no code implementations • 16 Apr 2024 • Sajjad Maleki, Subhash Lakshminarayana, E. Veronica Belmega, Carsten Maple
Phasor Measurement Units (PMUs) are used in the measurement, control and protection of power grids.
no code implementations • 8 Jan 2024 • Roberto Leyva, Victor Sanchez, Gregory Epiphaniou, Carsten Maple
Face image synthesis detection is considerably gaining attention because of the potential negative impact on society that this type of synthetic data brings.
no code implementations • 8 Jan 2024 • Roberto Leyva, Victor Sanchez, Gregory Epiphaniou, Carsten Maple
In this paper, we propose a fusion-based strategy to detect face image synthesis while providing resiliency to several attacks.
1 code implementation • 5 Oct 2023 • Samuel Maddock, Graham Cormode, Carsten Maple
In this work, we initiate the study of federated synthetic tabular data generation.
no code implementations • 31 Aug 2023 • Carsten Maple, Lukasz Szpruch, Gregory Epiphaniou, Kalina Staykova, Simran Singh, William Penwarden, Yisi Wen, Zijian Wang, Jagdish Hariharan, Pavle Avramovic
A further issue identified in this report is the systemic risk that AI can introduce to the financial sector.
no code implementations • 29 Jun 2023 • Stratis Limnios, Praveen Selvaraj, Mihai Cucuringu, Carsten Maple, Gesine Reinert, Andrew Elliott
SaGess then constructs a synthetic graph using the subgraphs that have been generated by DiGress.
no code implementations • 8 Jun 2023 • Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple
We also develop a novel aggregation scheme within the encrypted domain, utilizing users' non-poisoning rates, to effectively address data poisoning attacks while ensuring privacy is preserved by the proposed encryption scheme.
no code implementations • 6 May 2023 • Mahender Kumar, Gregory Epiphaniou, Carsten Maple
A threat assessment uses similarity measures based on meta-paths and meta-graphs to assess semantic relations among IOCs.
no code implementations • 6 May 2023 • Mahender Kumar, Ruby Rani, Mirko Botarelli, Gregory Epiophaniou, Carsten Maple
Thus, there needs to be an ontology covering Science and Technology and facilitate multidisciplinary research by connecting topics from different fields and domains that may be related or have commonalities.
no code implementations • 28 Dec 2022 • Petar Radanliev, David De Roure, Carsten Maple, Uchenna Ani
The article forecasts emerging cyber-risks from the integration of AI in cybersecurity.
1 code implementation • 6 Oct 2022 • Samuel Maddock, Graham Cormode, Tianhao Wang, Carsten Maple, Somesh Jha
There is great demand for scalable, secure, and efficient privacy-preserving machine learning models that can be trained over distributed data.
no code implementations • 6 May 2022 • James Jordon, Lukasz Szpruch, Florimond Houssiau, Mirko Bottarelli, Giovanni Cherubin, Carsten Maple, Samuel N. Cohen, Adrian Weller
This explainer document aims to provide an overview of the current state of the rapidly expanding work on synthetic data technologies, with a particular focus on privacy.
no code implementations • 1 Oct 2021 • Subhash Lakshminarayana, Saurav Sthapit, Hamidreza Jahangir, Carsten Maple, H Vincent Poor
Timely detection and identification of any compromised nodes are essential to minimise the adverse effects of these attacks on power grid operations.
no code implementations • 8 Jul 2021 • Subhash Lakshminarayana, Saurav Sthapit, Carsten Maple
Our results show that the SINDy algorithm outperforms the PINN and UKF algorithms in being able to accurately estimate the power grid parameters over a wide range of system parameters (including high and low inertia systems).
no code implementations • 1 Jul 2021 • Xufeng Lin, Chang-Tsun Li, Victor Sanchez, Carsten Maple
Driven by recent advances in object detection with deep neural networks, the tracking-by-detection paradigm has gained increasing prevalence in the research community of multi-object tracking (MOT).
1 code implementation • 2 Feb 2021 • Wentai Wu, Ligang He, Weiwei Lin, Carsten Maple
The results show that the selective behaviour of our algorithm leads to a significant reduction in the number of communication rounds and the amount of time (up to 2. 4x speedup) for the global model to converge and also provides accuracy gain.
1 code implementation • 25 Jan 2021 • Raisa Dzhamtyrova, Carsten Maple
We propose two methods for modelling Value-at-Risk (VaR) which can be used for any time-series data.
no code implementations • 21 Dec 2020 • Yexiang Chen, Subhash Lakshminarayana, Carsten Maple, H. Vincent Poor
To overcome this drawback, we propose a DNN-based OPF predictor that is trained using a meta-learning (MTL) approach.
1 code implementation • 8 Oct 2020 • Raisa Dzhamtyrova, Carsten Maple
The increasing connectivity of data and cyber-physical systems has resulted in a growing number of cyber-attacks.
no code implementations • 27 Sep 2020 • James Bell, Ginestra Bianconi, David Butler, Jon Crowcroft, Paul C. W Davies, Chris Hicks, Hyunju Kim, Istvan Z. Kiss, Francesco Di Lauro, Carsten Maple, Ayan Paul, Mikhail Prokopenko, Philip Tee, Sara I. Walker
On May $28^{th}$ and $29^{th}$, a two day workshop was held virtually, facilitated by the Beyond Center at ASU and Moogsoft Inc.
Physics and Society
1 code implementation • 25 Jun 2020 • David Butler, Chris Hicks, James Bell, Carsten Maple, Jon Crowcroft
Our experimental results show that for groups of size 500 or more, the error associated with our method can be as low as 0. 03 on average and thus the aggregated results can be useful in a number of identity-free contexts.
Cryptography and Security Computers and Society
no code implementations • 19 May 2020 • Petar Radanliev, David De Roure, Kevin Page, Max Van Kleek, Omar Santos, La Treall Maddox, Pete Burnap, Eirini Anthi, Carsten Maple
This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real time intelligence in edge computing.
no code implementations • 3 Oct 2019 • Wentai Wu, Ligang He, Weiwei Lin, Rui Mao, Carsten Maple, Stephen Jarvis
Federated learning (FL) has attracted increasing attention as a promising approach to driving a vast number of end devices with artificial intelligence.
no code implementations • 3 Aug 2019 • Wentai Wu, Ligang He, Weiwei Lin, Yi Su, Yuhua Cui, Carsten Maple, Stephen Jarvis
In light of this, we have developed a prediction-driven, unsupervised anomaly detection scheme, which adopts a backbone model combining the decomposition and the inference of time series data.