Alert-driven attack graph generation using s-pdfa

A Nadeem, S Verwer, S Moskal… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …

Learning deterministic weighted automata with queries and counterexamples

G Weiss, Y Goldberg, E Yahav - Advances in Neural …, 2019 - proceedings.neurips.cc
We present an algorithm for reconstruction of a probabilistic deterministic finite automaton
(PDFA) from a given black-box language model, such as a recurrent neural network (RNN) …

VL-MFL: UAV Visual Localization Based on Multi-Source Image Feature Learning

G Liu, C Li, S Zhang, Y Yuan - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Obtaining the Earth-fixed coordinates is a fundamental requirement for long-distance
unmanned aerial vehicle (UAV) flight. Global navigation satellite systems (GNSSs) are the …

An interdisciplinary comparison of sequence modeling methods for next-element prediction

N Tax, I Teinemaa, SJ van Zelst - Software and Systems Modeling, 2020 - Springer
Data of sequential nature arise in many application domains in the form of, eg, textual data,
DNA sequences, and software execution traces. Different research disciplines have …

Explaining black boxes on sequential data using weighted automata

S Ayache, R Eyraud, N Goudian - … on grammatical inference, 2019 - proceedings.mlr.press
Understanding how a learned black box works is of crucial interest for the future of Machine
Learning. In this paper, we pioneer the question of the global interpretability of learned black …

Benchmarking compositionality with formal languages

J Valvoda, N Saphra, J Rawski, A Williams… - arxiv preprint arxiv …, 2022 - arxiv.org
Recombining known primitive concepts into larger novel combinations is a quintessentially
human cognitive capability. Whether large neural models in NLP can acquire this ability …

Flexfringe: a passive automaton learning package

S Verwer, CA Hammerschmidt - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Finite state models, such as Mealy machines or state charts, are often used to express and
specify protocol and software behavior. Consequently, these models are often used in …

Sage: Intrusion alert-driven attack graph extractor

A Nadeem, S Verwer, SJ Yang - 2021 IEEE symposium on …, 2021 - ieeexplore.ieee.org
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a
network. State-of-the-art approaches for AG generation focus mostly on deriving …

Decision-guided weighted automata extraction from recurrent neural networks

X Zhang, X Du, X **e, L Ma, Y Liu, M Sun - Proceedings of the AAAI …, 2021 - ojs.aaai.org
Abstract Recurrent Neural Networks (RNNs) have demonstrated their effectiveness in
learning and processing sequential data (eg, speech and natural language). However, due …

TAYSIR Competition: Transformer+\textscrnn: Algorithms to Yield Simple and Interpretable Representations

R Eyraud, D Lambert, BT Joutei… - International …, 2023 - proceedings.mlr.press
This article presents the content of the competition Transformers+\textsc {rnn}: Algorithms to
Yield Simple and Interpretable Representations (TAYSIR, the Arabic word for 'simple') …