MK

M. Khosla

19 records found

Cybersecurity attacks are increasingly sophisticated, while traditional, rule-based intrusion detectionsystems (IDS) remain prone to high false alert rates. This research explores temporal graph learning fornetwork intrusion detection, introducing a framework that combines tempor ...

From Latent to Blatant Space

Coupling Biological Systems to Neural Networks for Improved Model Interpretability

Deep Neural Networks (DNNs) are renowned for their high accuracy and versatility, which has led to their application in many fields of research, including biology. However, this accuracy often comes at the expense of interpretability, making it challenging to reason about the inn ...
Reliable estimation of intra-host viral diversity is essential for understanding viral evolution,
treatment resistance, and outbreak dynamics. However, technical artefacts introduced during
sample preparation and sequencing can distort variant frequencies and lead to inco ...

Analyzing Plasticity Through Utility Scores

Comparing Continual Learning Algorithms via Utility Score Distributions

One of the central problems in continual learning is the loss of plasticity, which is the model’s inability to learn new tasks. Several approaches have been previously proposed, such as Continual Backpropagation (CBP). This algorithm uses utility scores, which represent how usefu ...
Deep learning systems are typically trained in static environments and fail to adapt when faced with a continuous stream of new tasks. Continual learning addresses this by allowing neural networks to learn sequentially without forgetting prior knowledge. However, such models ofte ...

Layerwise Perspective into Continual Backpropagation

Replacing the First Layer is All You Need

Continual learning faces a problem, known as plasticity loss, where models gradually lose the ability to adapt to new tasks. We investigate Continual Backpropagation (CBP) – a method that tackles plasticity loss by constantly resetting a small fraction of low-utility neurons. We ...
As financial institutions adopt more sophisticated Anti-Money Laundering (AML) techniques, such as the deployment of Graph Neural Networks (GNNs) to detect patterns, laundering behavior is likely to evolve. In this paper, we present a novel perturbation framework that models laun ...

Maintaining Plasticity for Deep Continual Learning

Activation Function-Adapted Parameter Resetting Approaches

Standard deep learning utensils, in particular feed-forward artificial neural networks and the backpropagation algorithm, fail to adapt to sequential learning scenarios, where the model is continuously presented with new training data. Many algorithms that aim to solve this probl ...

Breaking the Trade-Off

Adaptive Optimization for Scalable, Minimal RBAC

Role-Based Access Control (RBAC) is foundational to enterprise security, yet manual role engineering remains error-prone and unscalable. Although automated role mining addresses this, existing methods face a critical trade-off: exact approaches guarantee minimal roles but fail on ...
There is an increasing need for financial institutions to be able to detect illicit activities such as money laundering. While these institutions currently rely on graph-based analytics or machine learning algorithms for such detection, inter-bank collaboration is hindered by pri ...
Financial institutions have a large responsibility when it comes to detecting and preventing financial crime. However, dedicated tools to aid in financial crime detection have more demand than supply. The combination of regulatory restrictions with regards to sharing client infor ...
Financial crime represents a growing issue which contemporary society is facing, especially in the form of money laundering, which aims to conceal the origin of illicit funds through a network of intermediate transactions. State of the art solutions for detection of money launder ...
Synthetic polymers are crucial in diverse industries, but current AI-driven design methodologies primarily target linear homopolymers, with limited emphasis on developing customized approaches for copolymers. To address this gap, we introduce a generative model for goal-directed ...
Mesh data is widely used in engineering for instance for simulations, CAD engineering and visualizations. The accuracy and quality of the meshes influence the reliability and validity of these processes. Besides manual modelling, scanning is becoming increasingly more common due ...
Recent advancements in machine learning (ML) have shown promise in accelerating polymer discovery by aiding in tasks such as virtual screening via property prediction, and the design of new polymer materials with desired chemical properties. However, progress in polymer ML is ham ...

Independent Thinkers and Scientific Progress

An Analysis of Superstar Influence on Computer Science Research Dynamics

In the scientific community, a few prominent researchers, known as "superstars," receive most of the attention, citations, and resources. However, it is unclear whether they promote true innovation. This study replicates and extends previous work analyzing how superstars influenc ...

Trust the System

Auditing Privacy- preserving Medical Data Analysis in a Distributed Manner

Recent developments in the capability and availability of small internet of things devices has meant that networked medical devices, like networked implants and wearable monitors, have become more widespread. This data is invaluable for solving pressing global healthcare concerns ...
Simulating lighting is one of the most important parts of rendering 3D scenes. While lighting coming directly from a light source is easy to simulate in real-time, indirect illumination is more difficult. One of the methods used to convincingly approximate indirect illumination i ...
Motivation: Many tumors show deficiencies in DNA damage repair. These deficiencies can play a role in the disease, but also expose vulnerabilities with therapeutic potential. Targeted treatments exploit specific repair deficiencies, for instance based on synthetic lethality. To d ...