@MuhammadAdilIn1 Profile picture

Adil Inam

@MuhammadAdilIn1

CS PhD@UIUC. Researching ML evaluation, security, privacy, & HCI. https://t.co/rYcSQfmdEO. All opinions are my own.

Similar User
Jaron Mink photo

@JaronMink

Yinfang photo

@yinfang_chen

Ammar photo

@ammart24

Muhammad Muzammil photo

@muzammilbuddy

Mohammad Hamza photo

@Hamza199840

Furqi photo

@Mr____Dreamer

Danish al gaib | دانش photo

@danishnxt

Adil Inam Reposted

The code is publicly available at github.com/Intelligent-CA…. Please open an issue on the repo if you want to translate your "Java" project into "Python"

Introducing Alphatrans, a neuro-symbolic approach for translation and validation of "whole repository" of the large-scale real-world programs. Led by my amazing PhD student @alibrahimzada at @IllinoisCDS and in collaboration with @IBMResearch Paper: arxiv.org/abs/2410.24117



Yes please.

HELL YES @geo_uiuc! Getting research assistants into the bargaining unit will completely transform graduate labor North of Green St. I strongly encourage computing grad students to get involved at uiucgeo.org/ra-homepage

Tweet Image 1


Adil Inam Reposted

I'm on the academic job market I'm a full-stack data privacy researcher I build systems that are 1)provably private 2)functionally-rich 3)compatible w/ real-world constraints I do this by exploring the synergy between cryptography & differential privacy, both in theory & practice


The struggle is real. 🤷‍♂️

I have never had such a hard time proving I am a human.

Tweet Image 1


Keep an eye out for our presentations. 🕴️

Paper link here: gangw.cs.illinois.edu/mitre24.pdf. We disclosed our results to the surveyed company’s, @MITREattack and CITD, and will be also be presenting these results at ATTACKCon 5.0 this Fall.



Listen to this guy.

👇 spoiler warning for intrusion detection research 👇



Adil Inam Reposted

Paper link here: gangw.cs.illinois.edu/mitre24.pdf. We disclosed our results to the surveyed company’s, @MITREattack and CITD, and will be also be presenting these results at ATTACKCon 5.0 this Fall.


Adil Inam Reposted

To understand how @MITREattack is used in commercial endpoint detection products, @avirkud4 led an analysis of the ATT&CK technique annotations in the @carbonb1ack, @splunk, @elastic, and Sigma rulesets.


Adil Inam Reposted

Upcoming at @USENIXSecurity’24 — In (academic) systems security research, name checking @MITREattack has been the “peer review armor” of choice for a lot of work recently. But do these papers understand what ATT&CK is(n’t)? What about commercial products?


Adil Inam Reposted

Inspired to get creative with my poster for @ictmc2024 this week! I shared my work on bayesian generalised linear mixed models to optimise treatment dosage in early phase trials using Patient-reported Outcomes. #ICTMC2024 #clinicaltrials

Great Idea for Poster presentation...!!! Via Caroline O'Donnell/O'Flaherty Lab (Linkedin) #scicomm #scienceoutreach #sciencetalk #scienceposter



Adil Inam Reposted

Traditionally in ML, building models is the central activity and evaluation is a bit of an afterthought. But the story of ML over the last decade is that models are more general-purpose and more capable. General purpose means you build once but have to evaluate everywhere.…


Adil Inam Reposted

Every person who you mentor is a unique individual, and none of them are you. Mentoring isn’t about sharing what you would do, but exploring what’s best for them to do.


Adil Inam Reposted

Woooooo great job @MuhammadAdilIn1 !!!

Tweet Image 1

Adil Inam Reposted

Tomorrow morning in Session 9C (9am, Bayview AB) — system auditing research may not be sexy, but it has *exploded* since 2015. Come watch @MuhammadAdilIn1 and I break it all down for you in our data provenance SoK, “History is a vast early warning system!”

Tweet Image 1

Adil Inam Reposted

Excited to announce that our *data provenance* SoK, "History is a Vast Early Warning System: Auditing the Provenance of System Intrusions," has been conditionally accepted to @IEEESSP #Oakland23. Before finalizing the camera-ready paper, we need your help!


Adil Inam Reposted

A great ride with @MuhammadAdilIn1 @wajihulhasan @AliThespy @AdamBatesOrg and other collaborators to @NDSSSymposium! #NDSS22 It's eye-opening when @wajihulhasan first showed me that configurations can be as crazy as part of attack vectors by presenting CVE-2016-7790 in CS 523.

Excited to share that our work "Forensic Analysis of Configuration-based Attacks" has been (conditionally) accepted to @NDSSSymposium #NDSS22! Congrats to student authors Adil Inam, @wajihulhasan, and Ali Ahad (UVA).



United States Trends
Loading...

Something went wrong.


Something went wrong.