Skip to main content

Showing 1–20 of 20 results for author: Rathore, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.08803  [pdf, other

    cs.AI

    Advancing Perception in Artificial Intelligence through Principles of Cognitive Science

    Authors: Palaash Agrawal, Cheston Tan, Heena Rathore

    Abstract: Although artificial intelligence (AI) has achieved many feats at a rapid pace, there still exist open problems and fundamental shortcomings related to performance and resource efficiency. Since AI researchers benchmark a significant proportion of performance standards through human intelligence, cognitive sciences-inspired AI is a promising domain of research. Studying cognitive science can provid… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: Summary: a detailed review of the current state of perception models through the lens of cognitive AI

  2. arXiv:2212.13260  [pdf, other

    cs.LG cs.AI eess.SY q-bio.NC

    Novel Reinforcement Learning Algorithm for Suppressing Synchronization in Closed Loop Deep Brain Stimulators

    Authors: Harsh Agarwal, Heena Rathore

    Abstract: Parkinson's disease is marked by altered and increased firing characteristics of pathological oscillations in the brain. In other words, it causes abnormal synchronous oscillations and suppression during neurological processing. In order to examine and regulate the synchronization and pathological oscillations in motor circuits, deep brain stimulators (DBS) are used. Although machine learning meth… ▽ More

    Submitted 30 December, 2022; v1 submitted 25 December, 2022; originally announced December 2022.

    Comments: Accepted at the 11th International IEEE EMBS Conference on Neural Engineering, 2023 (NER'23)

  3. arXiv:2212.03384  [pdf

    cs.CV

    DroneAttention: Sparse Weighted Temporal Attention for Drone-Camera Based Activity Recognition

    Authors: Santosh Kumar Yadav, Achleshwar Luthra, Esha Pahwa, Kamlesh Tiwari, Heena Rathore, Hari Mohan Pandey, Peter Corcoran

    Abstract: Human activity recognition (HAR) using drone-mounted cameras has attracted considerable interest from the computer vision research community in recent years. A robust and efficient HAR system has a pivotal role in fields like video surveillance, crowd behavior analysis, sports analysis, and human-computer interaction. What makes it challenging are the complex poses, understanding different viewpoi… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2211.05531

  4. Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: The cybersecurity threat landscape has lately become overly complex. Threat actors leverage weaknesses in the network and endpoint security in a very coordinated manner to perpetuate sophisticated attacks that could bring down the entire network and many critical hosts in the network. Increasingly advanced deep and machine learning-based solutions have been used in threat detection and protection.… ▽ More

    Submitted 6 June, 2022; originally announced June 2022.

    Journal ref: International Conference On Secure Knowledge Management In Artificial Intelligence Era. Springer, Cham, 2021

  5. ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Advanced metamorphic malware and ransomware, by using obfuscation, could alter their internal structure with every attack. If such malware could intrude even into any of the IoT networks, then even if the original malware instance gets detected, by that time it can still infect the entire network. It is challenging to obtain training data for such evasive malware. Therefore, in this paper, we pres… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

    Journal ref: 2021 International Joint Conference on Neural Networks (IJCNN), 2021, pp. 1-9

  6. LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Long-Short-Term-Memory (LSTM) networks have shown great promise in artificial intelligence (AI) based language modeling. Recently, LSTM networks have also become popular for designing AI-based Intrusion Detection Systems (IDS). However, its applicability in IDS is studied largely in the default settings as used in language models. Whereas security applications offer distinct conditions and hence w… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

    Journal ref: 2021 International Joint Conference on Neural Networks (IJCNN), 2021, pp. 1-9

  7. DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Supervised Deep Learning requires plenty of labeled data to converge, and hence perform optimally for task-specific learning. Therefore, we propose a novel mechanism named DRo (for Deep Routing) for data-scarce domains like security. The DRo approach builds upon some of the recent developments in Deep-Clustering. In particular, it exploits the self-augmented training mechanism using synthetically… ▽ More

    Submitted 12 September, 2021; originally announced September 2021.

    Journal ref: 2021 IEEE 46th Conference on Local Computer Networks (LCN), 2021, pp. 581-588

  8. arXiv:2103.00643  [pdf, other

    cs.CR cs.LG

    Identification of Significant Permissions for Efficient Android Malware Detection

    Authors: Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak

    Abstract: Since Google unveiled Android OS for smartphones, malware are thriving with 3Vs, i.e. volume, velocity, and variety. A recent report indicates that one out of every five business/industry mobile application leaks sensitive personal data. Traditional signature/heuristic-based malware detection systems are unable to cope up with current malware challenges and thus threaten the Android ecosystem. The… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: BROADNETS, 2020

  9. arXiv:2103.00637  [pdf, other

    cs.CR cs.LG

    Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering

    Authors: Hemant Rathore, Sanjay K. Sahay, Shivin Thukral, Mohit Sewak

    Abstract: Today anti-malware community is facing challenges due to the ever-increasing sophistication and volume of malware attacks developed by adversaries. Traditional malware detection mechanisms are not able to cope-up with next-generation malware attacks. Therefore in this paper, we propose effective and efficient Android malware detection models based on machine learning and deep learning integrated w… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: BROADNETS, 2020

  10. arXiv:2102.00898  [pdf, other

    cs.CR cs.AI cs.LG

    DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: In this paper, we propose a novel mechanism to normalize metamorphic and obfuscated malware down at the opcode level and hence create an advanced metamorphic malware de-obfuscation and defense system. We name this system DRLDO, for Deep Reinforcement Learning based De-Obfuscator. With the inclusion of the DRLDO as a sub-component, an existing Intrusion Detection System could be augmented with defe… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Journal ref: Defence Science Journal, 71(1), 55-65

  11. Robust Android Malware Detection System against Adversarial Attacks using Q-Learning

    Authors: Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak

    Abstract: The current state-of-the-art Android malware detection systems are based on machine learning and deep learning models. Despite having superior performance, these models are susceptible to adversarial attacks. Therefore in this paper, we developed eight Android malware detection models based on machine learning and deep neural network and investigated their robustness against adversarial attacks. F… ▽ More

    Submitted 27 January, 2021; originally announced January 2021.

    Comments: Inf Syst Front (2020)

  12. Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Recurrent deep learning language models like the LSTM are often used to provide advanced cyber-defense for high-value assets. The underlying assumption for using LSTM networks for malware-detection is that the op-code sequence of malware could be treated as a (spoken) language representation. There are differences between any spoken-language (sequence of words/sentences) and the machine-language (… ▽ More

    Submitted 26 December, 2020; originally announced December 2020.

    Journal ref: 2020 IEEE REGION 10 CONFERENCE (TENCON), Osaka, Japan, 2020, pp. 414-419

  13. arXiv:2010.08608  [pdf, other

    cs.CR cs.AI cs.LG

    DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: We designed and developed DOOM (Adversarial-DRL based Opcode level Obfuscator to generate Metamorphic malware), a novel system that uses adversarial deep reinforcement learning to obfuscate malware at the op-code level for the enhancement of IDS. The ultimate goal of DOOM is not to give a potent weapon in the hands of cyber-attackers, but to create defensive-mechanisms against advanced zero-day at… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

  14. DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: The Intent in Android plays an important role in inter-process and intra-process communications. The implicit Intent that an application could accept are declared in its manifest and are amongst the easiest feature to extract from an apk. Implicit Intents could even be extracted online and in real-time. So far neither the feasibility of developing an Intrusion Detection System solely on implicit I… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

  15. arXiv:1904.10142  [pdf, other

    cs.CR cs.LG

    Android Malicious Application Classification Using Clustering

    Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak

    Abstract: Android malware have been growing at an exponential pace and becomes a serious threat to mobile users. It appears that most of the anti-malware still relies on the signature-based detection system which is generally slow and often not able to detect advanced obfuscated malware. Hence time-to-time various authors have proposed different machine learning solutions to identify sophisticated malware.… ▽ More

    Submitted 21 April, 2019; originally announced April 2019.

    Comments: Springer, AISC, Volume 941, pp. 659-667, ISDA, 2018

  16. Malware Detection using Machine Learning and Deep Learning

    Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak

    Abstract: Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware. The velocity, volume, and the complexity of malware are posing new challenges to the anti-malware community. Current state-of-the-art research shows that… ▽ More

    Submitted 4 April, 2019; originally announced April 2019.

    Comments: 11 Pages and 3 Figures

    Journal ref: Springer, LNCS, Vol. 11297, pp. 402-411, International Conference on Big Data Analytics, 2018

  17. arXiv:1811.04797  [pdf, other

    cs.HC

    A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables

    Authors: Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore

    Abstract: Distracted pedestrians, like distracted drivers, are an increasingly dangerous threat and precursors to pedestrian accidents in urban communities, often resulting in grave injuries and fatalities. Mitigating such hazards to pedestrian safety requires employment of pedestrian safety systems and applications that are effective in detecting them. Designing such frameworks is possible with the availab… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1710.03755

  18. Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: Recently, Deep Learning has been showing promising results in various Artificial Intelligence applications like image recognition, natural language processing, language modeling, neural machine translation, etc. Although, in general, it is computationally more expensive as compared to classical machine learning techniques, their results are found to be more effective in some cases. Therefore, in t… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: 11 Pages, 1 figure

    Journal ref: IEEE, pp. 293-296, 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018

  19. arXiv:1809.05888  [pdf, other

    cs.CR cs.AI cs.LG

    An investigation of a deep learning based malware detection system

    Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

    Abstract: We investigate a Deep Learning based system for malware detection. In the investigation, we experiment with different combination of Deep Learning architectures including Auto-Encoders, and Deep Neural Networks with varying layers over Malicia malware dataset on which earlier studies have obtained an accuracy of (98%) with an acceptable False Positive Rates (1.07%). But these results were done usi… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: 13 Pages, 4 figures

    Journal ref: ACM, pp. 26, Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), 27-30 Aug., 2018, University of Hamburg, Germany

  20. arXiv:1710.03755  [pdf, other

    cs.HC

    Towards a Practical Pedestrian Distraction Detection Framework using Wearables

    Authors: Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore

    Abstract: Pedestrian safety continues to be a significant concern in urban communities and pedestrian distraction is emerging as one of the main causes of grave and fatal accidents involving pedestrians. The advent of sophisticated mobile and wearable devices, equipped with high-precision on-board sensors capable of measuring fine-grained user movements and context, provides a tremendous opportunity for des… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.