Skip to main content

Showing 1–5 of 5 results for author: Tabari, A

.
  1. arXiv:2403.00788  [pdf

    cs.CL cs.AI cs.HC cs.LG

    PRECISE Framework: GPT-based Text For Improved Readability, Reliability, and Understandability of Radiology Reports For Patient-Centered Care

    Authors: Satvik Tripathi, Liam Mutter, Meghana Muppuri, Suhani Dheer, Emiliano Garza-Frias, Komal Awan, Aakash Jha, Michael Dezube, Azadeh Tabari, Christopher P. Bridge, Dania Daye

    Abstract: This study introduces and evaluates the PRECISE framework, utilizing OpenAI's GPT-4 to enhance patient engagement by providing clearer and more accessible chest X-ray reports at a sixth-grade reading level. The framework was tested on 500 reports, demonstrating significant improvements in readability, reliability, and understandability. Statistical analyses confirmed the effectiveness of the PRECI… ▽ More

    Submitted 19 February, 2024; originally announced March 2024.

  2. arXiv:2401.17459  [pdf, ps, other

    cs.CR cs.AI

    A Preliminary Study on Using Large Language Models in Software Pentesting

    Authors: Kumar Shashwat, Francis Hahn, Xinming Ou, Dmitry Goldgof, Lawrence Hall, Jay Ligatti, S. Raj Rajgopalan, Armin Ziaie Tabari

    Abstract: Large language models (LLM) are perceived to offer promising potentials for automating security tasks, such as those found in security operation centers (SOCs). As a first step towards evaluating this perceived potential, we investigate the use of LLMs in software pentesting, where the main task is to automatically identify software security vulnerabilities in source code. We hypothesize that an L… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  3. arXiv:2112.10974  [pdf, other

    cs.CR cs.LG

    What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering

    Authors: Armin Ziaie Tabari, Xinming Ou, Anoop Singhal

    Abstract: The growing number of Internet of Things (IoT) devices makes it imperative to be aware of the real-world threats they face in terms of cybersecurity. While honeypots have been historically used as decoy devices to help researchers/organizations gain a better understanding of the dynamic of threats on a network and their impact, IoT devices pose a unique challenge for this purpose due to the variet… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: arXiv admin note: text overlap with arXiv:2003.01218

  4. arXiv:2012.13340  [pdf, other

    eess.IV cs.CV

    Joint super-resolution and synthesis of 1 mm isotropic MP-RAGE volumes from clinical MRI exams with scans of different orientation, resolution and contrast

    Authors: Juan Eugenio Iglesias, Benjamin Billot, Yael Balbastre, Azadeh Tabari, John Conklin, Daniel C. Alexander, Polina Golland, Brian L. Edlow, Bruce Fischl

    Abstract: Most existing algorithms for automatic 3D morphometry of human brain MRI scans are designed for data with near-isotropic voxels at approximately 1 mm resolution, and frequently have contrast constraints as well - typically requiring T1 scans (e.g., MP-RAGE). This limitation prevents the analysis of millions of MRI scans acquired with large inter-slice spacing ("thick slice") in clinical settings e… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

  5. arXiv:2003.01218  [pdf, other

    cs.CR

    A First Step Towards Understanding Real-world Attacks on IoT Devices

    Authors: Armin Ziaie Tabari, Xinming Ou

    Abstract: With the rapid growth of Internet of Things (IoT) devices, it is imperative to proactively understand the real-world cybersecurity threats posed to them. This paper describes our initial efforts towards building a honeypot ecosystem as a means to gathering and analyzing real attack data against IoT devices. A primary condition for a honeypot to yield useful insights is to let attackers believe the… ▽ More

    Submitted 2 March, 2020; originally announced March 2020.