<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>UMBC ebiquity</title>
	<atom:link href="http://ebiquity.umbc.edu/blogger/feed/" rel="self" type="application/rss+xml" />
	<link>https://ebiquity.umbc.edu/blogger</link>
	<description>EBB is the ebiquity research group\\\&#039;s blog at the University of Maryland, Baltimore County (UMBC).  We focus on technologies that facilitate the design, implementation and control of distributed, intelligent information systems -- mobile and pervasive computing, ad hoc networking, multiagent systems, knowledge representation and reasoning, and the semantic web.  As the tides of technology ebb and flow, we hope the good ideas wash up on our beach and the bad ones drift back out to sea.</description>
	<lastBuildDate>Wed, 14 Oct 2020 14:09:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>paper: Context Sensitive Access Control in Smart Home Environments</title>
		<link>https://ebiquity.umbc.edu/blogger/2020/05/30/paper-context-sensitive-access-control-in-smart-home-environments/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Sat, 30 May 2020 21:35:12 +0000</pubDate>
				<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Ontologies]]></category>
		<category><![CDATA[Paper]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Semantic Web]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=6026</guid>

					<description><![CDATA[<p>The PALS system captures physical context from sensed data, reasons about the context and associated context-driven policies to make access-control decisions and detect intrusions into smart home systems based on both network and behavioral data </p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/05/30/paper-context-sensitive-access-control-in-smart-home-environments/">paper: Context Sensitive Access Control in Smart Home Environments</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<hr class="wp-block-separator"/>



<div style="font-size: 120%; margin: 0 0px 0 0px; line-height: 1.2;">
Sofia Dutta, Sai Sree Laya Chukkapalli, Madhura Sulgekar, Swathi Krithivasan, Prajit Kumar Das, and Anupam Joshi, <a href="https://ebiquity.umbc.edu/paper/html/id/887/Context-Sensitive-Access-Control-in-Smart-Home-Environments">Context Sensitive Access Control in Smart Home Environments</a>, 6th IEEE International Conference on Big Data Security on Cloud, May 2020</div>



<hr class="wp-block-separator"/>



<p class="has-medium-font-size">The rise in popularity of Internet of Things (IoT) devices has opened doors for privacy and security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart grids that affect our daily existence. IoT systems are also a source of big data that gets shared via the cloud. IoT systems in a smart home environment have sensitive access control issues since they are deployed in a personal space. The collected data can also be of a highly personal nature. Therefore, it is critical to building access control models that govern who, under what circumstances, can access which sensed data or actuate a physical system. Traditional access control mechanisms are not expressive enough to handle such complex access control needs, warranting the incorporation of new methodologies for privacy and security. In this paper, we propose the creation of the PALS system, that builds upon existing work in an attribute-based access control model, captures physical context collected from sensed data (attributes) and performs dynamic reasoning over these attributes and context-driven policies using Semantic Web technologies to execute access control decisions. Reasoning over user context, details of the information collected by the cloud service provider, and device type our mechanism generates as a consequent access control decisions. Our system&#8217;s access control decisions are supplemented by another sub-system that detects intrusions into smart home systems based on both network and behavioral data. The combined approach serves to determine indicators that a smart home system is under attack, as well as limit what data breach such attacks can achieve.</p>



<hr class="wp-block-separator"/>



<div class="wp-block-image"><figure class="aligncenter size-large"><img src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/09/pals.png" alt="pals architecture" /></figure></div>



<p></p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/05/30/paper-context-sensitive-access-control-in-smart-home-environments/">paper: Context Sensitive Access Control in Smart Home Environments</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>paper: Automating GDPR Compliance using Policy Integrated Blockchain</title>
		<link>https://ebiquity.umbc.edu/blogger/2020/05/30/paper-automating-gdpr-compliance-using-policy-integrated-blockchain/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Sat, 30 May 2020 15:14:51 +0000</pubDate>
				<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[Ontologies]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Semantic Web]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=6016</guid>

					<description><![CDATA[<p>A new paper describing a system integrating a GDPR Ontology with blockchain to support checking data operations for compliance.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/05/30/paper-automating-gdpr-compliance-using-policy-integrated-blockchain/">paper: Automating GDPR Compliance using Policy Integrated Blockchain</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" width="1924" height="1080" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/05/889_poster.png" alt="" class="wp-image-6015"/></figure>



<div style="height:12px" aria-hidden="true" class="wp-block-spacer"></div>



<h2>  Automating GDPR Compliance using Policy Integrated Blockchain</h2>



<hr class="wp-block-separator"/>




<div style="font-size: 120%; margin: 0 30px 0 30px; line-height: 1.2;"> Abhishek Mahindrakar and Karuna Pande Joshi, <a href="https://ebiquity.umbc.edu/paper/html/id/889/Automating-GDPR-Compliance-using-Policy-Integrated-Blockchain">Automating GDPR Compliance using Policy Integrated Blockchain</a>, 6th IEEE International Conference on Big Data Security on Cloud, May 2020.</div>



<hr class="wp-block-separator"/>



<p class="has-medium-font-size">Data protection regulations, like GDPR, mandate security controls to secure personally identifiable information (PII) of the users which they share with service providers. With the volume of shared data reaching exascale proportions, it is challenging to ensure GDPR compliance in real-time. We propose a novel approach that integrates GDPR ontology with blockchain to facilitate real-time automated data compliance. Our framework ensures data operation is allowed only when validated by data privacy policies in compliance with privacy rules in GDPR. When a valid transaction takes place the PII data is automatically stored off-chain in a database. Our system, built using Semantic Web and Ethereum Blockchain, includes an access control system that enforces data privacy policy when data is shared with third parties.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/05/30/paper-automating-gdpr-compliance-using-policy-integrated-blockchain/">paper: Automating GDPR Compliance using Policy Integrated Blockchain</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>paper:  Temporal Understanding of Cybersecurity Threats</title>
		<link>https://ebiquity.umbc.edu/blogger/2020/05/28/paper-temporal-understanding-of-cybersecurity-threats/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Thu, 28 May 2020 22:02:00 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Knowledge Graph]]></category>
		<category><![CDATA[KR]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[NLP]]></category>
		<category><![CDATA[Paper]]></category>
		<category><![CDATA[research]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=5990</guid>

					<description><![CDATA[<p>This paper how to apply dynamic topic models to a set of cybersecurity documents to understand how the concepts found in them are changing over time.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/05/28/paper-temporal-understanding-of-cybersecurity-threats/">paper:  Temporal Understanding of Cybersecurity Threats</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<!-- <figure class="wp-block-image size-large"><img loading="lazy" width="1200" height="600" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/05/888_movie_small.png" alt="" class="wp-image-6006"/></figure> -->



<figure class="wp-block-video"><video controls poster="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/05/888_movie.png" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/05/sleeman_finin_IEEE_2020_CyberSecurity_Workshop.mp4" playsinline></video><figcaption>Click to view this narrated presentation from the conference</figcaption></figure>



<h1 class="has-text-align-center"><strong>Temporal Understanding of Cybersecurity Threats</strong></h1>



<hr class="wp-block-separator"/>



<div style="font-size: 120%; margin: 0 30px 0 30px; line-height: 1.2;"> Jennifer Sleeman, Tim Finin, and Milton Halem, <a href="http://ebiquity.umbc.edu/get/a/publication/959.pdf">Temporal Understanding of Cybersecurity Threats</a>, IEEE International Conference on Big Data Security on Cloud, May 2020.</div>



<hr class="wp-block-separator"/>



<p class="has-medium-font-size">As cybersecurity-related threats continue to increase, understanding how the field is changing over time can give insight into combating new threats and understanding historical events. We show how to apply dynamic topic models to a set of cybersecurity documents to understand how the concepts found in them are changing over time. We correlate two different data sets, the first relates to specific exploits and the second relates to cybersecurity research. We use Wikipedia concepts to provide a basis for performing concept phrase extraction and show how using concepts to provide context improves the quality of the topic model. We represent the results of the dynamic topic model as a knowledge graph that could be used for inference or information discovery.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/05/28/paper-temporal-understanding-of-cybersecurity-threats/">paper:  Temporal Understanding of Cybersecurity Threats</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/05/sleeman_finin_IEEE_2020_CyberSecurity_Workshop.mp4" length="12778262" type="video/mp4" />

			</item>
		<item>
		<title>Paper: Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata</title>
		<link>https://ebiquity.umbc.edu/blogger/2020/05/24/paper-reinforcement-quantum-annealing-a-hybrid-quantum-learning-automata/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Sun, 24 May 2020 15:20:21 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[Paper]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[SAT]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=5976</guid>

					<description><![CDATA[<p>Results using the reinforcement learning technique on two SAT benchmarks using a D-Wave 2000Q quantum processor showed significantly better solutions with fewer samples compared to the best-known quantum annealing techniques.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/05/24/paper-reinforcement-quantum-annealing-a-hybrid-quantum-learning-automata/">Paper: Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" width="1600" height="800" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/05/water_on_screen_tweet.png" alt="" class="wp-image-5988"/></figure>



<h2 class="has-text-align-center"><strong>Reinforcement Quantum Annealing:</strong><br /><strong> A Hybrid Quantum Learning Automata</strong></h2>



<hr class="wp-block-separator"/>



<div style="font-size: 115%; margin: 0 30px 0 30px; line-height: 1.2;">Ramin Ayanzadeh, Milton Halem, and Tim Finin, <a href="https://ebiquity.umbc.edu/paper/html/id/897/Reinforcement-Quantum-Annealing-A-Hybrid-Quantum-Learning-Automata">Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata</a>, Nature Scientific Reports, v10, n1, May 2020</div>



<hr class="wp-block-separator"/>



<p>We introduce the notion of reinforcement quantum annealing (RQA) scheme in which an intelligent agent searches in the space of Hamiltonians and interacts with a quantum annealer that plays the stochastic environment role of learning automata. At each iteration of RQA, after analyzing results (samples) from the previous iteration, the agent adjusts the penalty of unsatisfied constraints and re-casts the given problem to a new Ising Hamiltonian. As a proof-of-concept, we propose a novel approach for casting the problem of Boolean satisfiability (SAT) to Ising Hamiltonians and show how to apply the RQA for increasing the probability of finding the global optimum. Our experimental results on two different benchmark SAT problems (namely factoring pseudo-prime numbers and random SAT with phase transitions), using a D-Wave 2000Q quantum processor, demonstrated that RQA finds notably better solutions with fewer samples, compared to the best-known techniques in the realm of quantum annealing.</p>



<p><strong>See also:</strong> </p>



<ul><li><strong><a href="https://www.nature.com/articles/s41598-020-64078-1">publisher&#8217;s site</a></strong>; </li><li>R. Ayanzadeh, <a href="https://ebiquity.umbc.edu/paper/html/id/890/Leveraging-Artificial-Intelligence-to-Advance-Problem-Solving-with-Quantum-Annealers">Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers</a>, Phd dissertation, UMBC, 2020 .</li></ul>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/05/24/paper-reinforcement-quantum-annealing-a-hybrid-quantum-learning-automata/">Paper: Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach</title>
		<link>https://ebiquity.umbc.edu/blogger/2020/01/03/reinforcement-quantum-annealing-a-quantum-assisted-learning-automata-approach/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Sat, 04 Jan 2020 01:57:55 +0000</pubDate>
				<category><![CDATA[Paper]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[SAT]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=5961</guid>

					<description><![CDATA[<p>Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach We introduce the reinforcement quantum annealing (RQA) scheme in which an intelligent agent interacts with a quantum annealer that plays the stochastic environment role of learning automata and tries to iteratively find better Ising Hamiltonians for the given problem of interest. As a proof-of-concept, we propose a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/01/03/reinforcement-quantum-annealing-a-quantum-assisted-learning-automata-approach/">Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img loading="lazy" width="1024" height="563" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/01/two-photon-header-1024x563.jpg" alt="" class="wp-image-5962" srcset="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/01/two-photon-header-1024x563.jpg 1024w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/01/two-photon-header-300x165.jpg 300w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/01/two-photon-header-768x422.jpg 768w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2020/01/two-photon-header.jpg 1400w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2 style="text-align:center">Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach</h2>



<div style="font-size: 115%; margin: 0 30px 0 30px; line-height: 1.2;">Ramin Ayanzadeh, Milton Halem, and Tim Finin, <a href="https://ebiquity.umbc.edu/paper/html/id/880/Reinforcement-Quantum-Annealing-A-Quantum-Assisted-Learning-Automata-Approach">Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach</a>, arXiv:2001.00234 [quant-ph], January 1, 2020.</div>



<p>  </p>



<p>We introduce the reinforcement quantum annealing (RQA) scheme in which an intelligent agent interacts with a quantum annealer that plays the stochastic environment role of learning automata and tries to iteratively find better Ising Hamiltonians for the given problem of interest. As a proof-of-concept, we propose a novel approach for reducing the NP-complete problem of Boolean satisfiability (SAT) to minimizing Ising Hamiltonians and show how to apply the RQA for increasing the probability of finding the global optimum. Our experimental results on two different benchmark SAT problems (namely factoring pseudo-prime numbers and random SAT with phase transitions), using a D-Wave 2000Q quantum processor, demonstrated that RQA finds notably better solutions with fewer samples, compared to state-of-the-art techniques in the realm of quantum annealing.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2020/01/03/reinforcement-quantum-annealing-a-quantum-assisted-learning-automata-approach/">Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defense: Taneeya Satyapanich, Modeling and Extracting Information about Cybersecurity Events from Text</title>
		<link>https://ebiquity.umbc.edu/blogger/2019/11/14/umbc-phd-defense-taneeya-satyapanich-modeling-extracting-information-cybersecurity-events-text/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Fri, 15 Nov 2019 01:55:45 +0000</pubDate>
				<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[events]]></category>
		<category><![CDATA[NLP]]></category>
		<category><![CDATA[research]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=5955</guid>

					<description><![CDATA[<p>Ph.D. Dissertation Defense Modeling and Extracting Information about Cybersecurity Events from Text Taneeya Satyapanich 9:30-11:30 Monday, 18 November, 2019, ITE346? People now rely on the Internet to carry out much of their daily activities such as banking, ordering food, and socializing with their family and friends. The technology facilitates our lives, but also comes with [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/11/14/umbc-phd-defense-taneeya-satyapanich-modeling-extracting-information-cybersecurity-events-text/">Defense: Taneeya Satyapanich, Modeling and Extracting Information about Cybersecurity Events from Text</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img loading="lazy" width="1024" height="536" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/cyberattack-1024x536.png" alt="" class="wp-image-5956" style="width:100%" srcset="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/cyberattack.png 1024w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/cyberattack-300x157.png 300w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/cyberattack-768x402.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h4 style="text-align:center"><strong>Ph.D. Dissertation Defense</strong></h4>



<h3 style="text-align:center"><strong>Modeling and Extracting Information about Cybersecurity Events from Text</strong></h3>



<h4 style="text-align:center"><strong>Taneeya Satyapanich</strong></h4>



<h4 style="text-align:center"><strong>9:30-11:30 Monday, 18 November, 2019, ITE346?</strong></h4>



<p>People now rely on the Internet to carry out much of their daily activities such as banking, ordering food, and socializing with their family and friends. The technology facilitates our lives, but also comes with many problems, including cybercrimes, stolen data, and identity theft. With the large and increasing number of transactions done every day, the frequency of cybercrime events is also growing. Since the number of security-related events is too high for manual review and monitoring, we need to train machines to be able to detect and gather data about potential cyber threats. To support machines that can identify and understand threats, we need standard models to store the cybersecurity information and information extraction systems that can collect information to populate the models with data from text.</p>



<p>This dissertation makes two significant contributions. First, we defined rich cybersecurity event schema and annotated the news corpus following the schema. Our schema consists of event type definitions, semantic roles, and event arguments. Second, we present CASIE, a cybersecurity event extraction system. CASIE can detect cybersecurity events, identify event participants and their roles, including specifying realis values. It also groups the events, which are coreference.&nbsp; CASIE produces output in easy to use format as a JSON object.</p>



<p>We believe that this dissertation will be useful for cybersecurity management in the future. It will quickly grasp cybersecurity event information out of the unstructured text and fill in the event frame. So we can compete with tons of cybersecurity events that happen every day.</p>



<p><strong>Committee:</strong>&nbsp;Drs. Tim Finin (chair), Anupam Joshi, Tim Oates, Karuna Pande Joshi, Francis Ferraro</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/11/14/umbc-phd-defense-taneeya-satyapanich-modeling-extracting-information-cybersecurity-events-text/">Defense: Taneeya Satyapanich, Modeling and Extracting Information about Cybersecurity Events from Text</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why does Google think Raymond Chandler starred in Double Indemnity?</title>
		<link>https://ebiquity.umbc.edu/blogger/2019/11/14/why-does-google-think-raymond-chandler-starred-in-double-indemnity/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Thu, 14 Nov 2019 19:00:23 +0000</pubDate>
				<category><![CDATA[Data Science]]></category>
		<category><![CDATA[GENERAL]]></category>
		<category><![CDATA[Knowledge Graph]]></category>
		<category><![CDATA[KR]]></category>
		<category><![CDATA[Semantic Web]]></category>
		<category><![CDATA[Wikidata]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=5933</guid>

					<description><![CDATA[<p>In my knowledge graph class yesterday we talked about the SPARQL query language and I illustrated it with DBpedia queries, including an example getting data about the movie Double Indemnity. I had brought a google assistant device and used it to compare its answers to those from DBpedia. When I asked the Google assistant &#8220;Who [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/11/14/why-does-google-think-raymond-chandler-starred-in-double-indemnity/">Why does Google think Raymond Chandler starred in Double Indemnity?</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img loading="lazy" width="1024" height="536" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/double-indemnityt-1024x536.png" alt="" class="wp-image-5934" style="width:100%" srcset="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/double-indemnityt-1024x536.png 1024w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/double-indemnityt-300x157.png 300w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/double-indemnityt-768x402.png 768w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/double-indemnityt.png 1108w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>In my knowledge graph class yesterday we talked about the SPARQL query language and I illustrated it with DBpedia queries, including an example getting data about the movie <a href="https://en.wikipedia.org/wiki/Double_Indemnity_(film)">Double Indemnity.</a>  I had brought a google assistant device and used it to compare its answers to those from DBpedia.  When I asked the Google assistant &#8220;Who starred in the film Double Indemnity&#8221;, the first person it mentioned was <a href="https://en.wikipedia.org/wiki/Raymond_Chandler">Raymond Chandler</a>.  I knew this was wrong, since he was one of its screenwriters, not an actor, and shared an Academy Award for the screenplay. <a href="http://dbpedia.org/page/Double_Indemnity_(film)"> DBpedia&#8217;s data</a> was correct and did not list Chandler as one of the actors.</p>



<p>I did not feel too bad about this &#8212; we shouldn&#8217;t expect perfect accuracy in these huge, general purpose knowledge graphs and at least Chandler played an important role in making the film.</p>



<p>After class I looked at the Wikidata page for Double Indemnity (<a href="https://www.wikidata.org/wiki/Q478209">Q478209</a>) and saw that it did list Chandler as an actor.  I take this as evidence that Google&#8217;s knowledge Graph got this incorrect fact from Wikidata, or perhaps from a precursor, <a href="https://en.wikipedia.org/wiki/Freebase">Freebase</a>.</p>



<p><strong>The good news </strong> <img src="https://s.w.org/images/core/emoji/13.1.0/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> is that Wikidata had flagged the fact that Chandler (<a href="https://www.wikidata.org/wiki/Q180377">Q180377</a>) was a cast member in Double Indemnity with a &#8220;<a href="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/chander.png">potential Issue</a>&#8220;.  Clicking on this revealed that the issue was that Chandler was not known to have an occupation property that a &#8220;cast member&#8221; property (<a href="https://www.wikidata.org/wiki/Property:P161">P161</a>) expects, which includes twelve types, such as actor, opera singer, comedian, and ballet dancer.  Wikidata lists chandler&#8217;s occupations as screenwriter, novelist, write and poet.</p>



<p><strong>More good news</strong>   <img src="https://s.w.org/images/core/emoji/13.1.0/72x72/1f600.png" alt="😀" class="wp-smiley" style="height: 1em; max-height: 1em;" />  is that the Wikidata fact had provenance information in the form of a reference stating that it came from CSFD (<a href="https://www.wikidata.org/wiki/Q3561957">Q3561957</a>), a &#8220;Czech and Slovak web project providing a movie database&#8221;.  Following the link Wikidata provided led me eventually to the resource, which allowed my to search for and find its <a href="https://www.csfd.cz/film/9776-pojistka-smrti/prehled/">Double Indemnity entry</a>.  Indeed, it lists Raymond Chandler as one of the movie&#8217;s <strong>Hrají</strong>.  All that was left to do was to ask for a translation, which confirmed that Hrají means &#8220;starring&#8221;.</p>



<p>Case closed? Well, not quite.  What remains is fixing the problem.</p>



<p><strong>The final good news </strong> <img src="https://s.w.org/images/core/emoji/13.1.0/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> is that it&#8217;s easy to edit or delete an incorrect fact in Wikidata.  I plan to delete the incorrect fact in class next Monday.  I&#8217;ll look into  possible options to add an annotation in some way to ignore the incorrect ?SFD source for Chander being a cast member over the weekend.</p>



<p></p>



<p><strong>Some possible bad news</strong> <img src="https://s.w.org/images/core/emoji/13.1.0/72x72/1f641.png" alt="🙁" class="wp-smiley" style="height: 1em; max-height: 1em;" /> that public knowledge graphs like Wikidata might be exploited by unscrupulous groups or individuals in the future to promote false or biased information.  Wikipedia is reasonably resilient to this, but the problem may be harder to manage for public knowledge graphs, which get much their data from other sources that could be manipulated.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/11/14/why-does-google-think-raymond-chandler-starred-in-double-indemnity/">Why does Google think Raymond Chandler starred in Double Indemnity?</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>TALK: Real-time knowledge extraction from short semi-structured documents</title>
		<link>https://ebiquity.umbc.edu/blogger/2019/11/03/talk-real-time-knowledge-extraction-from-short-semi-structured-documents/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Mon, 04 Nov 2019 01:33:04 +0000</pubDate>
				<category><![CDATA[NLP]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=5928</guid>

					<description><![CDATA[<p>A semantically rich framework to enable real-time knowledge extraction from short length semi-structured documents Lavana Elluri 10:30-11:30 Monday, 4 November 2019, ITE346 Knowledge is currently maintained as a large volume of unstructured text data in books, laws, regulations and policies, news and social media, academic and scientific reports, conversation and correspondence, etc. Most of these [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/11/03/talk-real-time-knowledge-extraction-from-short-semi-structured-documents/">TALK: Real-time knowledge extraction from short semi-structured documents</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img loading="lazy" width="1024" height="536" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/book-1024x536.png" alt="" class="wp-image-5929"  style="width:100%" srcset="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/book.png 1024w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/book-300x157.png 300w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/11/book-768x402.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h3><strong>A semantically rich framework to enable real-time knowledge extraction from short length semi-structured documents</strong></h3>



<h3>Lavana Elluri</h3>



<h4>10:30-11:30 Monday, 4 November 2019, ITE346</h4>



<p>Knowledge is currently maintained as a large volume of unstructured text data in books, laws, regulations and policies, news and social media, academic and scientific reports, conversation and correspondence, etc. Most of these text documents are not often machine-processable. Hence it is hard to find relevant information from these texts quickly. Extracting and categorizing knowledge from the text of these numerous text stores requires significant manual effort and time. A critical open challenge that we propose to address is automated incremental text classification and identifying context from small documents. Our aim is to develop a semantically rich framework, including algorithms that will extract and classify the context of the text in real-time, to help enable users that update their policies regularly and organizations that are submitting proposals. We will use techniques from deep learning, semantic web, and natural language processing to build this framework. Our objectives include representing knowledge in cloud compliance / legal texts to create and populate a knowledge graph based on data protection regulations. Additionally, we will also correlate rules implemented in the referencing document with the rules in original policies to determine context similarity.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/11/03/talk-real-time-knowledge-extraction-from-short-semi-structured-documents/">TALK: Real-time knowledge extraction from short semi-structured documents</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>TALK: Automated Data Augmentation via Wikidata Relationships</title>
		<link>https://ebiquity.umbc.edu/blogger/2019/10/20/talk-automated-data-augmentation-via-wikidata-relationships-ner-bert-nlp/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Sun, 20 Oct 2019 21:31:04 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[meetings]]></category>
		<category><![CDATA[NLP]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=5923</guid>

					<description><![CDATA[<p>Automated Data Augmentation via Wikidata Relationships Oyesh Singh, UMBC10:30-11:30 Monday, 21 October 2019, ITE 346 With the increase in complexity of machine learning models, there is more need for data than ever. In order to fill this gap of annotated data-scarce situation, we look towards the ocean of free data present in Wikipedia and other [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/10/20/talk-automated-data-augmentation-via-wikidata-relationships-ner-bert-nlp/">TALK: Automated Data Augmentation via Wikidata Relationships</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/10/Screen-Shot-2019-10-20-at-5.21.33-PM-1024x326.png" alt="" class="wp-image-5924" width="100%" srcset="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/10/Screen-Shot-2019-10-20-at-5.21.33-PM-1024x326.png 1024w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/10/Screen-Shot-2019-10-20-at-5.21.33-PM-300x96.png 300w, https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/10/Screen-Shot-2019-10-20-at-5.21.33-PM-768x245.png 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2 style="text-align:center">Automated Data Augmentation via Wikidata Relationships</h2>



<h3 style="text-align:center">Oyesh Singh, UMBC<br />10:30-11:30 Monday, 21 October 2019, ITE 346</h3>



<p>With the increase in complexity of machine learning models, there is more need for data than ever. In order to fill this gap of annotated data-scarce situation, we look towards the ocean of free data present in Wikipedia and other WIkimedia resources. Wikipedia has an enormous amount of data in many languages along with the knowledge graph defined in Wikidata. In this presentation, I will explain how we utilized the Wikipedia/Wikidata data to boost the performance of BERT models for&nbsp;named entity recognition.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/10/20/talk-automated-data-augmentation-via-wikidata-relationships-ner-bert-nlp/">TALK: Automated Data Augmentation via Wikidata Relationships</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>paper: Knowledge Graph Fact Prediction via Knowledge-Enriched Tensor Factorization</title>
		<link>https://ebiquity.umbc.edu/blogger/2019/02/07/paper-knowledge-graph-fact-prediction-via-knowledge-enriched-tensor-factorization/</link>
		
		<dc:creator><![CDATA[Tim Finin]]></dc:creator>
		<pubDate>Fri, 08 Feb 2019 01:12:36 +0000</pubDate>
				<category><![CDATA[GENERAL]]></category>
		<category><![CDATA[fact prediction]]></category>
		<category><![CDATA[graph embedding]]></category>
		<category><![CDATA[knowledge graph]]></category>
		<guid isPermaLink="false">https://ebiquity.umbc.edu/blogger/?p=5892</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/02/07/paper-knowledge-graph-fact-prediction-via-knowledge-enriched-tensor-factorization/">paper: Knowledge Graph Fact Prediction via Knowledge-Enriched Tensor Factorization</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div><img style="width: 100%;" src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2019/02/water_on_screen.png" alt="" /></div>
<h3 style="text-align: center;">Knowledge Graph Fact Prediction via<br />Knowledge-Enriched Tensor Factorization</h3>
<div> </div>
<div style="font-size: 115%; margin: 0 30px 0 30px; line-height: 1.2;">Ankur Padia, Kostantinos Kalpakis, Francis Ferraro and Tim Finin, <a href="https://ebiquity.umbc.edu/paper/html/id/846/">Knowledge Graph Fact Prediction via Knowledge-Enriched Tensor Factorization</a>, Journal of Web Semantics, to appear, 2019</div>
<div>  </div>
<p>We present a family of novel methods for embedding knowledge graphs into real-valued tensors. These tensor-based embeddings capture the ordered relations that are typical in the knowledge graphs represented by semantic web languages like RDF. Unlike many previous models, our methods can easily use prior background knowledge provided by users or extracted automatically from existing knowledge graphs. In addition to providing more robust methods for knowledge graph embedding, we provide a provably-convergent, linear tensor factorization algorithm. We demonstrate the efficacy of our models for the task of predicting new facts across eight different knowledge graphs, achieving between 5% and 50% relative improvement over existing state-of-the-art knowledge graph embedding techniques. Our empirical evaluation shows that all of the tensor decomposition models perform well when the average degree of an entity in a graph is high, with constraint-based models doing better on graphs with a small number of highly similar relations and regularization-based models dominating for graphs with relations of varying degrees of similarity.</p>
<p>The post <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger/2019/02/07/paper-knowledge-graph-fact-prediction-via-knowledge-enriched-tensor-factorization/">paper: Knowledge Graph Fact Prediction via Knowledge-Enriched Tensor Factorization</a> appeared first on <a rel="nofollow" href="https://ebiquity.umbc.edu/blogger">UMBC ebiquity</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
