AI Research in CyberSecurity

Research

Our research interests encompass a diverse array of subjects, notably Computer Networks Security, Machine Learning, Internet of Things (IoT), Cloud Computing, and Bioinformatics. In addition to our field of study, we are interested in exploring other research areas, and open to ideas across all avenues of science.

Highlighted

link to download the video instead.
Large Language Models for Automated Characterization of Cybersecurity Vulnerabilities using N-Shot Learning
Ayesha Dina, Elijah Needham, Denis Ulybyshev
The International FLAIRS Conference Proceedings  ·  14 May 2025  ·  doi:10.32473/flairs.38.1.138858

All

2025

link to download the video instead.
Large Language Models for Automated Characterization of Cybersecurity Vulnerabilities using N-Shot Learning
Ayesha Dina, Elijah Needham, Denis Ulybyshev
The International FLAIRS Conference Proceedings  ·  14 May 2025  ·  doi:10.32473/flairs.38.1.138858
FSProtoTransfer: Synergizing Few-Shot, Prototypical Networks, and Transfer Learning for Intrusion Detection in VANETs
FSProtoTransfer: Synergizing Few-Shot, Prototypical Networks, and Transfer Learning for Intrusion Detection in VANETs
Ayesha Dina, Colby Edell, Karim Elish, Arijet Sarker
The International FLAIRS Conference Proceedings  ·  14 May 2025  ·  doi:10.32473/flairs.38.1.138952

2023

FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks
FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks
Dina Ayesha S., Siddique A.B., Manivannan D.
Annual Computer Security Applications Conference  ·  04 Dec 2023  ·  doi:10.1145/3627106.3627193
A deep learning approach for intrusion detection in Internet of Things using focal loss function
A deep learning approach for intrusion detection in Internet of Things using focal loss function
Ayesha S. Dina, A.B. Siddique, D. Manivannan
Internet of Things  ·  01 Jul 2023  ·  doi:10.1016/j.iot.2023.100699
Conditional Privacy-preserving Authentication and Message Dissemination Scheme using Timestamp based Pseudonyms for VANETs
Conditional Privacy-preserving Authentication and Message Dissemination Scheme using Timestamp based Pseudonyms for VANETs
Ayesha S. Dina, D. Manivannan
2023 International Wireless Communications and Mobile Computing (IWCMC)  ·  19 Jun 2023  ·  doi:10.1109/IWCMC58020.2023.10182609
Deep Learning-Based Intrusion Detection Methods for Computer Networks and Privacy
Deep Learning-Based Intrusion Detection Methods for Computer Networks and Privacy
Ayesha Dina
University of Kentucky Libraries  ·  01 Jan 2023  ·  doi:10.13023/etd.2023.292

2022

Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks
Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks
Ayesha Siddiqua Dina, A. B. Siddique, D. Manivannan
IEEE Access  ·  01 Jan 2022  ·  doi:10.1109/ACCESS.2022.3205337

2021

Intrusion detection based on Machine Learning techniques in computer networks
Intrusion detection based on Machine Learning techniques in computer networks
Ayesha S. Dina, D. Manivannan
Internet of Things  ·  01 Dec 2021  ·  doi:10.1016/j.iot.2021.100462
Intrusion detection based on Machine Learning techniques in computer networks

2019

Identifying emerging phenomenon in long temporal phenotyping experiments
Identifying emerging phenomenon in long temporal phenotyping experiments
Jiajie Peng, Junya Lu, Donghee Hoh, Ayesha S Dina, Xuequn Shang, David M Kramer, Jin Chen
Bioinformatics  ·  15 Jul 2019  ·  doi:10.1093/bioinformatics/btz559

2018

Identifying Emerging Phenomenon in Plant Long Temporal Phenotyping Experiments
Identifying Emerging Phenomenon in Plant Long Temporal Phenotyping Experiments
Jiajie Peng, Junya Lu, Donghee Hoh, Ayesha S Dina, Xuequn Shang, David M Kramer, Jin Chen
Cold Spring Harbor Laboratory  ·  26 Oct 2018  ·  doi:10.1101/454686