-
Vis-SPLIT: Interactive Hierarchical Modeling for mRNA Expression Classification
Authors:
Braden Roper,
James C. Mathews,
Saad Nadeem,
Ji Hwan Park
Abstract:
We propose an interactive visual analytics tool, Vis-SPLIT, for partitioning a population of individuals into groups with similar gene signatures. Vis-SPLIT allows users to interactively explore a dataset and exploit visual separations to build a classification model for specific cancers. The visualization components reveal gene expression and correlation to assist specific partitioning decisions,…
▽ More
We propose an interactive visual analytics tool, Vis-SPLIT, for partitioning a population of individuals into groups with similar gene signatures. Vis-SPLIT allows users to interactively explore a dataset and exploit visual separations to build a classification model for specific cancers. The visualization components reveal gene expression and correlation to assist specific partitioning decisions, while also providing overviews for the decision model and clustered genetic signatures. We demonstrate the effectiveness of our framework through a case study and evaluate its usability with domain experts. Our results show that Vis-SPLIT can classify patients based on their genetic signatures to effectively gain insights into RNA sequencing data, as compared to an existing classification system.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Jo Wilder and the Capitol Case: A taxonomy of uses for a historical inquiry game in 4th grade Classrooms in Wisconsin
Authors:
Peter Wardrip,
David Gagnon,
James Mathews,
Jen Scianna
Abstract:
In this paper, we study the various ways 3rd-5th grade educators in Wisconsin utilized Jo Wilder and the Capitol Case, a historical inquiry game, as part of their classroom instruction. The 15 educators involved in the study were all grade school teachers in Wisconsin who took part in the "Doing History Fellowship" program, a professional development opportunity offered by the authors, designed to…
▽ More
In this paper, we study the various ways 3rd-5th grade educators in Wisconsin utilized Jo Wilder and the Capitol Case, a historical inquiry game, as part of their classroom instruction. The 15 educators involved in the study were all grade school teachers in Wisconsin who took part in the "Doing History Fellowship" program, a professional development opportunity offered by the authors, designed to increase their understanding of historical inquiry instruction and game-based learning. As part of the program, the educators planned and implemented the game within their own classroom context and reported their results back to the authors and other educators. Through their reports, surveys and semi-structured interviews we discovered the educators were motivated by five distinct instructional purposes, which influenced how the game was integrated into their curriculum. In this paper, we name and describe these five purposes. We see these findings as useful insights into how educators think about games and how educational video games and corresponding professional development activities may be designed in the future.
△ Less
Submitted 17 October, 2022;
originally announced October 2022.
-
A Deep Learning Approach to Create DNS Amplification Attacks
Authors:
Jared Mathews,
Prosenjit Chatterjee,
Shankar Banik,
Cory Nance
Abstract:
In recent years, deep learning has shown itself to be an incredibly valuable tool in cybersecurity as it helps network intrusion detection systems to classify attacks and detect new ones. Adversarial learning is the process of utilizing machine learning to generate a perturbed set of inputs to then feed to the neural network to misclassify it. Much of the current work in the field of adversarial l…
▽ More
In recent years, deep learning has shown itself to be an incredibly valuable tool in cybersecurity as it helps network intrusion detection systems to classify attacks and detect new ones. Adversarial learning is the process of utilizing machine learning to generate a perturbed set of inputs to then feed to the neural network to misclassify it. Much of the current work in the field of adversarial learning has been conducted in image processing and natural language processing with a wide variety of algorithms. Two algorithms of interest are the Elastic-Net Attack on Deep Neural Networks and TextAttack. In our experiment the EAD and TextAttack algorithms are applied to a Domain Name System amplification classifier. The algorithms are used to generate malicious Distributed Denial of Service adversarial examples to then feed as inputs to the network intrusion detection systems neural network to classify as valid traffic. We show in this work that both image processing and natural language processing adversarial learning algorithms can be applied against a network intrusion detection neural network.
△ Less
Submitted 28 June, 2022;
originally announced June 2022.
-
CoAP-DoS: An IoT Network Intrusion Dataset
Authors:
Jared Mathews,
Prosenjit Chatterjee,
Shankar Banik
Abstract:
The need for secure Internet of Things (IoT) devices is growing as IoT devices are becoming more integrated into vital networks. Many systems rely on these devices to remain available and provide reliable service. Denial of service attacks against IoT devices are a real threat due to the fact these low power devices are very susceptible to denial-of-service attacks. Machine learning enabled networ…
▽ More
The need for secure Internet of Things (IoT) devices is growing as IoT devices are becoming more integrated into vital networks. Many systems rely on these devices to remain available and provide reliable service. Denial of service attacks against IoT devices are a real threat due to the fact these low power devices are very susceptible to denial-of-service attacks. Machine learning enabled network intrusion detection systems are effective at identifying new threats, but they require a large amount of data to work well. There are many network traffic data sets but very few that focus on IoT network traffic. Within the IoT network data sets there is a lack of CoAP denial of service data. We propose a novel data set covering this gap. We develop a new data set by collecting network traffic from real CoAP denial of service attacks and compare the data on multiple different machine learning classifiers. We show that the data set is effective on many classifiers.
△ Less
Submitted 28 June, 2022;
originally announced June 2022.
-
An algorithmic approach to handle circular trading in commercial taxing system
Authors:
Jithin Mathews,
Priya Mehta,
S. V. Kasi Visweswara Rao,
Ch. Sobhan Babu
Abstract:
Tax manipulation comes in a variety of forms with different motivations and of varying complexities. In this paper, we deal with a specific technique used by tax-evaders known as circular trading. In particular, we define algorithms for the detection and analysis of circular trade. To achieve this, we have modelled the whole system as a directed graph with the actors being vertices and the transac…
▽ More
Tax manipulation comes in a variety of forms with different motivations and of varying complexities. In this paper, we deal with a specific technique used by tax-evaders known as circular trading. In particular, we define algorithms for the detection and analysis of circular trade. To achieve this, we have modelled the whole system as a directed graph with the actors being vertices and the transactions among them as directed edges. We illustrate the results obtained after running the proposed algorithm on the commercial tax dataset of the government of Telangana, India, which contains the transaction details of a set of participants involved in a known circular trade.
△ Less
Submitted 5 November, 2017; v1 submitted 30 October, 2017;
originally announced October 2017.
-
Security Toolbox for Detecting Novel and Sophisticated Android Malware
Authors:
Benjamin Holland,
Tom Deering,
Suresh Kothari,
Jon Mathews,
Nikhil Ranade
Abstract:
This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project. The adversarial challenge ("Red") teams in the DARPA APAC program are tasked with designing sophisticated malware to test the bounds of malware detection technology…
▽ More
This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project. The adversarial challenge ("Red") teams in the DARPA APAC program are tasked with designing sophisticated malware to test the bounds of malware detection technology being developed by the research and development ("Blue") teams. Our research group, a Blue team in the DARPA APAC program, proposed a "human-in-the-loop program analysis" approach to detect malware given the source or Java bytecode for an Android app. Our malware detection apparatus consists of two components: a general-purpose program analysis platform called Atlas, and a Security Toolbox built on the Atlas platform. This paper describes the major design goals, the Toolbox components to achieve the goals, and the workflow for auditing Android apps. The accompanying video (http://youtu.be/WhcoAX3HiNU) illustrates features of the Toolbox through a live audit.
△ Less
Submitted 7 April, 2015;
originally announced April 2015.