Skip to main content

Showing 1–6 of 6 results for author: Siraj, A

Searching in archive cs. Search in all archives.
.
  1. OpenMS WebApps: Building User-Friendly Solutions for MS Analysis

    Authors: Tom David Müller, Arslan Siraj, Axel Walter, Jihyung Kim, Samuel Wein, Johannes von Kleist, Ayesha Feroz, Matteo Pilz, Kyowon Jeong, Justin Cyril Sing, Joshua Charkow, Hannes Luc Röst, Timo Sachsenberg

    Abstract: Liquid Chromatography Mass Spectrometry (LC-MS) is an indispensable analytical technique in proteomics, metabolomics, and other life sciences. While OpenMS provides advanced open-source software for MS data analysis, its complexity can be challenging for non-experts. To address this, we have developed OpenMS WebApps, a framework for creating user-friendly MS web applications based on the Streamlit… ▽ More

    Submitted 20 November, 2024; originally announced November 2024.

    Comments: 19 pages, 5 figures

  2. arXiv:2101.06308  [pdf, other

    cs.CR cs.AI

    Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning

    Authors: Ibrahim Yilmaz, Kavish Kapoor, Ambareen Siraj, Mahmoud Abouyoussef

    Abstract: Utilities around the world are reported to invest a total of around 30 billion over the next few years for installation of more than 300 million smart meters, replacing traditional analog meters [1]. By mid-decade, with full country wide deployment, there will be almost 1.3 billion smart meters in place [1]. Collection of fine grained energy usage data by these smart meters provides numerous advan… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  3. arXiv:2101.00521  [pdf, other

    cs.CR cs.AI

    Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning

    Authors: Ibrahim Yilmaz, Ambareen Siraj, Denis Ulybyshev

    Abstract: Domain Generation Algorithms (DGAs) are used by adversaries to establish Command and Control (C\&C) server communications during cyber attacks. Blacklists of known/identified C\&C domains are often used as one of the defense mechanisms. However, since blacklists are static and generated by signature-based approaches, they can neither keep up nor detect never-seen-before malicious domain names. Due… ▽ More

    Submitted 2 January, 2021; originally announced January 2021.

    Comments: 10 pages, 6 figures , 2 tables

  4. arXiv:2010.12640  [pdf, other

    cs.LG cs.CR

    Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning

    Authors: ibrahim Yilmaz, Ambareen Siraj

    Abstract: More and more conventional electromechanical meters are being replaced with smart meters because of their substantial benefits such as providing faster bi-directional communication between utility services and end users, enabling direct load control for demand response, energy saving, and so on. However, the fine-grained usage data provided by smart meter brings additional vulnerabilities from use… ▽ More

    Submitted 23 October, 2020; originally announced October 2020.

  5. arXiv:1911.09858  [pdf, other

    cs.LG q-fin.RM stat.ML

    Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy

    Authors: Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Sid C. Bundy, Douglas A. Talbert, Ambareen Siraj

    Abstract: In the area of credit risk analytics, current Bankruptcy Prediction Models (BPMs) struggle with (a) the availability of comprehensive and real-world data sets and (b) the presence of extreme class imbalance in the data (i.e., very few samples for the minority class) that degrades the performance of the prediction model. Moreover, little research has compared the relative performance of well-known… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: Under review in Expert Systems with Applications

  6. arXiv:1911.09853  [pdf, other

    cs.AI cs.CR

    Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response

    Authors: Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, Mike Rogers

    Abstract: Artificial Intelligence (AI) has become an integral part of modern-day security solutions for its ability to learn very complex functions and handling "Big Data". However, the lack of explainability and interpretability of successful AI models is a key stumbling block when trust in a model's prediction is critical. This leads to human intervention, which in turn results in a delayed response or de… ▽ More

    Submitted 22 February, 2020; v1 submitted 21 November, 2019; originally announced November 2019.

    Comments: Accepted to be published in the Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice (AAAI-MAKE 2020). Stanford University, Palo Alto, California, USA, March 23-25, 2020