<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy">
		<rdfs:label><![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]></rdfs:label>
		<pub:title><![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-09-01T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[Neurosymbolic artificial intelligence (AI) is an emerging and quickly advancing field that
combines the subsymbolic strengths of (deep) neural networks and the explicit, symbolic
knowledge contained in knowledge graphs (KGs) to enhance explainability and safety in
AI systems. This approach addresses a key criticism of current generation systems,
namely, their inability to generate human-understandable explanations for their
outcomes and ensure safe behaviors, especially in scenarios with unknown unknowns
(e.g., cybersecurity, privacy). The integration of neural networks, which excel at exploring
complex data spaces, and symbolic KGs representing domain knowledge, allows AI
systems to reason, learn, and generalize in a manner understandable to experts. This
article describes how applications in cybersecurity and privacy, two of the most
demanding domains in terms of the need for AI to be explainable while being highly
accurate in complex environments, can benefit from neurosymbolic AI.]]></pub:abstract>
		<pub:pages><![CDATA[43-48]]></pub:pages>
		<pub:number><![CDATA[5]]></pub:number>
		<pub:note><![CDATA[doi: 10.1109/MIC.2023.3299435.]]></pub:note>
		<pub:volume><![CDATA[27]]></pub:volume>
		<pub:counter>1071</pub:counter>
		<pub:booktitle><![CDATA[IEEE Internet Computing]]></pub:booktitle>
		<pub:publisher><![CDATA[IEEE]]></pub:publisher>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest>									<rdf:List>
										<rdf:first>
											<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anantaa/Kotal"><person:name><![CDATA[Anantaa Kotal]]></person:name><rdfs:label><![CDATA[Anantaa Kotal]]></rdfs:label></person:Person>
										</rdf:first>
										<rdf:rest>											<rdf:List>
												<rdf:first>
													<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Manas/Gaur"><person:name><![CDATA[Manas Gaur]]></person:name><rdfs:label><![CDATA[Manas Gaur]]></rdfs:label></person:Person>
												</rdf:first>
												<rdf:rest>													<rdf:List>
														<rdf:first>
															<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Seyedreza/Mohseni"><person:name><![CDATA[Seyedreza Mohseni]]></person:name><rdfs:label><![CDATA[Seyedreza Mohseni]]></rdfs:label></person:Person>
														</rdf:first>
														<rdf:rest rdf:resource="&rdf;nil" />
													</rdf:List>
												</rdf:rest>
											</rdf:List>
										</rdf:rest>
									</rdf:List>
								</rdf:rest>
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/1245.pdf]]></pub:softCopyURI>
			<pub:softCopySize>517035</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:Article>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
