Skip to main content

Showing 1–7 of 7 results for author: Nicol, M

Searching in archive cs. Search in all archives.
.
  1. Auto-SGCR: Automated Generation of Smart Grid Cyber Range Using IEC 61850 Standard Models

    Authors: Muhammad M. Roomi, S. M. Suhail Hussain, Ee-Chien Chang, David M. Nicol, Daisuke Mashima

    Abstract: Digitalization of power grids have made them increasingly susceptible to cyber-attacks in the past decade. Iterative cybersecurity testing is indispensable to counter emerging attack vectors and to ensure dependability of critical infrastructure. Furthermore, these can be used to evaluate cybersecurity configuration, effectiveness of the cybersecurity measures against various attack vectors, as we… ▽ More

    Submitted 24 July, 2025; originally announced July 2025.

    Comments: 12 pages

  2. arXiv:2301.05220  [pdf, other

    cs.CL cs.AI cs.LG

    Adversarial Adaptation for French Named Entity Recognition

    Authors: Arjun Choudhry, Inder Khatri, Pankaj Gupta, Aaryan Gupta, Maxime Nicol, Marie-Jean Meurs, Dinesh Kumar Vishwakarma

    Abstract: Named Entity Recognition (NER) is the task of identifying and classifying named entities in large-scale texts into predefined classes. NER in French and other relatively limited-resource languages cannot always benefit from approaches proposed for languages like English due to a dearth of large, robust datasets. In this paper, we present our work that aims to mitigate the effects of this dearth of… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

    Comments: Preprint version of short paper accepted for the ECIR 2023 conference

  3. arXiv:2212.03692  [pdf, other

    cs.CL

    Transformer-Based Named Entity Recognition for French Using Adversarial Adaptation to Similar Domain Corpora

    Authors: Arjun Choudhry, Pankaj Gupta, Inder Khatri, Aaryan Gupta, Maxime Nicol, Marie-Jean Meurs, Dinesh Kumar Vishwakarma

    Abstract: Named Entity Recognition (NER) involves the identification and classification of named entities in unstructured text into predefined classes. NER in languages with limited resources, like French, is still an open problem due to the lack of large, robust, labelled datasets. In this paper, we propose a transformer-based NER approach for French using adversarial adaptation to similar domain or genera… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

    Comments: Author version of Student Abstract to appear in AAAI 2023 - Student Abstract and Poster Program

  4. arXiv:2011.09436  [pdf, ps, other

    cs.CR cs.AI eess.SY stat.AP

    Assessment of System-Level Cyber Attack Vulnerability for Connected and Autonomous Vehicles Using Bayesian Networks

    Authors: Gurcan Comert, Mashrur Chowdhury, David M. Nicol

    Abstract: This study presents a methodology to quantify vulnerability of cyber attacks and their impacts based on probabilistic graphical models for intelligent transportation systems under connected and autonomous vehicles framework. Cyber attack vulnerabilities from various types and their impacts are calculated for intelligent signals and cooperative adaptive cruise control (CACC) applications based on t… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: 21 pages, 14 figures

  5. arXiv:1809.09487  [pdf, other

    cs.NI

    Network Coding for Critical Infrastructure Networks

    Authors: Rakesh Kumar, Vignesh Babu, David M. Nicol

    Abstract: The applications in the critical infrastructure systems pose simultaneous resilience and performance requirements to the underlying computer network. To meet such requirements, the networks that use the store-and-forward paradigm poses stringent conditions on the redundancy in the network topology and results in problems that becoming computationally challenging to solve at scale. However, with th… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

  6. arXiv:1803.05853  [pdf, other

    cs.CV math.OC

    Calculating the Midsagittal Plane for Symmetrical Bilateral Shapes: Applications to Clinical Facial Surgical Planning

    Authors: Aarti Jajoo, Matthew Nicol, Jaime Gateno, Ken-Chung Chen, Zhen Tang, Tasadduk Chowdhury, Jainfu Li, Steve Goufang Shen, James J. Xia

    Abstract: It is difficult to estimate the midsagittal plane of human subjects with craniomaxillofacial (CMF) deformities. We have developed a LAndmark GEometric Routine (LAGER), which automatically estimates a midsagittal plane for such subjects. The LAGER algorithm was based on the assumption that the optimal midsagittal plane of a patient with a deformity is the premorbid midsagittal plane of the patient… ▽ More

    Submitted 10 March, 2018; originally announced March 2018.

  7. arXiv:1405.7475  [pdf, other

    cs.CR

    Automatic Generation of Security Argument Graphs

    Authors: Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders

    Abstract: Graph-based assessment formalisms have proven to be useful in the safety, dependability, and security communities to help stakeholders manage risk and maintain appropriate documentation throughout the system lifecycle. In this paper, we propose a set of methods to automatically construct security argument graphs, a graphical formalism that integrates various security-related information to argue a… ▽ More

    Submitted 29 May, 2014; originally announced May 2014.

    Comments: 10 pages, 8 figures, 1 table and 2 algorithms