1 code implementation • 13 Aug 2022 • Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright
To our surprise, continual learning methods significantly underperformed naive Joint replay of the training data in nearly all settings -- in some cases reducing accuracy by more than 70 percentage points.
no code implementations • 1 Nov 2021 • Xinmiao Lin, Wentao Bao, Matthew Wright, Yu Kong
In many applications, it is essential to understand why a machine learning model makes the decisions it does, but this is inhibited by the black-box nature of state-of-the-art neural networks.
1 code implementation • 9 Oct 2020 • Perry Deng, Cooper Linsky, Matthew Wright
Visually similar characters, or homoglyphs, can be used to perform social engineering attacks or to evade spam and plagiarism detectors.
no code implementations • 16 Sep 2019 • Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan
In this paper, we present AdversarialPSO, a black-box attack that uses fewer queries to create adversarial examples with high success rates.
1 code implementation • 18 Feb 2019 • Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright
To further investigate the value of timing information, we perform an information leakage analysis on our proposed handcrafted features.
Website Fingerprinting Attacks Cryptography and Security
1 code implementation • 18 Feb 2019 • Mohsen Imani, Mohammad Saidur Rahman, Nate Mathews, Matthew Wright
Since the attacker gets to design his classifier based on the defense design, we first demonstrate that at least one technique for generating adversarial-example based traces fails to protect against an attacker using adversarial training for robust classification.
Website Fingerprinting Defense Cryptography and Security
2 code implementations • 15 Feb 2019 • Michael Lesnick, Matthew Wright
Motivated by applications to topological data analysis, we give an efficient algorithm for computing a (minimal) presentation of a bigraded $K[x, y]$-module $M$, where $K$ is a field.
Algebraic Topology Symbolic Computation Commutative Algebra 55N31, 13D02
1 code implementation • 26 Aug 2016 • Mohsen Imani, Mehrdad Amirabadi, Matthew Wright
In this paper, we examine both the process of selecting among pre-built circuits and the process of selecting the path of relays for use in building new circuits to improve performance while maintaining anonymity.
Cryptography and Security