Benjamin M. Ampel
Benjamin M. Ampel
Home
Research
Publications
Teaching
Awards
Service
CV
Contact
Light
Dark
Automatic
Deep Learning
Automatically Detecting Voice Phishing: A Large Audio Model Approach
Voice phishing (vishing) attacks have become increasingly sophisticated, exploiting audio-based communication channels to deceive …
Benjamin M. Ampel
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Jan 28, 2026
DOI
Large Language Models for Conducting Advanced Text Analytics Information Systems Research
The exponential growth of digital content has generated massive textual datasets, necessitating the use of advanced analytical …
Benjamin M. Ampel
,
Chi-Heng Yang
,
James Hu
,
Hsinchun Chen
Last updated on Jan 28, 2026
PDF
DOI
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach
The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach
Cyberattacks have been increasing in volume and intensity, necessitating proactive measures. Cybersecurity risk management frameworks …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach
Paste sites serve as repositories for sharing code snippets, including malicious exploit code. Understanding how these exploits map to …
Benjamin M. Ampel
,
Tala Vahedi
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Jan 28, 2026
PDF
DOI
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics
Hacker forums provide malicious actors with a large database of tutorials, goods, and assets to leverage for cyber-attacks. Careful …
Benjamin M. Ampel
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach
Cybercrime was estimated to cost the global economy $945 billion in 2020. Increasingly, law enforcement agencies are using social …
Kaeli Otto
,
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach
Malicious cyber activities impose substantial costs on the U.S. economy and global markets. Cyber-criminals often use …
Tala Vahedi
,
Benjamin M. Ampel
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach
Common Vulnerabilities and Exposures (CVEs) are used by cybersecurity analysts, networks, and endpoints managers to identify and …
Benjamin M. Ampel
,
Sagar Samtani
,
Steven Ullman
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., GitHub) to share resources and …
Ben Lazarine
,
Sagar Samtani
,
Mark Patton
,
Hongyi Zhu
,
Steven Ullman
,
Benjamin M. Ampel
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
»