Search Results for author: Matthew Wright

Found 8 papers, 6 papers with code

On the Limitations of Continual Learning for Malware Classification

1 code implementation13 Aug 2022 Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright

To our surprise, continual learning methods significantly underperformed naive Joint replay of the training data in nearly all settings -- in some cases reducing accuracy by more than 70 percentage points.

Continual Learning General Classification +2

Gradient Frequency Modulation for Visually Explaining Video Understanding Models

no code implementations1 Nov 2021 Xinmiao Lin, Wentao Bao, Matthew Wright, Yu Kong

In many applications, it is essential to understand why a machine learning model makes the decisions it does, but this is inhibited by the black-box nature of state-of-the-art neural networks.

Action Recognition Temporal Action Localization +1

Weaponizing Unicodes with Deep Learning -- Identifying Homoglyphs with Weakly Labeled Data

1 code implementation9 Oct 2020 Perry Deng, Cooper Linsky, Matthew Wright

Visually similar characters, or homoglyphs, can be used to perform social engineering attacks or to evade spam and plagiarism detectors.

Clustering Transfer Learning

They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization

no code implementations16 Sep 2019 Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan

In this paper, we present AdversarialPSO, a black-box attack that uses fewer queries to create adversarial examples with high success rates.

Image Classification

Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks

1 code implementation18 Feb 2019 Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright

To further investigate the value of timing information, we perform an information leakage analysis on our proposed handcrafted features.

Website Fingerprinting Attacks Cryptography and Security

Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces

1 code implementation18 Feb 2019 Mohsen Imani, Mohammad Saidur Rahman, Nate Mathews, Matthew Wright

Since the attacker gets to design his classifier based on the defense design, we first demonstrate that at least one technique for generating adversarial-example based traces fails to protect against an attacker using adversarial training for robust classification.

Website Fingerprinting Defense Cryptography and Security

Computing Minimal Presentations and Bigraded Betti Numbers of 2-Parameter Persistent Homology

2 code implementations15 Feb 2019 Michael Lesnick, Matthew Wright

Motivated by applications to topological data analysis, we give an efficient algorithm for computing a (minimal) presentation of a bigraded $K[x, y]$-module $M$, where $K$ is a field.

Algebraic Topology Symbolic Computation Commutative Algebra 55N31, 13D02

Modified Relay Selection and Circuit Selection for Faster Tor

1 code implementation26 Aug 2016 Mohsen Imani, Mehrdad Amirabadi, Matthew Wright

In this paper, we examine both the process of selecting among pre-built circuits and the process of selecting the path of relays for use in building new circuits to improve performance while maintaining anonymity.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.