Search Results for author: Seyit Camtepe

Found 27 papers, 8 papers with code

Radio Signal Classification by Adversarially Robust Quantum Machine Learning

no code implementations13 Dec 2023 Yanqiu Wu, Eromanga Adermann, Chandra Thapa, Seyit Camtepe, Hajime Suzuki, Muhammad Usman

Our extensive simulation results present that attacks generated on QVCs transfer well to CNN models, indicating that these adversarial examples can fool neural networks that they are not explicitly designed to attack.

Classification Image Classification +1

Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks

no code implementations28 Sep 2023 Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu

Adversarial training serves as one of the most popular and effective methods to defend against adversarial perturbations.

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization

no code implementations18 Sep 2023 Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu

Moreover, to ameliorate the phenomenon of sub-optimization with one fixed style, we propose to discover the optimal style given a target through style optimization in a continuous relaxation manner.

Face Recognition

Quantum-Inspired Machine Learning: a Survey

no code implementations22 Aug 2023 Larry Huynh, Jin Hong, Ajmal Mian, Hajime Suzuki, Yanqiu Wu, Seyit Camtepe

Quantum-inspired Machine Learning (QiML) is a burgeoning field, receiving global attention from researchers for its potential to leverage principles of quantum mechanics within classical computational frameworks.

Quantum Machine Learning

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

no code implementations27 Jun 2023 Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe

In this context, we proposed a framework that can not only classify legitimate traffic and malicious traffic of DDoS attacks but also use SHAP to explain the decision-making of the classifier model.

Decision Making Explainable artificial intelligence +3

Joint User and Data Detection in Grant-Free NOMA with Attention-based BiLSTM Network

no code implementations14 Sep 2022 Saud Khan, Salman Durrani, Muhammad Basit Shahab, Sarah J. Johnson, Seyit Camtepe

We assume that IoT devices use complex spreading sequences and transmit information in a random-access manner following the burst-sparsity model, where some IoT devices transmit their data in multiple adjacent time slots with a high probability, while others transmit only once during a frame.

An Additive Instance-Wise Approach to Multi-class Model Interpretation

1 code implementation7 Jul 2022 Vy Vo, Van Nguyen, Trung Le, Quan Hung Tran, Gholamreza Haffari, Seyit Camtepe, Dinh Phung

A popular attribution-based approach is to exploit local neighborhoods for learning instance-specific explainers in an additive manner.

Additive models Interpretable Machine Learning

LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data

1 code implementation14 Apr 2022 Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic

Anomaly detection for indoor air quality (IAQ) data has become an important area of research as the quality of air is closely related to human health and well-being.

Anomaly Detection Time Series +1

Towards Web Phishing Detection Limitations and Mitigation

no code implementations3 Apr 2022 Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solutions are laid bare.

Attribute

PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

no code implementations21 Mar 2022 Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere

Existing integrity verification approaches for deep models are designed for private verification (i. e., assuming the service provider is honest, with white-box access to model parameters).

Model Compression

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors

1 code implementation19 Nov 2021 Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal

We find that (i) commercial antivirus engines are vulnerable to AMM-guided test cases; (ii) the ability of a manipulated malware generated using one detector to evade detection by another detector (i. e., transferability) depends on the overlap of features with large AMM values between the different detectors; and (iii) AMM values effectively measure the fragility of features (i. e., capability of feature-space manipulation to flip the prediction results) and explain the robustness of malware detectors facing evasion attacks.

Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware

no code implementations26 Oct 2021 Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe

Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware families when such obfuscated malware samples are present in the training dataset, resulting in high false-positive rates.

Few-Shot Learning Malware Detection

Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance

no code implementations19 Sep 2021 Praveen Joshi, Chandra Thapa, Seyit Camtepe, Mohammed Hasanuzzamana, Ted Scully, Haithem Afli

Federated Learning (FL), Split Learning (SL), and SplitFed Learning (SFL) are three recent developments in distributed machine learning that are gaining attention due to their ability to preserve the privacy of raw data.

Federated Learning Image Classification +1

Characterizing Malicious URL Campaigns

1 code implementation29 Aug 2021 Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware.

FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation

no code implementations9 Jun 2021 Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdran, Seyit Camtepe, Vijay Varadharajan, Surya Nepal

FedDICE integrates federated learning (FL), which is privacy-preserving learning, to SDN-oriented security architecture to enable collaborative learning, detection, and mitigation of ransomware attacks.

Federated Learning Privacy Preserving

Peeler: Profiling Kernel-Level Events to Detect Ransomware

no code implementations29 Jan 2021 Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal

Based on those characteristics, we develop Peeler that continuously monitors a target system's kernel events and detects ransomware attacks on the system.

Malware Detection Cryptography and Security

Understanding and Achieving Efficient Robustness with Adversarial Supervised Contrastive Learning

1 code implementation25 Jan 2021 Anh Bui, Trung Le, He Zhao, Paul Montague, Seyit Camtepe, Dinh Phung

Central to this approach is the selection of positive (similar) and negative (dissimilar) sets to provide the model the opportunity to `contrast' between data and class representation in the latent space.

Contrastive Learning

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

no code implementations24 Aug 2020 Chandra Thapa, Seyit Camtepe

Secondly, this paper investigates secure and privacy-preserving machine learning methods suitable for the computation of precision health data along with their usage in relevant health projects.

BIG-bench Machine Learning Ethics +2

Evaluation of Federated Learning in Phishing Email Detection

no code implementations27 Jul 2020 Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng

For a fixed total email dataset, the global RNN based model suffers by a 1. 8% accuracy drop when increasing organizational counts from 2 to 10.

Distributed Computing Federated Learning +2

SplitFed: When Federated Learning Meets Split Learning

2 code implementations25 Apr 2020 Chandra Thapa, M. A. P. Chamikara, Seyit Camtepe, Lichao Sun

SL provides better model privacy than FL due to the machine learning model architecture split between clients and the server.

BIG-bench Machine Learning Federated Learning

A Channel Perceiving Attack on Long-Range Key Generation and Its Countermeasure

no code implementations19 Oct 2019 Lu Yang, Yansong Gao, Junqing Zhang, Seyit Camtepe, Dhammika Jayalath

Unfortunately, there is no experimental validation for communications environments when there are large-scale and small-scale fading effects.

Cannot find the paper you are looking for? You can Submit a new open access paper.