Alert button
Picture for Kevin Choi

Kevin Choi

Alert button

Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space

Add code
Bookmark button
Alert button
Jan 02, 2024
Padmaksha Roy, Tyler Cody, Himanshu Singhal, Kevin Choi, Ming Jin

Figure 1 for Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space
Figure 2 for Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space
Figure 3 for Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space
Viaarxiv icon

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

Add code
Bookmark button
Alert button
Dec 04, 2023
Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen

Viaarxiv icon

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

Add code
Bookmark button
Alert button
Nov 28, 2023
Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty

Viaarxiv icon

A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention

Add code
Bookmark button
Alert button
Jun 06, 2023
Dhruv Nandakumar, Sathvik Murli, Ankur Khosla, Kevin Choi, Abdul Rahman, Drew Walsh, Scott Riede, Eric Dull, Edward Bowen

Figure 1 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 2 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 3 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Figure 4 for A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention
Viaarxiv icon

Thistle: A Vector Database in Rust

Add code
Bookmark button
Alert button
Mar 25, 2023
Brad Windsor, Kevin Choi

Viaarxiv icon

Zero Day Threat Detection Using Metric Learning Autoencoders

Add code
Bookmark button
Alert button
Nov 01, 2022
Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha

Figure 1 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 2 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 3 for Zero Day Threat Detection Using Metric Learning Autoencoders
Figure 4 for Zero Day Threat Detection Using Metric Learning Autoencoders
Viaarxiv icon

Anomaly Detection via Federated Learning

Add code
Bookmark button
Alert button
Oct 12, 2022
Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani

Figure 1 for Anomaly Detection via Federated Learning
Figure 2 for Anomaly Detection via Federated Learning
Figure 3 for Anomaly Detection via Federated Learning
Figure 4 for Anomaly Detection via Federated Learning
Viaarxiv icon

Lateral Movement Detection Using User Behavioral Analysis

Add code
Bookmark button
Alert button
Aug 29, 2022
Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

Figure 1 for Lateral Movement Detection Using User Behavioral Analysis
Figure 2 for Lateral Movement Detection Using User Behavioral Analysis
Figure 3 for Lateral Movement Detection Using User Behavioral Analysis
Figure 4 for Lateral Movement Detection Using User Behavioral Analysis
Viaarxiv icon

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

Add code
Bookmark button
Alert button
May 04, 2022
Christopher Redino, Dhruv Nandakumar, Robert Schiller, Kevin Choi, Abdul Rahman, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

Figure 1 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 2 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 3 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Figure 4 for Zero Day Threat Detection Using Graph and Flow Based Security Telemetry
Viaarxiv icon