2023
DOI: 10.3390/app13085110
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Dialogue State Tracking for Zero-Shot Chat-Based Social Engineering Attack Recognition

Abstract: Human-to-human dialogues constitute an essential research area for linguists, serving as a conduit for knowledge transfer in the study of dialogue systems featuring human-to-machine interaction. Dialogue systems have garnered significant acclaim and rapid growth owing to their deployment in applications such as virtual assistants (e.g., Alexa, Siri, etc.) and chatbots. Novel modeling techniques are being developed to enhance natural language understanding, natural language generation, and dialogue-state tracki… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…Future research efforts must consider other relevant nonfunctional aspects, such as availability, security, maintainability, and relevant trade-offs, possibly using the ATAM software engineering method [32]. As security is relevant for dialog systems [33], it could be interesting to consider a federated learning approach [34,35].…”
Section: Discussionmentioning
confidence: 99%
“…Future research efforts must consider other relevant nonfunctional aspects, such as availability, security, maintainability, and relevant trade-offs, possibly using the ATAM software engineering method [32]. As security is relevant for dialog systems [33], it could be interesting to consider a federated learning approach [34,35].…”
Section: Discussionmentioning
confidence: 99%
“…Although these approaches do not require much domain knowledge or human intervention, they need a large amount of labeled data to train the models. Deep learning approaches are the current state of the art in the AI industry [14,[25][26][27][28][29][30][31][32][33][34]. They utilize deep neural networks to learn high-level features and representations from data, which can be used to recognize intents.…”
Section: Ir In Df Model Categoriesmentioning
confidence: 99%
“…In this paper, we reviewed diverse criminal activities that have incorporated IR methodologies. While a substantial portion of the literature pertains to cyberincidents [16,18,20,31], there exist significant studies related to computer-facilitated offenses such as harassment [14,21,23,32,34], as well as crimes involving computers such as shoplifting [25,28,30,33]. In these scholarly works, IR techniques were instrumental during the collection [16,20,21], examination [16][17][18][19], and analysis [12,16,19,23] phases of DFI.…”
Section: Review Of Ir In Df and Cybercrimementioning
confidence: 99%
See 1 more Smart Citation
“…With this in mind, the present Special Issue of Applied Sciences on "Federated and Transfer Learning Applications" provides an overview of the latest developments in this field. Twenty-four papers were submitted to this Special Issue, and eleven papers [1][2][3][4][5][6][7][8][9][10][11] were accepted (i.e., a 45.8% acceptance rate). The presented papers explore innovative trends of federated learning approaches that enable technological breakthroughs in highimpact areas such as aggregation algorithms, effective training, cluster analysis, incentive mechanisms, influence study of unreliable participants and security/privacy issues, as well as innovative breakthroughs in transfer learning such as Arabic handwriting recognition, literature-based drug-drug interaction, anomaly detection, and chat-based social engineering attack recognition.…”
Section: Introductionmentioning
confidence: 99%