Academic
Academic
Home
Research Interests
Publications
Research Projects
Teaching
Invited Talks
Awards
CV
Light
Dark
Automatic
Deep Learning
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach
The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on May 2, 2024
PDF
DOI
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach
Cyberattacks have been increasing in volume and intensity, necessitating proactive measures. Cybersecurity risk management frameworks …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on May 2, 2024
PDF
DOI
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics
Hacker forums provide malicious actors with a large database of tutorials, goods, and assets to leverage for cyber-attacks. Careful …
Benjamin M. Ampel
,
Hsinchun Chen
Last updated on Sep 6, 2023
PDF
DOI
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach
Cybercrime was estimated to cost the global economy $945 billion in 2020. Increasingly, law enforcement agencies are using social …
Kaeli Otto
,
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Sep 6, 2023
PDF
DOI
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach
Malicious cyber activities impose substantial costs on the U.S. economy and global markets. Cyber-criminals often use …
Tala Vahedi
,
Benjamin M. Ampel
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Sep 6, 2023
PDF
DOI
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., GitHub) to share resources and …
Ben Lazarine
,
Sagar Samtani
,
Mark Patton
,
Hongyi Zhu
,
Steven Ullman
,
Benjamin M. Ampel
,
Hsinchun Chen
Last updated on Sep 6, 2023
PDF
DOI
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
With the rapid development of new technologies, vulnerabilities are at an all-time high. Companies are investing in developing Cyber …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Steven Ullman
,
Hsinchun Chen
Last updated on Sep 6, 2023
PDF
DOI
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
The accelerated growth of computing technologies has provided interdisciplinary teams a platform for producing innovative research at …
Steven Ullman
,
Sagar Samtani
,
Ben Lazarine
,
Hongyi Zhu
,
Benjamin M. Ampel
,
Mark Patton
,
Hsinchun Chen
Last updated on Sep 6, 2023
PDF
DOI
Example Project
An example of using the in-built project page.
Slides
Follow