1 code implementation • 8 Feb 2024 • Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles Kamhoua, Munindar P. Singh
Experimental results demonstrate that the integration of decision theory not only facilitates effective initial guidance for DRL agents but also promotes a more structured and informed exploration strategy, particularly in environments characterized by large and intricate state spaces.
no code implementations • 1 May 2023 • Joseph Bao, Murat Kantarcioglu, Yevgeniy Vorobeychik, Charles Kamhoua
Over the years, honeypots emerged as an important security tool to understand attacker intent and deceive attackers to spend time and resources.
no code implementations • 22 Mar 2023 • Volviane Saphir Mfogo, Alain Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles Kamhoua
In this paper, we propose a honeypot for IoT devices that uses machine learning techniques to learn and interact with attackers automatically.
no code implementations • 25 May 2022 • Stephanie Milani, Zhicheng Zhang, Nicholay Topin, Zheyuan Ryan Shi, Charles Kamhoua, Evangelos E. Papalexakis, Fei Fang
The first algorithm, IVIPER, extends VIPER, a recent method for single-agent interpretable RL, to the multi-agent setting.
Multi-agent Reinforcement Learning reinforcement-learning +1
no code implementations • 23 Sep 2021 • Junlin Wu, Charles Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik
Next, we present a novel highly scalable approach for approximately solving such games by representing the strategies of both players as neural networks.
no code implementations • 30 Jun 2021 • Juan Shu, Bowei Xi, Charles Kamhoua
Our study reveals the structural problem of DNN classification boundary that leads to the adversarial examples.
no code implementations • 22 Jan 2021 • Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles Kamhoua, Nandi Leslie, Cho-Yu Jason Chiang, Vyas Sekar
A Pareto GAN leverages extreme value theory and the functional properties of neural networks to learn a distribution that matches the asymptotic behavior of the marginal distributions of the features.
no code implementations • 21 Jan 2021 • Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh
Defensive deception is a promising approach for cyber defense.
no code implementations • 13 May 2019 • Zheyuan Ryan Shi, Ariel D. Procaccia, Kevin S. Chan, Sridhar Venkatesan, Noam Ben-Asher, Nandi O. Leslie, Charles Kamhoua, Fei Fang
In order to formally reason about deception, we introduce the feature deception problem (FDP), a domain-independent model and present a learning and planning framework for finding the optimal deception strategy, taking into account the adversary's preferences which are initially unknown to the defender.
1 code implementation • 6 Apr 2019 • Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.
Cryptography and Security