A practical survey on faster and lighter transformers
Q Fournier, GM Caron, D Aloise - ACM Computing Surveys, 2023 - dl.acm.org
Recurrent neural networks are effective models to process sequences. However, they are
unable to learn long-term dependencies because of their inherent sequential nature. As a …
unable to learn long-term dependencies because of their inherent sequential nature. As a …
Transformers and large language models for efficient intrusion detection systems: A comprehensive survey
H Kheddar - arXiv preprint arXiv:2408.07583, 2024 - arxiv.org
With significant advancements in Transformers LLMs, NLP has extended its reach into many
research fields due to its enhanced capabilities in text generation and user interaction. One …
research fields due to its enhanced capabilities in text generation and user interaction. One …
Language models for novelty detection in system call traces
Due to the complexity of modern computer systems, novel and unexpected behaviors
frequently occur. Such deviations are either normal occurrences, such as software updates …
frequently occur. Such deviations are either normal occurrences, such as software updates …
DongTing: a large-scale dataset for anomaly detection of the Linux kernel
Host-based intrusion detection systems (HIDS) can automatically identify adversarial
applications by learning models from system events that represent normal system behaviors …
applications by learning models from system events that represent normal system behaviors …
Anomaly detection in microservice environments using distributed tracing data analysis and NLP
In recent years DevOps and agile approaches like microservice architectures and
Continuous Integration have become extremely popular given the increasing need for …
Continuous Integration have become extremely popular given the increasing need for …
Accurate Path Prediction of Provenance Traces
R Ahmad, HY Jung, Y Nakamura, T Malik - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
Several security and workflow applications require provenance information at the operating
system level for diagnostics. The resulting provenance traces are often more informative if …
system level for diagnostics. The resulting provenance traces are often more informative if …
Anomalous energy detection for resource-constrained embedded systems using tracing data analysis
Since the multi-sensor embedded systems are spread all over the urban and suburban
areas, there should be a real-time performance analysis framework to monitor the energy …
areas, there should be a real-time performance analysis framework to monitor the energy …
Toward Adaptive Tracing: Efficient System Behavior Analysis using Language Models
Tracing, a technique essential for unraveling the complexities of computer systems'
behavior, involves the organized collection of low-level events, enabling anomaly …
behavior, involves the organized collection of low-level events, enabling anomaly …
Timing Behavior Characterization of Critical Real-Time Systems through Hybrid Timing Analysis
The spread of computing-systems, especially the realtime embedded ones, is rapidly
growing in the last years, since they find usage in numerous fields of application, including …
growing in the last years, since they find usage in numerous fields of application, including …
[PDF][PDF] Investigation of Transformers and Other Machine Learning Techniques for Health Data Classification
L Yamazaki - 2024 - jewlscholar.mtsu.edu
I am particularly grateful to the committee members Dr. Arpan Sainju and Dr Yeqian Liu for
their time, support, and valuable advice. Their insights and feedback have been crucial in …
their time, support, and valuable advice. Their insights and feedback have been crucial in …