no code implementations • 16 May 2023 • Veronika Stephanie, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman
In the convergence, edge server is used for both storing IoT produced bioimage and hosting DNN algorithm for local model training.
no code implementations • 26 Apr 2023 • Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras
The role-based access control is developed to determine users' roles and rights in smart contracts.
no code implementations • 25 Apr 2023 • Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor
In FL, local models can be tampered with by attackers.
no code implementations • 5 Dec 2022 • Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully
We implement transformer models for two distinct InfoSec data formats - specifically URLs and PE files - in a novel end-to-end approach, and explore a variety of architectural designs, training regimes, and experimental settings to determine the ingredients necessary for performant detection models.
1 code implementation • 13 Aug 2022 • Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright
To our surprise, continual learning methods significantly underperformed naive Joint replay of the training data in nearly all settings -- in some cases reducing accuracy by more than 70 percentage points.
1 code implementation • 18 Feb 2019 • Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright
To further investigate the value of timing information, we perform an information leakage analysis on our proposed handcrafted features.
Website Fingerprinting Attacks Cryptography and Security
1 code implementation • 18 Feb 2019 • Mohsen Imani, Mohammad Saidur Rahman, Nate Mathews, Matthew Wright
Since the attacker gets to design his classifier based on the defense design, we first demonstrate that at least one technique for generating adversarial-example based traces fails to protect against an attacker using adversarial training for robust classification.
Website Fingerprinting Defense Cryptography and Security