1 code implementation • 15 Oct 2024 • Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay Jha
We show that in realistic FL settings, state-of-the-art (SOTA) defenses struggle to perform well against backdoor attacks in FL.
no code implementations • 8 May 2024 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere
Honeyfiles are a particularly useful type of honeypot: fake files deployed to detect and infer information from malicious behaviour.
no code implementations • 7 Apr 2024 • David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba
Honeyfiles are a type of honeypot that mimic real, sensitive documents, creating the illusion of the presence of valuable data.
1 code implementation • 12 Mar 2024 • Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere
This work focuses on the systematisation of the state-of-the-art generative models for trajectories in the context of the proposed framework.
no code implementations • 25 Jan 2024 • Shahroz Tariq, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris
By harnessing the strengths of both humans and AI, it significantly improves the efficiency and effectiveness of complex decision-making in dynamic and evolving environments.
no code implementations • CVPR 2024 • Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu
Recognizing the challenge posed by the structural disparities between ViTs and CNNs we introduce a novel module input-independent random entangled self-attention (II-ReSA).
1 code implementation • 18 Dec 2023 • David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere
In many real-world applications, from robotics to pedestrian trajectory prediction, there is a need to predict multiple real-valued outputs to represent several potential scenarios.
1 code implementation • 1 Oct 2023 • Hua Ma, Shang Wang, Yansong Gao, Zhi Zhang, Huming Qiu, Minhui Xue, Alsharif Abuadbba, Anmin Fu, Surya Nepal, Derek Abbott
In VCB attacks, any sample from a class activates the implanted backdoor when the secret trigger is present.
no code implementations • 28 Sep 2023 • Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, Paul Watters, Surya Nepal
This position paper explores the broad landscape of AI potentiality in the context of cybersecurity, with a particular emphasis on its possible risk factors with awareness, which can be managed by incorporating human experts in the loop, i. e., "Human-AI" teaming.
no code implementations • 28 Sep 2023 • Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu
Adversarial training serves as one of the most popular and effective methods to defend against adversarial perturbations.
no code implementations • 20 Sep 2023 • Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer
This paper plans to develop an Equitable and Responsible AI framework with enabling techniques and algorithms for the Internet of Energy (IoE), in short, RAI4IoE.
no code implementations • 18 Sep 2023 • Huihui Gong, Minjing Dong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu
Moreover, to ameliorate the phenomenon of sub-optimization with one fixed style, we propose to discover the optimal style given a target through style optimization in a continuous relaxation manner.
no code implementations • 21 Feb 2023 • Chuyang Zhou, Jiajun Huang, Daochang Liu, Chengbin Du, Siqi Ma, Surya Nepal, Chang Xu
More specifically, knowledge distillation on both the spatial and frequency branches has degraded performance than distillation only on the spatial branch.
no code implementations • 13 Feb 2023 • Jiajun Huang, Xinqi Zhu, Chengbin Du, Siqi Ma, Surya Nepal, Chang Xu
To enhance the performance for such models, we consider the weak compressed and strong compressed data as two views of the original data and they should have similar representation and relationships with other samples.
no code implementations • 16 Jan 2023 • David D. Nguyen, Surya Nepal, Salil S. Kanhere
In the above example, this would form an unacceptable layout with a logo in the centre.
no code implementations • 16 Jan 2023 • David D. Nguyen, David Leibowitz, Surya Nepal, Salil S. Kanhere
Generative models with discrete latent representations have recently demonstrated an impressive ability to learn complex high-dimensional data distributions.
no code implementations • CVPR 2023 • Chen Chen, Daochang Liu, Siqi Ma, Surya Nepal, Chang Xu
However, apart from this standard utility, we identify the "reversed utility" as another crucial aspect, which computes the accuracy on generated data of a classifier trained using real data, dubbed as real2gen accuracy (r2g%).
no code implementations • 24 Nov 2022 • Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal
In this study, we introduce DeepTaster, a novel DNN fingerprinting technique, to address scenarios where a victim's data is unlawfully used to build a suspect model.
no code implementations • 18 Aug 2022 • Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal
The Profiler does not require large data sets to train on to be effective and its analysis of varied email features reduces the impact of concept drift.
no code implementations • 15 Aug 2022 • David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar
Deception is rapidly growing as an important tool for cyber defence, complementing existing perimeter security measures to rapidly detect breaches and data theft.
no code implementations • 7 Apr 2022 • Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal
The large transformer-based language models demonstrate excellent performance in natural language processing.
no code implementations • 3 Apr 2022 • Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal
However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solutions are laid bare.
no code implementations • 21 Mar 2022 • Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere
Existing integrity verification approaches for deep models are designed for private verification (i. e., assuming the service provider is honest, with white-box access to model parameters).
no code implementations • 15 Mar 2022 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil Kanhere
Honeyfile deployment is a useful breach detection method in cyber deception that can also inform defenders about the intent and interests of intruders and malicious insiders.
no code implementations • 14 Mar 2022 • Roelien C. Timmer, David Liebowitz, Surya Nepal, Salil S. Kanhere
We experimented with four different categories of documents in the Monsanto dataset and observed that BERT achieves better F2 scores by 24. 13\% to 65. 79\% for GHOST, 30. 14\% to 54. 88\% for TOXIC, 39. 22\% for CHEMI, 53. 57\% for REGUL compared to existing sensitive information detection models.
no code implementations • CVPR 2022 • Xueyu Wang, Jiajun Huang, Siqi Ma, Surya Nepal, Chang Xu
We argue that the detectors do not share a similar perspective as human eyes, which might still be spoofed by the disrupted data.
no code implementations • 21 Nov 2021 • Kristen Moore, Cody J. Christopher, David Liebowitz, Surya Nepal, Renee Selvey
Cyber deception is emerging as a promising approach to defending networks and systems against attackers and data thieves.
1 code implementation • 19 Nov 2021 • Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal
We find that (i) commercial antivirus engines are vulnerable to AMM-guided test cases; (ii) the ability of a manipulated malware generated using one detector to evade detection by another detector (i. e., transferability) depends on the overlap of features with large AMM values between the different detectors; and (iii) AMM values effectively measure the fragility of features (i. e., capability of feature-space manipulation to flip the prediction results) and explain the robustness of malware detectors facing evasion attacks.
1 code implementation • 29 Aug 2021 • Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal
Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware.
no code implementations • 9 Jun 2021 • Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdran, Seyit Camtepe, Vijay Varadharajan, Surya Nepal
FedDICE integrates federated learning (FL), which is privacy-preserving learning, to SDN-oriented security architecture to enable collaborative learning, detection, and mitigation of ransomware attacks.
no code implementations • 26 May 2021 • Xing Su, Shan Xue, Fanzhen Liu, Jia Wu, Jian Yang, Chuan Zhou, Wenbin Hu, Cecile Paris, Surya Nepal, Di Jin, Quan Z. Sheng, Philip S. Yu
A community reveals the features and connections of its members that are different from those in other communities in a network.
no code implementations • 17 May 2021 • Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone
RAIDER also keeps the number of features to a minimum by selecting only the significant features to represent phishing emails and detect spear-phishing attacks.
no code implementations • 10 May 2021 • Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore
We target attributes of the input images that are independent of the class identification, and manipulate those attributes to mimic real-world natural transformations (NaTra) of the inputs, which are then used to augment the training dataset of the image classifier.
no code implementations • 3 May 2021 • Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba
We introduce a new distributed/collaborative learning scheme to address communication overhead via latent compression, leveraging global data while providing privatization of local data without additional cost due to encryption or perturbation.
no code implementations • 27 Apr 2021 • Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Ryan K L Ko
We prove that less information is exposed in CGD compared to that of traditional FL.
1 code implementation • 3 Mar 2021 • Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal
Federated learning (FL) and split learning (SL) are state-of-the-art distributed machine learning techniques to enable machine learning training without accessing raw data on clients or end devices.
no code implementations • 1 Mar 2021 • Tom Roth, Yansong Gao, Alsharif Abuadbba, Surya Nepal, Wei Liu
Many adversarial attacks target natural language processing systems, most of which succeed through modifying the individual tokens of a document.
no code implementations • 29 Jan 2021 • Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, Surya Nepal
Based on those characteristics, we develop Peeler that continuously monitors a target system's kernel events and detects ransomware attacks on the system.
Malware Detection
Cryptography and Security
no code implementations • 12 Jan 2021 • Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal
In this paper, we propose a self-contained tamper-proofing method, called DeepiSign, to ensure the integrity and authenticity of CNN models against such manipulation attacks.
no code implementations • 14 Dec 2020 • Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay Jha
We have witnessed the continuing arms race between backdoor attacks and the corresponding defense strategies on Deep Neural Networks (DNNs).
no code implementations • COLING 2020 • Chang Xu, Cecile Paris, Ross Sparks, Surya Nepal, Keith VanderLinden
Our experimental results show that SIRTA is highly effective in distilling stances from social posts for SLO level assessment, and that the continuous monitoring of SLO levels afforded by SIRTA enables the early detection of critical SLO changes.
no code implementations • 8 Oct 2020 • Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal
To corroborate the efficiency of Decamouflage, we have also measured its run-time overhead on a personal PC with an i5 CPU and found that Decamouflage can detect image-scaling attacks in milliseconds.
no code implementations • 27 Jul 2020 • Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng
For a fixed total email dataset, the global RNN based model suffers by a 1. 8% accuracy drop when increasing organizational counts from 2 to 10.
1 code implementation • 21 Jul 2020 • Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim
We have also reviewed the flip side of backdoor attacks, which are explored for i) protecting intellectual property of deep learning models, ii) acting as a honeypot to catch adversarial example attacks, and iii) verifying data deletion requested by the data contributor. Overall, the research on defense is far behind the attack, and there is no single defense that can prevent all types of backdoor attacks.
no code implementations • 26 Jun 2020 • Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cecile Paris, Surya Nepal, Yang Xiang
We further compare the identified 16 security categories across different sources based on their popularity and impact.
no code implementations • 17 Jun 2020 • Shuo Wang, Surya Nepal, Alsharif Abuadbba, Carsten Rudolph, Marthie Grobler
The intuition behind our approach is that the essential characteristics of a normal image are generally consistent with non-essential style transformations, e. g., slightly changing the facial expression of human portraits.
no code implementations • 5 Jun 2020 • Sharif Abuadbba, Ayman Ibaida, Ibrahim Khalil, Naveen Chilamkurti, Surya Nepal, Xinghuo Yu
Smart meters have currently attracted attention because of their high efficiency and throughput performance.
1 code implementation • 17 May 2020 • Fanzhen Liu, Shan Xue, Jia Wu, Chuan Zhou, Wenbin Hu, Cecile Paris, Surya Nepal, Jian Yang, Philip S. Yu
As communities represent similar opinions, similar functions, similar purposes, etc., community detection is an important and extremely useful tool in both scientific inquiry and data analytics.
1 code implementation • 30 Mar 2020 • Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal
For learning performance, which is specified by the model accuracy and convergence speed metrics, we empirically evaluate both FL and SplitNN under different types of data distributions such as imbalanced and non-independent and identically distributed (non-IID) data.
1 code implementation • 16 Mar 2020 • Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit A. Camtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal
We observed that the 1D CNN model under split learning can achieve the same accuracy of 98. 9\% like the original (non-split) model.
no code implementations • 13 Mar 2020 • Chang Xu, Cecile Paris, Surya Nepal, Ross Sparks, Chong Long, Yafang Wang
We address the issue of having a limited number of annotations for stance classification in a new domain, by adapting out-of-domain classifiers with domain adaptation.
no code implementations • 3 Feb 2020 • Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen
In this paper, we propose a one-off and attack-agnostic Feature Manipulation (FM)-Defense to detect and purify adversarial examples in an interpretable and efficient manner.
no code implementations • 18 Jan 2020 • Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler
Our key insight is that the impact of small perturbation on the latent representation can be bounded for normal samples while anomaly images are usually outside such bounded intervals, referred to as structure consistency.
no code implementations • 10 Jan 2020 • Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen
In this paper, we demonstrate a backdoor threat to transfer learning tasks on both image and time-series data leveraging the knowledge of publicly accessible Teacher models, aimed at defeating three commonly-adopted defenses: \textit{pruning-based}, \textit{retraining-based} and \textit{input pre-processing-based defenses}.
no code implementations • 6 Jan 2020 • Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen
We further demonstrate the existence of a universal, image-agnostic semantic adversarial example.
3 code implementations • 23 Nov 2019 • Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, Hyoungshick Kim
In particular, for vision tasks, we can always achieve a 0% FRR and FAR.
Cryptography and Security
no code implementations • 14 Oct 2019 • Derui, Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang
First, such attacks must acquire the outputs from the models by multiple times before actually launching attacks, which is difficult for the MitM adversary in practice.
no code implementations • ACL 2019 • Chang Xu, Cecile Paris, Surya Nepal, Ross Sparks
We identify agreement and disagreement between utterances that express stances towards a topic of discussion.
4 code implementations • 18 Feb 2019 • Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal
Since the trojan trigger is a secret guarded and exploited by the attacker, detecting such trojan inputs is a challenge, especially at run-time when models are in active operation.
Cryptography and Security
1 code implementation • 6 Feb 2019 • Derui Wang, Chaoran Li, Sheng Wen, Qing-Long Han, Surya Nepal, Xiangyu Zhang, Yang Xiang
Experimental results demonstrate that the attack effectively stops NMS from filtering redundant bounding boxes.
no code implementations • 10 Aug 2018 • Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren
In contrast to existing works, the adversarial examples crafted by our method can also deceive recent machine learning based detectors that rely on semantic features such as control-flow-graph.
Cryptography and Security
1 code implementation • ACL 2018 • Chang Xu, Cecile Paris, Surya Nepal, Ross Sparks
In stance classification, the target on which the stance is made defines the boundary of the task, and a classifier is usually trained for prediction on the same target.
no code implementations • 14 Mar 2018 • Derek Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang
For example, proactive defending methods are invalid against grey-box or white-box attacks, while reactive defending methods are challenged by low-distortion adversarial examples or transferring adversarial examples.
no code implementations • 20 Feb 2018 • Yueqiang Cheng, Zhi Zhang, Surya Nepal, Zhi Wang
The exploit is motivated by our key observation that the modern OSes have double-owned kernel buffers (e. g., video buffers) owned concurrently by the kernel and user domains.
Cryptography and Security
no code implementations • 20 Feb 2018 • Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi Rabhi
In this paper, we propose a reliable and practical system, named KASR, which transparently reduces attack surfaces of commodity OS kernels at runtime without requiring their source code.
Cryptography and Security Operating Systems