Tim Finin
YOU?
Author Swipe
View article: GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants
GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants Open
Website privacy policies are often lengthy and intricate. Privacy assistants assist in simplifying policies and making them more accessible and user-friendly. The emergence of generative AI (genAI) offers new opportunities to build privacy…
View article: Enhancing Knowledge Graph Consistency through Open Large Language Models: A Case Study
Enhancing Knowledge Graph Consistency through Open Large Language Models: A Case Study Open
High-quality knowledge graphs (KGs) play a crucial role in many applications. However, KGs created by automated information extraction systems can suffer from erroneous extractions or be inconsistent with provenance/source text. It is impo…
View article: Employing word-embedding for schema matching in standard lifecycle management
Employing word-embedding for schema matching in standard lifecycle management Open
View article: A Study of the Landscape of Privacy Policies of Smart Devices
A Study of the Landscape of Privacy Policies of Smart Devices Open
As the adoption of smart devices continues to permeate all aspects of our lives, user privacy concerns have become more pertinent than ever. Privacy policies outline the data handling practices of these devices. Prior work in the domains o…
View article: A Practical Entity Linking System for Tables in Scientific Literature
A Practical Entity Linking System for Tables in Scientific Literature Open
Entity linking is an important step towards constructing knowledge graphs that facilitate advanced question answering over scientific documents, including the retrieval of relevant information included in tables within these documents. Thi…
View article: GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants
GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants Open
Privacy policies inform users about the data management practices of organizations. Yet, their complexity often renders them largely incomprehensible to the average user, necessitating the development of privacy assistants. With the advent…
View article: Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses
Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses Open
Cyber defense exercises are an important avenue to understand the technical capacity of organizations when faced with cyber-threats. Information derived from these exercises often leads to finding unseen methods to exploit vulnerabilities …
View article: Quantum-Assisted Greedy Algorithms
Quantum-Assisted Greedy Algorithms Open
We show how to leverage quantum annealers (QAs) to better select candidates in greedy algorithms. Unlike conventional greedy algorithms that employ problem-specific heuristics for making locally optimal choices at each stage, we use QAs th…
View article: CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations
CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations Open
The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units. However, this requires autonomous assets such as sensors, drones, combat equipment, and uncrewed vehicles to collaborate, securely shar…
View article: Recognizing and Extracting Cybersecurtity-relevant Entities from Text
Recognizing and Extracting Cybersecurtity-relevant Entities from Text Open
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG). There is a strong ne…
View article: CAPD: a context-aware, policy-driven framework for secure and resilient IoBT operations
CAPD: a context-aware, policy-driven framework for secure and resilient IoBT operations Open
The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units. However, this requires autonomous assets such as sensors, drones, combat equipment, and uncrewed vehicles to collaborate, securely shar…
View article: Computational Understanding of Narratives: A Survey
Computational Understanding of Narratives: A Survey Open
Storytelling, and the delivery of societal narratives, enable human beings to communicate, connect, and understand one another and the world around them. Narratives can be defined as spoken, visual, or written accounts of interconnected ev…
View article: Jointly Identifying and Fixing Inconsistent Readings from Information Extraction Systems
Jointly Identifying and Fixing Inconsistent Readings from Information Extraction Systems Open
Information extraction systems analyze text to produce entities and beliefs, but their output often has errors. In this paper, we analyze the reading consistency of the extracted facts with respect to the text from which they were derived …
View article: Proceedings of Deep Learning Inside Out (DeeLIO 2022): The 3rd Workshop on Knowledge Extraction and Integration for Deep Learning Architectures
Proceedings of Deep Learning Inside Out (DeeLIO 2022): The 3rd Workshop on Knowledge Extraction and Integration for Deep Learning Architectures Open
Cross-lingual Transfer Learning typically involves training a model on a high-resource source language and applying it to a lowresource target language.In this work we introduce a lexical database called Valency Patterns Leipzig (ValPal) w…
View article: CyBERT: Contextualized Embeddings for the Cybersecurity Domain
CyBERT: Contextualized Embeddings for the Cybersecurity Domain Open
We present CyBERT, a domain-specific Bidirectional Encoder Representations from Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data. State-of-the-art natural language models that can process dense, fine-…
View article: Second Space: A Generative Model for the Blogosphere
Second Space: A Generative Model for the Blogosphere Open
Analysing complex natural phenomena often requires synthesized data that matches observed characteristics. Graph models are widely used in analyzing the Web in general, but are less suitable for modeling the Blogosphere. While blog network…
View article: Approximating the Community Structure of the Long Tail
Approximating the Community Structure of the Long Tail Open
In many social media applications, a small fraction of the members are highly linked while most are sparsely connected to the network. Such a skewed distribution is sometimes referred to as the "long tail". Popular applications like meme t…
View article: Wikipedia as an Ontology for Describing Documents
Wikipedia as an Ontology for Describing Documents Open
Identifying topics and concepts associated with a set of documents is a task common to many applications. It can help in the annotation and categorization of documents and be used to model a person's current interests for improving search …
View article: Multi-qubit correction for quantum annealers
Multi-qubit correction for quantum annealers Open
View article: Multi Qubit Correction (MQC) for Quantum Annealers
Multi Qubit Correction (MQC) for Quantum Annealers Open
MQC is a classical postprocessing method for improving the quality of drawn samples by quantum annealers (like the D-Wave quantum processors), and any Ising processing unit (IPU). MQC receives a sample-set and coefficients of an Ising mode…
View article: Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models Open
Cyber-defense systems are being developed to automatically ingest Cyber Threat Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge graphs. A potential risk is that fake CTI can be generated and spread th…
View article: Understanding Cybersecurity Threat Trends Through Dynamic Topic Modeling
Understanding Cybersecurity Threat Trends Through Dynamic Topic Modeling Open
Cybersecurity threats continue to increase and are impacting almost all aspects of modern life. Being aware of how vulnerabilities and their exploits are changing gives helpful insights into combating new threats. Applying dynamic topic mo…
View article: A BERT Based Approach to Measure Web Services Policies Compliance With GDPR
A BERT Based Approach to Measure Web Services Policies Compliance With GDPR Open
Data confidentiality is an issue of increasing importance. Several authorities and regulatory bodies are creating new laws that control how web services data is handled and shared. With the rapid increase of such regulations, web service p…
View article: Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior Open
Security engineers and researchers use their disparate knowledge and discretion to identify malware present in a system. Sometimes, they may also use previously extracted knowledge and available Cyber Threat Intelligence (CTI), about known…
View article: Fine and Ultra-Fine Entity Type Embeddings for Question Answering
Fine and Ultra-Fine Entity Type Embeddings for Question Answering Open
We describe our system for the SeMantic AnsweR (SMART) Type prediction task 2020 for both the DBpedia and Wikidata Question Answer Type datasets. The SMART task challenge introduced fine-grained and ultra-fine entity typing to question ans…
View article: Post-Quantum Error-Correction for Quantum Annealers
Post-Quantum Error-Correction for Quantum Annealers Open
We present a general post-quantum error-correcting technique for quantum annealing, called multi-qubit correction (MQC), that views the evolution in an open-system as a Gibbs sampler and reduces a set of (first) excited states to a new syn…
View article: Knowledge Graph Inference using Tensor Embedding
Knowledge Graph Inference using Tensor Embedding Open
Axiom based inference provides a clear and consistent way of reasoning to add more information to a knowledge graph. However, constructing a set of axioms is expensive and requires domain expertise, time, and money. It is also difficult to…
View article: An Ensemble Approach for Compressive Sensing with Quantum
An Ensemble Approach for Compressive Sensing with Quantum Open
We leverage the idea of a statistical ensemble to improve the quality of quantum annealing based binary compressive sensing. Since executing quantum machine instructions on a quantum annealer can result in an excited state, rather than the…
View article: Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata
Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata Open
View article: Temporal Understanding of Cybersecurity Threats
Temporal Understanding of Cybersecurity Threats Open
As cybersecurity-related threats continue to increase, understanding how the field is changing over time can give insight into combating new threats and understanding historical events. We show how to apply dynamic topic models to a set of…