James Cheney
YOU?
Author Swipe
View article: APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models
APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models Open
Advanced Persistent Threats (APTs) pose a major cybersecurity challenge due to their stealth and ability to mimic normal system behavior, making detection particularly difficult in highly imbalanced datasets. Traditional anomaly detection …
View article: Nominal Matching Logic with Fixpoints
Nominal Matching Logic with Fixpoints Open
Matching logic is the foundation of the K semantic environment for the specification of programming languages and automated generation of evaluators and verification tools. NLML is a formalization of nominal logic, which facilitates specif…
View article: NLML formalization
NLML formalization Open
View article: Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data
Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data Open
Advanced Persistent Threats (APTs) are sophisticated, targeted cyberattacks designed to gain unauthorized access to systems and remain undetected for extended periods. To evade detection, APT cyberattacks deceive defense layers with breach…
View article: Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent Access Threats Within Highly Imbalanced Data
Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent Access Threats Within Highly Imbalanced Data Open
Advanced Persistent Threats (APTs) are sophisticated, targeted cyberattacks designed to gain unauthorized access to systems and remain undetected for extended periods. To evade detection, APT cyberattacks deceive defense layers with breach…
View article: Lenses for Web Data
Lenses for Web Data Open
Putting data on the web typically involves implementing two transformations: one to convert the data into HTML, and another to parse modifications out of interactions with clients. Unfortunately, in current systems, these transformations a…
View article: Hack Me If You Can: Aggregating Autoencoders for Countering Persistent Access Threats within Highly Imbalanced Data
Hack Me If You Can: Aggregating Autoencoders for Countering Persistent Access Threats within Highly Imbalanced Data Open
View article: Eris: efficiently measuring discord in multidimensional sources
Eris: efficiently measuring discord in multidimensional sources Open
Data integration is a classical problem in databases, typically decomposed into schema matching, entity matching and data fusion. To solve the latter, it is mostly assumed that ground truth can be determined. However, in general, the data …
View article: Language-Integrated Query for Temporal Data
Language-Integrated Query for Temporal Data Open
Modern applications often manage time-varying data. Despite decades of research on temporal databases, which culminated in the addition of temporal data operations into the SQL:2011 standard, temporal data query and manipulation operations…
View article: Language-Integrated Query for Temporal Data (Extended version)
Language-Integrated Query for Temporal Data (Extended version) Open
Modern applications often manage time-varying data. Despite decades of research on temporal databases, which culminated in the addition of temporal data operations into the SQL:2011 standard, temporal data query and manipulation operations…
View article: Nominal Matching Logic
Nominal Matching Logic Open
We introduce Nominal Matching Logic (NML) as an extension of Matching Logic\nwith names and binding following the Gabbay-Pitts nominal approach. Matching\nlogic is the foundation of the $\\mathbb{K}$ framework, used to specify\nprogramming…
View article: Constraint-based type inference for FreezeML
Constraint-based type inference for FreezeML Open
FreezeML is a new approach to first-class polymorphic type inference that employs term annotations to control when and how polymorphic types are instantiated and generalised. It conservatively extends Hindley-Milner type inference and was …
View article: Strongly-Normalizing Higher-Order Relational Queries
Strongly-Normalizing Higher-Order Relational Queries Open
Language-integrated query is a powerful programming construct allowing database queries and ordinary program code to interoperate seamlessly and safely. Language-integrated query techniques rely on classical results about the nested relati…
View article: A Formalization of SQL with Nulls
A Formalization of SQL with Nulls Open
View article: Constraint-based type inference for FreezeML
Constraint-based type inference for FreezeML Open
FreezeML is a new approach to first-class polymorphic type inference that employs term annotations to control when and how polymorphic types are instantiated and generalised. It conservatively extends Hindley-Milner type inference and was …
View article: Eris: Measuring discord among multidimensional data sources
Eris: Measuring discord among multidimensional data sources Open
Data integration is a classical problem in databases, typically decomposed into schema matching, entity matching and data fusion. To solve the latter, it is mostly assumed that ground truth can be determined. However, in general, the data …
View article: Data provenance, curation and quality in metrology
Data provenance, curation and quality in metrology Open
Data metrology -- the assessment of the quality of data -- particularly in scientific and industrial settings, has emerged as an important requirement for the UK National Physical Laboratory (NPL) and other national metrology institutes. D…
View article: ERIS: Efficiently Measuring Discord in Multidimensional Sources
ERIS: Efficiently Measuring Discord in Multidimensional Sources Open
View article: One down, 699 to go: or, synthesising compositional desugarings
One down, 699 to go: or, synthesising compositional desugarings Open
Programming or scripting languages used in real-world systems are seldom designed with a formal semantics in mind from the outset. Therefore, developing well-founded analysis tools for these systems requires reverse-engineering a formal se…
View article: One Down, 699 to Go: or, synthesising compositional desugarings
One Down, 699 to Go: or, synthesising compositional desugarings Open
Programming or scripting languages used in real-world systems are seldom designed with a formal semantics in mind from the outset. Therefore, developing well-founded analysis tools for these systems requires reverse-engineering a formal se…
View article: A Typed Slicing Compilation of the Polymorphic RPC calculus
A Typed Slicing Compilation of the Polymorphic RPC calculus Open
The polymorphic RPC calculus allows programmers to write succinct multitier programs using polymorphic location constructs. However, until now it lacked an implementation. We develop an experimental programming language based on the polymo…
View article: Comprehending nulls
Comprehending nulls Open
The Nested Relational Calculus (NRC) has been an influential high-level query language, providing power and flexibility while still allowing translation to standard SQL queries. It has also been used as a basis for language-integrated quer…
View article: A Rule Mining-based Advanced Persistent Threats Detection System
A Rule Mining-based Advanced Persistent Threats Detection System Open
Advanced persistent threats (APT) are stealthy cyber-attacks that are aimed at stealing valuable information from target organizations and tend to extend in time. Blocking all APTs is impossible, security experts caution, hence the importa…
View article: Cross-tier Web Programming for Curated Databases: a Case Study
Cross-tier Web Programming for Curated Databases: a Case Study Open
Curated databases have become important sources of information across several scientific disciplines, and as the result of manual work of experts, often become important reference works. Features such as provenance tracking, archiving, and…
View article: Query Lifting: Language-integrated query for heterogeneous nested collections
Query Lifting: Language-integrated query for heterogeneous nested collections Open
Language-integrated query based on comprehension syntax is a powerful technique for safe database programming, and provides a basis for advanced techniques such as query shredding or query flattening that allow efficient programming with c…
View article: Curating Covid-19 Data in Links
Curating Covid-19 Data in Links Open
View article: Query Lifting
Query Lifting Open
View article: VICToRy: Visual Interactive Consistency Management in Tolerant Rule-based Systems
VICToRy: Visual Interactive Consistency Management in Tolerant Rule-based Systems Open
In the field of Model-Driven Engineering, there exist numerous tools that\nsupport various consistency management operations including model\ntransformation, synchronisation and consistency checking. The supported\noperations, however, typ…
View article: Cross-tier Web Programming for Curated Databases: a Case Study
Cross-tier Web Programming for Curated Databases: a Case Study Open
Curated databases have become important sources of information across several scientific disciplines, and as the result of manual work of experts, often become important reference works. Features such as provenance tracking, archiving, and…
View article: Categorical anomaly detection in heterogeneous data using minimum description length clustering
Categorical anomaly detection in heterogeneous data using minimum description length clustering Open
Fast and effective unsupervised anomaly detection algorithms have been proposed for categorical data based on the minimum description length (MDL) principle. However, they can be ineffective when detecting anomalies in heterogeneous datase…