
{"id":2480,"date":"2024-10-27T10:33:24","date_gmt":"2024-10-27T05:03:24","guid":{"rendered":"https:\/\/iciss.isrdc.in\/?page_id=2480"},"modified":"2024-12-07T01:28:56","modified_gmt":"2024-12-06T19:58:56","slug":"tutorial-1-deep-learning-for-cybersecurity","status":"publish","type":"page","link":"https:\/\/iciss.isrdc.in\/2024\/?page_id=2480","title":{"rendered":"Tutorial 1: Deep Learning for Cybersecurity"},"content":{"rendered":"\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td>by Rakesh M. Verma<br>Professor of Computer Science &amp; Director of ReDAS Lab<br>University of Houston<br><a href=\"https:\/\/www2.cs.uh.edu\/~rmverma\/ \">https:\/\/www2.cs.uh.edu\/~rmverma\/ <\/a><\/td><td>and Dainis Boumber<br>Senior Scientist, NLP Research<br>Aon IPS<br><a href=\"https:\/\/dainis-boumber.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dainis-boumber.github.io\/<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Date: 16 December 2024; Time: 9:30 AM; Venue: LNMIIT, <a href=\"https:\/\/maps.app.goo.gl\/zoqhW44wNNKj1p3G8\">CMLBDA Lab<\/a>, RIEP building<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<p><strong>Prerequisites<\/strong><br><strong><br><\/strong>Mathematical maturity; Basics of Security including security goals, mechanisms, threat analysis and attacks such as malware, intrusion and phishing; Basics of Machine Learning including linear regression, supervised learning including basic loss functions especially categorical cross entropy, classification methods especially multi-layer perceptron model, and unsupervised learning especially clustering; Familiarity with basic text processing, natural language processing and understanding concepts; python programming.<br><br><strong>Outline<\/strong><br><strong><br>Module 1: Introduction to Deep Leaning (2 hours 30 minutes lecture, 45 minutes of exercises)<br><\/strong>\u2013 Feedforward Networks (FFN)<br>\u2013 Convolutional Neural Networks (CNN)<br>\u2013 Long Short-term Memory (LSTM) model<br>\u2013 Attention, Transformers, LLMs<br>\u2013 Autoencoders<br>\u2013 Generative Models<br>\u2013 Parameter-efficient machine learning<br>\u2013 Adversarial Machine Learning including attacks and defenses<br>\u2013 Examples and exercises will include: Python notebooks for FFN, CNN, Transformers, BERT, and an open source LLM<br><br><strong>Module 2: Applications to cybersecurity challenges (2 hours lecture, 40 minutes of exercises)<br><\/strong>\u2013 Deceptive attacks including social engineering attacks, business email compromise, fake news, and romance\/job scams<br>\u2013 Intrusion detection<br>\u2013 Malware detection<br>\u2013 Adversarial robustness of deep learning models for cybersecurity<br>\u2013 Techniques for explainable ML<br>\u2013 Key takeaways and directions for future research<br>\u2013 Examples and exercise will include deep learning models for deceptive attacks and adversarial robustness, explainability techniques<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<ol><li>Deep Learning book by Ian Goodfellow et al. Available <a href=\"https:\/\/www.deeplearningbook.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">online<\/a><\/li><li>Cybersecurity Analytics by Rakesh Verma and David Marchette, CRC Press, 2019. (recommended for prerequisite knowledge)<\/li><li>AI for Cyber security by Alessandro Parisi, Packt Press, 2019.<\/li><li>AI\/ML in Cybersecurity, Malini Rao, 2023.<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>by Rakesh M. VermaProfessor of Computer Science &amp; Director of ReDAS LabUniversity of Houstonhttps:\/\/www2.cs.uh.edu\/~rmverma\/ and Dainis BoumberSenior Scientist, NLP ResearchAon IPShttps:\/\/dainis-boumber.github.io\/ Date: 16 December 2024; Time: 9:30 AM; Venue: LNMIIT, CMLBDA Lab, RIEP building PrerequisitesMathematical maturity; Basics of Security including security goals, mechanisms, threat analysis and attacks such as malware, intrusion and phishing; Basics of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/iciss.isrdc.in\/2024\/index.php?rest_route=\/wp\/v2\/pages\/2480"}],"collection":[{"href":"https:\/\/iciss.isrdc.in\/2024\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iciss.isrdc.in\/2024\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iciss.isrdc.in\/2024\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/iciss.isrdc.in\/2024\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2480"}],"version-history":[{"count":13,"href":"https:\/\/iciss.isrdc.in\/2024\/index.php?rest_route=\/wp\/v2\/pages\/2480\/revisions"}],"predecessor-version":[{"id":2727,"href":"https:\/\/iciss.isrdc.in\/2024\/index.php?rest_route=\/wp\/v2\/pages\/2480\/revisions\/2727"}],"wp:attachment":[{"href":"https:\/\/iciss.isrdc.in\/2024\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}