Search Results for author: Yun Shen

Found 14 papers, 3 papers with code

Finding MNEMON: Reviving Memories of Node Embeddings

no code implementations14 Apr 2022 Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini

Previous security research efforts orbiting around graphs have been exclusively focusing on either (de-)anonymizing the graphs or understanding the security and privacy issues of graph neural networks.

Graph Embedding

Model Stealing Attacks Against Inductive Graph Neural Networks

1 code implementation15 Dec 2021 Yun Shen, Xinlei He, Yufei Han, Yang Zhang

Graph neural networks (GNNs), a new family of machine learning (ML) models, have been proposed to fully leverage graph data to build powerful applications.

Inference Attacks Against Graph Neural Networks

1 code implementation6 Oct 2021 Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang

Second, given a subgraph of interest and the graph embedding, we can determine with high confidence that whether the subgraph is contained in the target graph.

Graph Classification Graph Embedding +1

Towards Understanding the Robustness Against Evasion Attack on Categorical Data

no code implementations ICLR 2022 Hongyan Bao, Yufei Han, Yujun Zhou, Yun Shen, Xiangliang Zhang

Characterizing and assessing the adversarial vulnerability of classification models with categorical input has been a practically important, while rarely explored research problem.

Classification

ANDR USPEX : Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices

no code implementations9 Mar 2021 Yun Shen, Gianluca Stringhini

Unlike commodity anti-malware solutions on desktop systems, their Android counterparts run as sandboxed applications without root privileges and are limited by Android's permission system.

Graph Representation Learning Cryptography and Security

Understanding Worldwide Private Information Collection on Android

no code implementations25 Feb 2021 Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini

Mobile phones enable the collection of a wealth of private information, from unique identifiers (e. g., email addresses), to a user's location, to their text messages.

Mobile Security Cryptography and Security

Node-Level Membership Inference Attacks Against Graph Neural Networks

no code implementations10 Feb 2021 Xinlei He, Rui Wen, Yixin Wu, Michael Backes, Yun Shen, Yang Zhang

To fully utilize the information contained in graph data, a new family of machine learning (ML) models, namely graph neural networks (GNNs), has been introduced.

Empowering the Edge Intelligence by Air-Ground Integrated Federated Learning in 6G Networks

no code implementations26 Jul 2020 Yuben Qu, Chao Dong, Jianchao Zheng, Qihui Wu, Yun Shen, Fan Wu, Alagan Anpalagan

Ubiquitous intelligence has been widely recognized as a critical vision of the future sixth generation (6G) networks, which implies the intelligence over the whole network from the core to the edge including end devices.

Networking and Internet Architecture

Gradient Boosting Survival Tree with Applications in Credit Scoring

1 code implementation9 Aug 2019 Miaojun Bai, Yan Zheng, Yun Shen

In order to deal with highly heterogeneous industrial data collected in Chinese market of consumer finance, we propose a nonparametric ensemble tree model called gradient boosting survival tree (GBST) that extends the survival tree models with a gradient boosting algorithm.

Survival Analysis

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks

no code implementations29 May 2019 Yun Shen, Gianluca Stringhini

Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them.

Word Embeddings

Tiresias: Predicting Security Events Through Deep Learning

no code implementations24 May 2019 Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini

With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack.

Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization

no code implementations7 May 2019 Yufei Han, Yuzhe ma, Christopher Gates, Kevin Roundy, Yun Shen

To address these challenges, we formulate collaborative teaching as a consensus and privacy-preserving optimization process to minimize teaching risk.

Privacy Preserving

Risk-sensitive Reinforcement Learning

no code implementations8 Nov 2013 Yun Shen, Michael J. Tobia, Tobias Sommer, Klaus Obermayer

We derive a family of risk-sensitive reinforcement learning methods for agents, who face sequential decision-making tasks in uncertain environments.

Decision Making Q-Learning +1

Risk-sensitive Markov control processes

no code implementations28 Oct 2011 Yun Shen, Wilhelm Stannat, Klaus Obermayer

We introduce a general framework for measuring risk in the context of Markov control processes with risk maps on general Borel spaces that generalize known concepts of risk measures in mathematical finance, operations research and behavioral economics.

Cannot find the paper you are looking for? You can Submit a new open access paper.