Search Results for author: Sencun Zhu

Found 9 papers, 3 papers with code

HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning

no code implementations10 May 2023 Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta

One effective approach to improving IoT security is to deploy IoT honeypot systems, which can collect attack information and reveal the methods and strategies used by attackers.

reinforcement-learning Vocal Bursts Intensity Prediction

Learning to Backdoor Federated Learning

1 code implementation6 Mar 2023 Henger Li, Chen Wu, Sencun Zhu, Zizhan Zheng

In particular, we propose a general reinforcement learning-based backdoor attack framework where the attacker first trains a (non-myopic) attack policy using a simulator built upon its local data and common knowledge on the FL system, which is then applied during actual FL training.

Backdoor Attack Federated Learning +1

Federated Unlearning with Knowledge Distillation

no code implementations24 Jan 2022 Chen Wu, Sencun Zhu, Prasenjit Mitra

Federated Learning (FL) is designed to protect the data privacy of each client during the training process by transmitting only models instead of the original data.

Federated Learning Knowledge Distillation

AppQ: Warm-starting App Recommendation Based on View Graphs

no code implementations8 Sep 2021 Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang

In this work, we propose AppQ, a novel app quality grading and recommendation system that extracts inborn features of apps based on app source code.

Recommendation Systems

Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder

1 code implementation27 Dec 2020 Lun-Pin Yuan, Peng Liu, Sencun Zhu

One of the most challenging problems in the field of intrusion detection is anomaly detection for discrete event logs.

Anomaly Detection Intrusion Detection

Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users

1 code implementation27 Dec 2020 Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu

Autoencoder-based anomaly detection methods have been used in identifying anomalous users from large-scale enterprise logs with the assumption that adversarial activities do not follow past habitual patterns.

Anomaly Detection

Mitigating Backdoor Attacks in Federated Learning

no code implementations28 Oct 2020 Chen Wu, Xian Yang, Sencun Zhu, Prasenjit Mitra

To minimize the pruning influence on test accuracy, we can fine-tune after pruning, and the attack success rate drops to 6. 4%, with only a 1. 7% loss of test accuracy.

Federated Learning

No Peeking through My Windows: Conserving Privacy in Personal Drones

no code implementations26 Aug 2019 Alem Fitwi, Yu Chen, Sencun Zhu

Hence, this mechanism detects window objects in every image or frame of a real-time video and masks them chaotically to protect the privacy of people.

object-detection Object Detection +1

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

no code implementations30 Aug 2018 Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller

Such popularity, however, may attract attackers to exploit the vulnerabilities of the deployed deep learning models and launch attacks against security-sensitive applications.

Data Poisoning General Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.