Skip to main content

Showing 1–12 of 12 results for author: Seale, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.02800  [pdf, other

    cs.LG cs.CE

    RAAD-LLM: Adaptive Anomaly Detection Using LLMs and RAG Integration

    Authors: Alicia Russell-Gilbert, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jabour, Thomas Arnold, Joshua Church

    Abstract: Anomaly detection in complex industrial environments poses unique challenges, particularly in contexts characterized by data sparsity and evolving operational conditions. Predictive maintenance (PdM) in such settings demands methodologies that are adaptive, transferable, and capable of integrating domain-specific knowledge. In this paper, we present RAAD-LLM, a novel framework for adaptive anomaly… ▽ More

    Submitted 11 March, 2025; v1 submitted 4 March, 2025; originally announced March 2025.

    Comments: arXiv admin note: substantial text overlap with arXiv:2411.00914

    MSC Class: 1.6.5

  2. arXiv:2411.05848  [pdf, other

    cs.LG

    Multivariate Data Augmentation for Predictive Maintenance using Diffusion

    Authors: Andrew Thompson, Alexander Sommers, Alicia Russell-Gilbert, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold, Joshua Church

    Abstract: Predictive maintenance has been used to optimize system repairs in the industrial, medical, and financial domains. This technique relies on the consistent ability to detect and predict anomalies in critical systems. AI models have been trained to detect system faults, improving predictive maintenance efficiency. Typically there is a lack of fault data to train these models, due to organizations wo… ▽ More

    Submitted 6 November, 2024; originally announced November 2024.

  3. arXiv:2411.00914  [pdf, other

    cs.LG cs.AI cs.CE

    AAD-LLM: Adaptive Anomaly Detection Using Large Language Models

    Authors: Alicia Russell-Gilbert, Alexander Sommers, Andrew Thompson, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold, Joshua Church

    Abstract: For data-constrained, complex and dynamic industrial environments, there is a critical need for transferable and multimodal methodologies to enhance anomaly detection and therefore, prevent costs associated with system failures. Typically, traditional PdM approaches are not transferable or multimodal. This work examines the use of Large Language Models (LLMs) for anomaly detection in complex and d… ▽ More

    Submitted 1 November, 2024; originally announced November 2024.

  4. arXiv:2408.11935  [pdf, other

    cs.LG cs.AI cs.HC

    Explainable Anomaly Detection: Counterfactual driven What-If Analysis

    Authors: Logan Cummins, Alexander Sommers, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold

    Abstract: There exists three main areas of study inside of the field of predictive maintenance: anomaly detection, fault diagnosis, and remaining useful life prediction. Notably, anomaly detection alerts the stakeholder that an anomaly is occurring. This raises two fundamental questions: what is causing the fault and how can we fix it? Inside of the field of explainable artificial intelligence, counterfactu… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: 8 pages, 6 figures, 3 tables

  5. arXiv:2406.02322  [pdf, other

    cs.LG cs.AI

    A Survey of Transformer Enabled Time Series Synthesis

    Authors: Alexander Sommers, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold

    Abstract: Generative AI has received much attention in the image and language domains, with the transformer neural network continuing to dominate the state of the art. Application of these models to time series generation is less explored, however, and is of great utility to machine learning, privacy preservation, and explainability research. The present survey identifies this gap at the intersection of the… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  6. arXiv:2404.08601  [pdf, ps, other

    cs.LG

    Generating Synthetic Time Series Data for Cyber-Physical Systems

    Authors: Alexander Sommers, Somayeh Bakhtiari Ramezani, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure

    Abstract: Data augmentation is an important facilitator of deep learning applications in the time series domain. A gap is identified in the literature, demonstrating sparse exploration of the transformer, the dominant sequence model, for data augmentation in time series. A architecture hybridizing several successful priors is put forth and tested using a powerful time domain similarity metric. Results sugge… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  7. arXiv:2401.10207  [pdf, other

    cs.CR cs.AI cs.LG

    Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems

    Authors: Jesse Ables, Nathaniel Childers, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: This paper addresses trust issues created from the ubiquity of black box algorithms and surrogate explainers in Explainable Intrusion Detection Systems (X-IDS). While Explainable Artificial Intelligence (XAI) aims to enhance transparency, black box surrogate explainers, such as Local Interpretable Model-Agnostic Explanation (LIME) and SHapley Additive exPlanation (SHAP), are difficult to trust. Th… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  8. arXiv:2401.07871  [pdf, other

    cs.AI cs.HC cs.LG

    Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities

    Authors: Logan Cummins, Alex Sommers, Somayeh Bakhtiari Ramezani, Sudip Mittal, Joseph Jabour, Maria Seale, Shahram Rahimi

    Abstract: Predictive maintenance is a well studied collection of techniques that aims to prolong the life of a mechanical system by using artificial intelligence and machine learning to predict the optimal time to perform maintenance. The methods allow maintainers of systems and hardware to reduce financial and time costs of upkeep. As these methods are adopted for more serious and potentially life-threaten… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  9. arXiv:2303.17387  [pdf, other

    cs.CR cs.AI cs.LG

    Explainable Intrusion Detection Systems Using Competitive Learning Techniques

    Authors: Jesse Ables, Thomas Kirby, Sudip Mittal, Ioana Banicescu, Shahram Rahimi, William Anderson, Maria Seale

    Abstract: The current state of the art systems in Artificial Intelligence (AI) enabled intrusion detection use a variety of black box methods. These black box methods are generally trained using Error Based Learning (EBL) techniques with a focus on creating accurate models. These models have high performative costs and are not easily explainable. A white box Competitive Learning (CL) based eXplainable Intru… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

  10. arXiv:2208.07801  [pdf, other

    cs.CR cs.NE

    Designing an Artificial Immune System inspired Intrusion Detection System

    Authors: William Anderson, Kaneesha Moore, Jesse Ables, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: The Human Immune System (HIS) works to protect a body from infection, illness, and disease. This system can inspire cybersecurity professionals to design an Artificial Immune System (AIS) based Intrusion Detection System (IDS). These biologically inspired algorithms using Self/Nonself and Danger Theory can directly augmentIDS designs and implementations. In this paper, we include an examination in… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  11. arXiv:2207.07465  [pdf, other

    cs.CR cs.AI cs.LG

    Creating an Explainable Intrusion Detection System Using Self Organizing Maps

    Authors: Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: Modern Artificial Intelligence (AI) enabled Intrusion Detection Systems (IDS) are complex black boxes. This means that a security analyst will have little to no explanation or clarification on why an IDS model made a particular prediction. A potential solution to this problem is to research and develop Explainable Intrusion Detection Systems (X-IDS) based on current capabilities in Explainable Art… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  12. arXiv:2207.06236  [pdf, other

    cs.CR cs.AI

    Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

    Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures and government institutions. Intrusion Detection Systems (IDS), using some forms of AI, have received widespread adoption due to their ability to hand… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.