Search Results for author: Sushil Jajodia

Found 5 papers, 1 papers with code

An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models

1 code implementation17 Aug 2022 Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia

Tabular data typically contains private and important information; thus, precautions must be taken before they are shared with others.

Inference Attack Membership Inference Attack

Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks

no code implementations30 Oct 2020 Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini

To this date, CAPTCHAs have served as the first line of defense preventing unauthorized access by (malicious) bots to web-based services, while at the same time maintaining a trouble-free experience for human visitors.

Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System

no code implementations13 Oct 2018 Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam

In order to explain this observation, we extend the earlier RL model to a game model and show that there exists defender policies that can be robust against any adversarial policy.

Data Synthesis based on Generative Adversarial Networks

no code implementations9 Jun 2018 Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim

We call this property model compatibility.

Databases Cryptography and Security H.3.4; I.2; K.6.5

Cannot find the paper you are looking for? You can Submit a new open access paper.