Search Results for author: Xiapu Luo

Found 13 papers, 8 papers with code

On the Security Risks of AutoML

1 code implementation12 Oct 2021 Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang

Neural Architecture Search (NAS) represents an emerging machine learning (ML) paradigm that automatically searches for models tailored to given tasks, which greatly simplifies the development of ML systems and propels the trend of ML democratization.

Neural Architecture Search

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection

1 code implementation18 Jun 2021 Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou

Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well as recent advances in graph mining techniques.

Anomaly Detection Combinatorial Optimization +2

Smart Contract Security: a Practitioners' Perspective

no code implementations22 Feb 2021 Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang

Given numerous research efforts in addressing the security issues of smart contracts, we wondered how software practitioners build security into smart contracts in practice.

Software Engineering

CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum

no code implementations2 Dec 2020 Xiaoqi Li, Ting Chen, Xiapu Luo, Chenxu Wang

Because the locked cryptocurrencies can never be controlled by users, avoid interacting with the accounts discovered by CLUE and repeating the same mistakes again can help users to save money.

Cryptography and Security

AdvMind: Inferring Adversary Intent of Black-Box Attacks

1 code implementation16 Jun 2020 Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang

Deep neural networks (DNNs) are inherently susceptible to adversarial attacks even under black-box settings, in which the adversary only has query access to the target models.

Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware

1 code implementation29 May 2020 Ren He, Haoyu Wang, Pengcheng Xia, Liu Wang, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yao Guo, Guoai Xu

To facilitate future research, we have publicly released all the well-labelled COVID-19 themed apps (and malware) to the research community.

Cryptography and Security

Boros: Secure Cross-Channel Transfers via Channel Hub

no code implementations29 Nov 2019 YongJie Ye, Jingjing Zhang, Weigang Wu, Xiapu Luo, Jiannong Cao

In this paper, we design and develop a novel off-chain system to shorten the routing path for the payment network.

Cryptography and Security

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

1 code implementation5 Nov 2019 Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang

Specifically, (i) we develop a new attack model that jointly optimizes adversarial inputs and poisoned models; (ii) with both analytical and empirical evidence, we reveal that there exist intriguing "mutual reinforcement" effects between the two attack vectors -- leveraging one vector significantly amplifies the effectiveness of the other; (iii) we demonstrate that such effects enable a large design spectrum for the adversary to enhance the existing attacks that exploit both vectors (e. g., backdoor attacks), such as maximizing the attack evasiveness with respect to various detection methods; (iv) finally, we discuss potential countermeasures against such optimized attacks and their technical challenges, pointing to several promising research directions.

Programmable In-Network Security for Context-aware BYOD Policies

1 code implementation4 Aug 2019 Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo

Recent work has developed SDN solutions to collect device context for network-wide access control in a central controller.

Networking and Internet Architecture Cryptography and Security

Interpretable Deep Learning under Fire

no code implementations3 Dec 2018 Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang

The improved interpretability is believed to offer a sense of security by involving human in the decision-making process.

Decision Making

Model-Reuse Attacks on Deep Learning Systems

no code implementations2 Dec 2018 Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang

By empirically studying four deep learning systems (including both individual and ensemble systems) used in skin cancer screening, speech recognition, face verification, and autonomous steering, we show that such attacks are (i) effective - the host systems misbehave on the targeted inputs as desired by the adversary with high probability, (ii) evasive - the malicious models function indistinguishably from their benign counterparts on non-targeted inputs, (iii) elastic - the malicious models remain effective regardless of various system design choices and tuning strategies, and (iv) easy - the adversary needs little prior knowledge about the data used for system tuning or inference.

Cryptography and Security

Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance

1 code implementation1 Apr 2017 Yihui He, Xiaobo Ma, Xiapu Luo, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan

Security surveillance is one of the most important issues in smart cities, especially in an era of terrorism.

Decision Making

A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps

1 code implementation24 May 2014 Daoyuan Wu, Xiapu Luo, Rocky K. C. Chang

We implement our sink-driven approach in a tool called ECVDetector and evaluate it with the top 1K Android apps.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.