Search Results

Security and Privacy of Lightning Network Payments with Uncertain Channel Balances

2 code implementations15 Mar 2021

Applying negative Bernoulli trials for single- and multi-part payments allows us to compute the expected number of payment attempts for a given amount, sender, and receiver.

Cryptography and Security

AttackNet: Enhancing Biometric Security via Tailored Convolutional Neural Network Architectures for Liveness Detection

2 code implementations6 Feb 2024

Biometric security is the cornerstone of modern identity verification and authentication systems, where the integrity and reliability of biometric samples is of paramount importance.

Benchmarking

MiniCPS: A toolkit for security research on CPS Networks

1 code implementation17 Jul 2015

While a great amount of research has been conducted on network security of office and home networks, recently the security of CPS and related systems has gained a lot of attention.

Networking and Internet Architecture Cryptography and Security

Provably Secure Networks: Methodology and Toolset for Configuration Management

1 code implementation28 Aug 2017

Network administration is an inherently complex task, in particular with regard to security.

Networking and Internet Architecture Cryptography and Security

Formal Security Analysis of Neural Networks using Symbolic Intervals

4 code implementations28 Apr 2018

In this paper, we present a new direction for formally checking security properties of DNNs without using SMT solvers.

Autonomous Vehicles Collision Avoidance

MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research

1 code implementation13 Mar 2024

Thus, there is a need for controlled testbeds and measurement tools for cellular access networks doing justice to the technology's unique structure and global scope.

Networking and Internet Architecture Cryptography and Security

Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis

1 code implementation28 Feb 2025

In particular, two critical challenges arise: the need for human expertise in developing AI/ML-based security mechanisms, and the threat of adversarial attacks targeting AI/ML models.

AutoML Intrusion Detection

SecDD: Efficient and Secure Method for Remotely Training Neural Networks

1 code implementation19 Sep 2020

We leverage what are typically considered the worst qualities of deep learning algorithms - high computational cost, requirement for large data, no explainability, high dependence on hyper-parameter choice, overfitting, and vulnerability to adversarial perturbations - in order to create a method for the secure and efficient training of remotely deployed neural networks over unsecured channels.

netFound: Foundation Model for Network Security

1 code implementation25 Oct 2023

This lack of progress can be attributed to an overreliance on supervised learning techniques and the associated challenges of curating well-specified labeled training data.

Feature Engineering feature selection +5