Not enough data to create a plot.
Try a different view from the menu above.
Lee, Ian
Semi-Parametric Inducing Point Networks and Neural Processes
Rastogi, Richa, Schiff, Yair, Hacohen, Alon, Li, Zhaozhi, Lee, Ian, Deng, Yuntian, Sabuncu, Mert R., Kuleshov, Volodymyr
We introduce semi-parametric inducing point networks (SPIN), a general-purpose architecture that can query the training set at inference time in a compute-efficient manner. Semi-parametric architectures are typically more compact than parametric models, but their computational complexity is often quadratic. In contrast, SPIN attains linear complexity via a cross-attention mechanism between datapoints inspired by inducing point methods. Querying large training sets can be particularly useful in meta-learning, as it unlocks additional training signal, but often exceeds the scaling limits of existing models. We use SPIN as the basis of the Inducing Point Neural Process, a probabilistic model which supports large contexts in meta-learning and achieves high accuracy where existing models fail. In our experiments, SPIN reduces memory requirements, improves accuracy across a range of meta-learning tasks, and improves state-of-the-art performance on an important practical problem, genotype imputation.
An AI-based, Multi-stage detection system of banking botnets
Ling, Li, Gao, Zhiqiang, Silas, Michael A, Lee, Ian, Doeuff, Erwan A Le
Banking Trojans, botnets are primary drivers of financially-motivated cybercrime. In this paper, we first analyzed how an APT-based banking botnet works step by step through the whole lifecycle. Specifically, we present a multi-stage system that detects malicious banking botnet activities which potentially target the organizations. The system leverages Cyber Data Lake as well as multiple artificial intelligence techniques at different stages. The evaluation results using public datasets showed that Deep Learning based detections were highly successful compared with baseline models. The proposed detections are partially in production on Cyber Data Lake within the organization, and we are continuing to work with internal security teams on further operational challenges.