-of-art research topics like open design principles, federated learning, and… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

  8. arXiv:2210.14862  [pdf, other

    cs.CV cs.CL cs.LG

    Visual Semantic Parsing: From Images to Abstract Meaning Representation

    Authors: Mohamed Ashraf Abdelsalam, Zhan Shi, Federico Fancellu, Kalliopi Basioti, Dhaivat J. Bhatt, Vladimir Pavlovic, Afsaneh Fazly

    Abstract: The success of scene graphs for visual scene understanding has brought attention to the benefits of abstracting a visual input (e.g., image) into a structured representation, where entities (people and objects) are nodes connected by edges specifying their relations. Building these representations, however, requires expensive manual annotation in the form of images paired with their scene graphs o… ▽ More

    Submitted 27 October, 2022; v1 submitted 26 October, 2022; originally announced October 2022.

    Comments: published in CoNLL 2022

  9. arXiv:2208.04891  [pdf, other

    cs.CR

    Online Malware Classification with System-Wide System Calls in Cloud IaaS

    Authors: Phillip Brown, Austin Brown, Maanak Gupta, Mahmoud Abdelsalam

    Abstract: Accurately classifying malware in an environment allows the creation of better response and remediation strategies by cyber analysts. However, classifying malware in a live environment is a difficult task due to the large number of system data sources. Collecting statistics from these separate sources and processing them together in a form that can be used by a machine learning model is difficult.… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: Accepted at the IEEE 23rd International Conference on Information Reuse and Integration for Data Science

  10. arXiv:2207.04354  [pdf, other

    cs.LG cs.AI

    An Introduction to Lifelong Supervised Learning

    Authors: Shagun Sodhani, Mojtaba Faramarzi, Sanket Vaibhav Mehta, Pranshu Malviya, Mohamed Abdelsalam, Janarthanan Janarthanan, Sarath Chandar

    Abstract: This primer is an attempt to provide a detailed summary of the different facets of lifelong learning. We start with Chapter 2 which provides a high-level overview of lifelong learning systems. In this chapter, we discuss prominent scenarios in lifelong learning (Section 2.4), provide 8 Introduction a high-level organization of different lifelong learning approaches (Section 2.5), enumerate the des… ▽ More

    Submitted 12 July, 2022; v1 submitted 9 July, 2022; originally announced July 2022.

    Comments: Lifelong Learning Primer

  11. arXiv:2207.01739  [pdf, other

    cs.CR cs.LG

    Machine Learning in Access Control: A Taxonomy and Survey

    Authors: Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu

    Abstract: An increasing body of work has recognized the importance of exploiting machine learning (ML) advancements to address the need for efficient automation in extracting access control attributes, policy mining, policy verification, access decisions, etc. In this work, we survey and summarize various ML approaches to solve different access control problems. We propose a novel taxonomy of the ML model's… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

    Comments: Submitted to ACM Computing Survey

  12. arXiv:2203.12469  [pdf

    cs.CV astro-ph.IM cs.LG eess.IV physics.geo-ph

    3D Adapted Random Forest Vision (3DARFV) for Untangling Heterogeneous-Fabric Exceeding Deep Learning Semantic Segmentation Efficiency at the Utmost Accuracy

    Authors: Omar Alfarisi, Zeyar Aung, Qingfeng Huang, Ashraf Al-Khateeb, Hamed Alhashmi, Mohamed Abdelsalam, Salem Alzaabi, Haifa Alyazeedi, Anthony Tzes

    Abstract: Planetary exploration depends heavily on 3D image data to characterize the static and dynamic properties of the rock and environment. Analyzing 3D images requires many computations, causing efficiency to suffer lengthy processing time alongside large energy consumption. High-Performance Computing (HPC) provides apparent efficiency at the expense of energy consumption. However, for remote explorati… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

  13. arXiv:2111.08223  [pdf, other

    cs.CR

    A Survey on Adversarial Attacks for Malware Analysis

    Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam

    Abstract: Machine learning has witnessed tremendous growth in its adoption and advancement in the last decade. The evolution of machine learning from traditional algorithms to modern deep learning architectures has shaped the way today's technology functions. Its unprecedented ability to discover knowledge/patterns from unstructured data and automate the decision-making process led to its application in wid… ▽ More

    Submitted 5 January, 2022; v1 submitted 15 November, 2021; originally announced November 2021.

    Comments: 48 Pages, 31 Figures, 11 Tables

  14. arXiv:2111.00099  [pdf, other

    cs.CR

    Autoencoder-based Anomaly Detection in Smart Farming Ecosystem

    Authors: Mary Adkisson, Jeffrey C Kimmel, Maanak Gupta, Mahmoud Abdelsalam

    Abstract: The inclusion of Internet of Things (IoT) devices is growing rapidly in all application domains. Smart Farming supports devices connected, and with the support of Internet, cloud or edge computing infrastructure provide remote control of watering and fertilization, real time monitoring of farm conditions, and provide solutions to more sustainable practices. This could involve using irrigation syst… ▽ More

    Submitted 29 October, 2021; originally announced November 2021.

  15. arXiv:2106.10619  [pdf, other

    cs.CL

    A Brief Study on the Effects of Training Generative Dialogue Models with a Semantic loss

    Authors: Prasanna Parthasarathi, Mohamed Abdelsalam, Joelle Pineau, Sarath Chandar

    Abstract: Neural models trained for next utterance generation in dialogue task learn to mimic the n-gram sequences in the training set with training objectives like negative log-likelihood (NLL) or cross-entropy. Such commonly used training objectives do not foster generating alternate responses to a context. But, the effects of minimizing an alternate training objective that fosters a model to generate alt… ▽ More

    Submitted 20 June, 2021; originally announced June 2021.

    Comments: Accepted at SIGDial 2021

  16. arXiv:2105.09268  [pdf, other

    cs.CR cs.AI

    Analyzing Machine Learning Approaches for Online Malware Detection in Cloud

    Authors: Jeffrey C Kimmell, Mahmoud Abdelsalam, Maanak Gupta

    Abstract: The variety of services and functionality offered by various cloud service providers (CSP) have exploded lately. Utilizing such services has created numerous opportunities for enterprises infrastructure to become cloud-based and, in turn, assisted the enterprises to easily and flexibly offer services to their customers. The practice of renting out access to servers to clients for computing and sto… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

  17. arXiv:2012.12477  [pdf, other

    cs.CV cs.AI cs.LG

    IIRC: Incremental Implicitly-Refined Classification

    Authors: Mohamed Abdelsalam, Mojtaba Faramarzi, Shagun Sodhani, Sarath Chandar

    Abstract: We introduce the "Incremental Implicitly-Refined Classi-fication (IIRC)" setup, an extension to the class incremental learning setup where the incoming batches of classes have two granularity levels. i.e., each sample could have a high-level (coarse) label like "bear" and a low-level (fine) label like "polar bear". Only one label is provided at a time, and the model has to figure out the other lab… ▽ More

    Submitted 11 January, 2021; v1 submitted 22 December, 2020; originally announced December 2020.

  18. arXiv:2009.11101  [pdf, other

    cs.CR

    AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce

    Authors: Maanak Gupta, Sudip Mittal, Mahmoud Abdelsalam

    Abstract: The use of Artificial Intelligence (AI) and Machine Learning (ML) to solve cybersecurity problems has been gaining traction within industry and academia, in part as a response to widespread malware attacks on critical systems, such as cloud infrastructures, government offices or hospitals, and the vast amounts of data they generate. AI- and ML-assisted cybersecurity offers data-driven automation t… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

  19. arXiv:2004.09246  [pdf, other

    cs.CY

    Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case

    Authors: Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal

    Abstract: Internet of Things is a revolutionary domain that has the caliber to impact our lives and bring significant changes to the world. Several IoT applications have been envisioned to facilitate data driven and smart application for the user. Smart City and Intelligent Transportation System (ITS) offer a futuristic vision of smart, secure and safe experience to the end user, and at the same time effici… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

  20. arXiv:2002.06383  [pdf, other

    cs.CR cs.LG stat.ML

    Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

    Authors: Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal

    Abstract: Cloud Infrastructure as a Service (IaaS) is vulnerable to malware due to its exposure to external adversaries, making it a lucrative attack vector for malicious actors. A datacenter infected with malware can cause data loss and/or major disruptions to service for its users. This paper analyzes and compares various Convolutional Neural Networks (CNNs) for online detection of malware in cloud IaaS.… ▽ More

    Submitted 15 February, 2020; originally announced February 2020.

  21. arXiv:1609.07750  [pdf, other

    cs.NE cs.LG

    Accurate and Efficient Hyperbolic Tangent Activation Function on FPGA using the DCT Interpolation Filter

    Authors: Ahmed M. Abdelsalam, J. M. Pierre Langlois, F. Cheriet

    Abstract: Implementing an accurate and fast activation function with low cost is a crucial aspect to the implementation of Deep Neural Networks (DNNs) on FPGAs. We propose a high-accuracy approximation approach for the hyperbolic tangent activation function of artificial neurons in DNNs. It is based on the Discrete Cosine Transform Interpolation Filter (DCTIF). The proposed architecture combines simple arit… ▽ More

    Submitted 25 September, 2016; originally announced September 2016.

    Comments: 8 pages, 6 figures, 5 tables, submitted for the 25th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (ISFPGA), 22-24 February 2017, California, USA