Artificial intelligence in the cyber domain: Offense and defense

TC Truong, QB Diep, I Zelinka - Symmetry, 2020 - mdpi.com
Artificial intelligence techniques have grown rapidly in recent years, and their applications in
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …

Recasting self-attention with holographic reduced representations

MM Alam, E Raff, S Biderman… - … on Machine Learning, 2023 - proceedings.mlr.press
In recent years, self-attention has become the dominant paradigm for sequence modeling in
a variety of domains. However, in domains with very long sequence lengths the $\mathcal …

AlcoR: alignment-free simulation, map**, and visualization of low-complexity regions in biological data

JM Silva, W Qi, AJ Pinho, D Pratas - GigaScience, 2023 - academic.oup.com
Background Low-complexity data analysis is the area that addresses the search and
quantification of regions in sequences of elements that contain low-complexity or repetitive …

A review of the emotion recognition model of robots

M Zhao, L Gong, AS Din - Applied Intelligence, 2025 - Springer
Being able to experience emotions is a defining characteristic of machine intelligence, and
the first step in giving robots emotions is to enable them to accurately recognize and …

[HTML][HTML] A compression-based method for detecting anomalies in textual data

G de la Torre-Abaitua, LF Lago-Fernández, D Arroyo - Entropy, 2021 - mdpi.com
Nowadays, information and communications technology systems are fundamental assets of
our social and economical model, and thus they should be properly protected against the …

Skynet: a cyber-aware intrusion tolerant overseer

T Freitas, J Soares, ME Correia… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
The increasing level of sophistication of cyber attacks which are employing cross-cutting
strategies that leverage multi-domain attack surfaces, including but not limited to, software …

Faster classification using compression analytics

C Ting, N Johnson, U Onunkwo… - … Conference on Data …, 2021 - ieeexplore.ieee.org
Compression analytics have gained recent interest for application in malware classification
and digital forensics. This interest is due to the fact that compression analytics rely on …

Neural Normalized Compression Distance and the Disconnect Between Compression and Classification

J Hurwitz, C Nicholas, E Raff - arxiv preprint arxiv:2410.15280, 2024 - arxiv.org
It is generally well understood that predictive classification and compression are intrinsically
related concepts in information theory. Indeed, many deep learning methods are explained …

A Complexity-Informed Approach to Optimise Cyber Defences

L Alevizos - arxiv preprint arxiv:2501.15578, 2025 - arxiv.org
This paper introduces a novel complexity-informed approach to cybersecurity management,
addressing the challenges found within complex cyber defences. We adapt and extend the …

[HTML][HTML] Anomaly detection for individual sequences with applications in identifying malicious tools

S Siboni, A Cohen - Entropy, 2020 - mdpi.com
Anomaly detection refers to the problem of identifying abnormal behaviour within a set of
measurements. In many cases, one has some statistical model for normal data, and wishes …