Zum Hauptinhalt springen

Showing 1–4 of 4 results for author: Turnbull, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2109.09259  [pdf, other

    cs.CR

    A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments

    Authors: Nickolaos Koroniotis, Nour Moustafa, Benjamin Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke

    Abstract: The Internet of Things (IoT) paradigm has displayed tremendous growth in recent years, resulting in innovations like Industry 4.0 and smart environments that provide improvements to efficiency, management of assets and facilitate intelligent decision making. However, these benefits are offset by considerable cybersecurity concerns that arise due to inherent vulnerabilities, which hinder IoT-based… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: 8 pages, 3 figures, Accepted at IEEE TrustCom2021

  2. arXiv:2002.05515  [pdf, other

    cs.LG stat.ML

    Improving Deep Learning For Airbnb Search

    Authors: Malay Haldar, Mustafa Abdool, Prashant Ramanathan, Tyler Sax, Lanbo Zhang, Aamir Mansawala, Shulin Yang, Bradley Turnbull, Junshuo Liao

    Abstract: The application of deep learning to search ranking was one of the most impactful product improvements at Airbnb. But what comes next after you launch a deep learning model? In this paper we describe the journey beyond, discussing what we refer to as the ABCs of improving search: A for architecture, B for bias and C for cold start. For architecture, we describe a new ranking neural network, focusin… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

  3. arXiv:1811.00701  [pdf, other

    cs.CR

    Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset

    Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull

    Abstract: The proliferation of IoT systems, has seen them targeted by malicious third parties. To address this, realistic protection and investigation countermeasures need to be developed. Such countermeasures include network intrusion detection and network forensic systems. For that purpose, a well-structured and representative dataset is paramount for training and validating the credibility of the systems… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.

  4. arXiv:1810.09591  [pdf, other

    cs.LG cs.AI cs.IR stat.ML

    Applying Deep Learning To Airbnb Search

    Authors: Malay Haldar, Mustafa Abdool, Prashant Ramanathan, Tao Xu, Shulin Yang, Huizhong Duan, Qing Zhang, Nick Barrow-Williams, Bradley C. Turnbull, Brendan M. Collins, Thomas Legrand

    Abstract: The application to search ranking is one of the biggest machine learning success stories at Airbnb. Much of the initial gains were driven by a gradient boosted decision tree model. The gains, however, plateaued over time. This paper discusses the work done in applying neural networks in an attempt to break out of that plateau. We present our perspective not with the intention of pushing the fronti… ▽ More

    Submitted 24 October, 2018; v1 submitted 22 October, 2018; originally announced October 2018.

    Comments: 8 pages