Skip to main content

Showing 1–8 of 8 results for author: Aung, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.00465  [pdf, ps, other

    cs.CR

    HoneyWin: High-Interaction Windows Honeypot in Enterprise Environment

    Authors: Yan Lin Aung, Yee Loon Khoo, Davis Yang Zheng, Bryan Swee Duo, Sudipta Chattopadhyay, Jianying Zhou, Liming Lu, Weihan Goh

    Abstract: Windows operating systems (OS) are ubiquitous in enterprise Information Technology (IT) and operational technology (OT) environments. Due to their widespread adoption and known vulnerabilities, they are often the primary targets of malware and ransomware attacks. With 93% of the ransomware targeting Windows-based systems, there is an urgent need for advanced defensive mechanisms to detect, analyze… ▽ More

    Submitted 1 May, 2025; originally announced May 2025.

  2. arXiv:2502.09896  [pdf, other

    cs.CR

    ChatIoT: Large Language Model-based Security Assistant for Internet of Things with Retrieval-Augmented Generation

    Authors: Ye Dong, Yan Lin Aung, Sudipta Chattopadhyay, Jianying Zhou

    Abstract: Internet of Things (IoT) has gained widespread popularity, revolutionizing industries and daily life. However, it has also emerged as a prime target for attacks. Numerous efforts have been made to improve IoT security, and substantial IoT security and threat information, such as datasets and reports, have been developed. However, existing research often falls short in leveraging these insights to… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Comments: preprint, under revision, 19 pages, 13 figures, 8 tables

  3. arXiv:2502.08886  [pdf, other

    cs.CR cs.AI

    Generative AI for Internet of Things Security: Challenges and Opportunities

    Authors: Yan Lin Aung, Ivan Christian, Ye Dong, Xiaodong Ye, Sudipta Chattopadhyay, Jianying Zhou

    Abstract: As Generative AI (GenAI) continues to gain prominence and utility across various sectors, their integration into the realm of Internet of Things (IoT) security evolves rapidly. This work delves into an examination of the state-of-the-art literature and practical applications on how GenAI could improve and be applied in the security landscape of IoT. Our investigation aims to map the current state… ▽ More

    Submitted 12 February, 2025; originally announced February 2025.

  4. arXiv:2308.03671  [pdf, other

    cs.DL cs.AI

    SemOpenAlex: The Scientific Landscape in 26 Billion RDF Triples

    Authors: Michael Färber, David Lamprecht, Johan Krause, Linn Aung, Peter Haase

    Abstract: We present SemOpenAlex, an extensive RDF knowledge graph that contains over 26 billion triples about scientific publications and their associated entities, such as authors, institutions, journals, and concepts. SemOpenAlex is licensed under CC0, providing free and open access to the data. We offer the data through multiple channels, including RDF dump files, a SPARQL endpoint, and as a data source… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Comments: accepted at ISWC'23

  5. arXiv:2305.05187  [pdf, other

    cs.NE cs.AI cs.AR

    DeepFire2: A Convolutional Spiking Neural Network Accelerator on FPGAs

    Authors: Myat Thu Linn Aung, Daniel Gerlinghoff, Chuping Qu, Liwei Yang, Tian Huang, Rick Siow Mong Goh, Tao Luo, Weng-Fai Wong

    Abstract: Brain-inspired spiking neural networks (SNNs) replace the multiply-accumulate operations of traditional neural networks by integrate-and-fire neurons, with the goal of achieving greater energy efficiency. Specialized hardware implementations of those neurons clearly have advantages over general-purpose devices in terms of power and performance, but exhibit poor scalability when it comes to acceler… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  6. arXiv:2112.02164  [pdf, other

    eess.IV cs.CV

    Bridging the gap between prostate radiology and pathology through machine learning

    Authors: Indrani Bhattacharya, David S. Lim, Han Lin Aung, Xingchen Liu, Arun Seetharaman, Christian A. Kunder, Wei Shao, Simon J. C. Soerensen, Richard E. Fan, Pejman Ghanouni, Katherine J. To'o, James D. Brooks, Geoffrey A. Sonn, Mirabela Rusu

    Abstract: Prostate cancer is the second deadliest cancer for American men. While Magnetic Resonance Imaging (MRI) is increasingly used to guide targeted biopsies for prostate cancer diagnosis, its utility remains limited due to high rates of false positives and false negatives as well as low inter-reader agreements. Machine learning methods to detect and localize cancer on prostate MRI can help standardize… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: Indrani Bhattacharya and David S. Lim contributed equally as first authors. Geoffrey A. Sonn and Mirabela Rusu contributed equally as senior authors

  7. arXiv:2004.05471  [pdf, other

    eess.IV cs.CV

    Farmland Parcel Delineation Using Spatio-temporal Convolutional Networks

    Authors: Han Lin Aung, Burak Uzkent, Marshall Burke, David Lobell, Stefano Ermon

    Abstract: Farm parcel delineation provides cadastral data that is important in developing and managing climate change policies. Specifically, farm parcel delineation informs applications in downstream governmental policies of land allocation, irrigation, fertilization, green-house gases (GHG's), etc. This data can also be useful for the agricultural insurance sector for assessing compensations following dam… ▽ More

    Submitted 20 April, 2020; v1 submitted 11 April, 2020; originally announced April 2020.

  8. arXiv:1905.01027  [pdf, other

    cs.CR

    HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version)

    Authors: Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici

    Abstract: Internet of Things (IoT) devices have become ubiquitous and are spread across many application domains including the industry, transportation, healthcare, and households. However, the proliferation of the IoT devices has raised the concerns about their security, especially when observing that many manufacturers focus only on the core functionality of their products due to short time to market and… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.