Skip to main content

Showing 1–14 of 14 results for author: Abuadbba, S

.
  1. arXiv:2406.12330  [pdf, other

    cs.CR cs.DC cs.ET cs.LG cs.NI

    Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing

    Authors: Viet Vo, Thusitha Dayaratne, Blake Haydon, Xingliang Yuan, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Carsten Rudolph

    Abstract: Spectrum sharing is increasingly vital in 6G wireless communication, facilitating dynamic access to unused spectrum holes. Recently, there has been a significant shift towards employing machine learning (ML) techniques for sensing spectrum holes. In this context, federated learning (FL)-enabled spectrum sensing technology has garnered wide attention, allowing for the construction of an aggregated… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 7 pages, 5 figures. The paper is submitted to IEEE Networks for review

  2. arXiv:2406.12299  [pdf, other

    cs.CR cs.NI eess.SY

    Exploiting and Securing ML Solutions in Near-RT RIC: A Perspective of an xApp

    Authors: Thusitha Dayaratne, Viet Vo, Shangqi Lai, Sharif Abuadbba, Blake Haydon, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph

    Abstract: Open Radio Access Networks (O-RAN) are emerging as a disruptive technology, revolutionising traditional mobile network architecture and deployments in the current 5G and the upcoming 6G era. Disaggregation of network architecture, inherent support for AI/ML workflows, cloud-native principles, scalability, and interoperability make O-RAN attractive to network providers for beyond-5G and 6G deployme… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  3. arXiv:2404.04854  [pdf, other

    cs.LG cs.AI cs.CR

    Contextual Chart Generation for Cyber Deception

    Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba

    Abstract: Honeyfiles are security assets designed to attract and detect intruders on compromised systems. Honeyfiles are a type of honeypot that mimic real, sensitive documents, creating the illusion of the presence of valuable data. Interaction with a honeyfile reveals the presence of an intruder, and can provide insights into their goals and intentions. Their practical use, however, is limited by the time… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: 13 pages including references

  4. arXiv:2307.01225  [pdf, other

    cs.CL cs.AI cs.LG

    Interpretability and Transparency-Driven Detection and Transformation of Textual Adversarial Examples (IT-DT)

    Authors: Bushra Sabir, M. Ali Babar, Sharif Abuadbba

    Abstract: Transformer-based text classifiers like BERT, Roberta, T5, and GPT-3 have shown impressive performance in NLP. However, their vulnerability to adversarial examples poses a security risk. Existing defense methods lack interpretability, making it hard to understand adversarial classifications and identify model vulnerabilities. To address this, we propose the Interpretability and Transparency-Driven… ▽ More

    Submitted 2 July, 2023; originally announced July 2023.

  5. arXiv:2208.12449  [pdf, other

    cs.CR cs.CY

    Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

    Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal

    Abstract: The daily deluge of alerts is a sombre reality for Security Operations Centre (SOC) personnel worldwide. They are at the forefront of an organisation's cybersecurity infrastructure, and face the unenviable task of prioritising threats amongst a flood of abstruse alerts triggered by their Security Information and Event Management (SIEM) systems. URLs found within malicious communications form the b… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2108.12726

  6. arXiv:2203.10902  [pdf, other

    cs.CR cs.AI

    PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

    Authors: Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere

    Abstract: Existing integrity verification approaches for deep models are designed for private verification (i.e., assuming the service provider is honest, with white-box access to model parameters). However, private verification approaches do not allow model users to verify the model at run-time. Instead, they must trust the service provider, who may tamper with the verification results. In contrast, a publ… ▽ More

    Submitted 19 December, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 18 pages, 9 figures. Accepted to IEEE S&P 2023

  7. arXiv:2108.12726  [pdf, other

    cs.CR cs.CY cs.LG cs.NI

    Characterizing Malicious URL Campaigns

    Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

    Abstract: URLs are central to a myriad of cyber-security threats, from phishing to the distribution of malware. Their inherent ease of use and familiarity is continuously abused by attackers to evade defences and deceive end-users. Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware. We refer to such behaviours as campaigns, with the hypothesis bei… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

  8. arXiv:2104.03813  [pdf, other

    cs.CR

    Can Differential Privacy Practically Protect Collaborative Deep Learning Inference for the Internet of Things?

    Authors: Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Sharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang

    Abstract: Collaborative inference has recently emerged as an attractive framework for applying deep learning to Internet of Things (IoT) applications by splitting a DNN model into several subpart models among resource-constrained IoT devices and the cloud. However, the reconstruction attack was proposed recently to recover the original input image from intermediate outputs that can be collected from local m… ▽ More

    Submitted 19 November, 2022; v1 submitted 8 April, 2021; originally announced April 2021.

    Comments: Accepted in Wireless Networks

  9. arXiv:2103.02762  [pdf, other

    cs.LG cs.CR cs.NI

    Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

    Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

    Abstract: Federated learning (FL) and split learning (SL) are state-of-the-art distributed machine learning techniques to enable machine learning training without accessing raw data on clients or end devices. However, their \emph{comparative training performance} under real-world resource-restricted Internet of Things (IoT) device settings, e.g., Raspberry Pi, remains barely studied, which, to our knowledge… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: 14 pages. arXiv admin note: text overlap with arXiv:2003.13376

  10. arXiv:2006.08885  [pdf, other

    cs.LG cs.CV stat.ML

    DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation

    Authors: Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim

    Abstract: Image spam emails are often used to evade text-based spam filters that detect spam emails with their frequently used keywords. In this paper, we propose a new image spam email detection tool called DeepCapture using a convolutional neural network (CNN) model. There have been many efforts to detect image spam emails, but there is a significant performance degrade against entirely new and unseen ima… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 15 pages, single column. ACISP 2020: Australasian Conference on Information Security and Privacy

  11. arXiv:2006.03208  [pdf, other

    eess.SP cs.DC

    Can the Multi-Incoming Smart Meter Compressed Streams be Re-Compressed?

    Authors: Sharif Abuadbba, Ayman Ibaida, Ibrahim Khalil, Naveen Chilamkurti, Surya Nepal, Xinghuo Yu

    Abstract: Smart meters have currently attracted attention because of their high efficiency and throughput performance. They transmit a massive volume of continuously collected waveform readings (e.g. monitoring). Although many compression models are proposed, the unexpected size of these compressed streams required endless storage and management space which poses a unique challenge. Therefore, this paper ex… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

    Comments: 8 pages. Submitted to IEEE Transaction on Smart Grid

  12. arXiv:2003.13376  [pdf, other

    cs.CR cs.DC cs.LG

    End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things

    Authors: Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

    Abstract: This work is the first attempt to evaluate and compare felderated learning (FL) and split neural networks (SplitNN) in real-world IoT settings in terms of learning performance and device implementation overhead. We consider a variety of datasets, different model architectures, multiple clients, and various performance metrics. For learning performance, which is specified by the model accuracy and… ▽ More

    Submitted 2 August, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    Comments: 10 pages, 12 figures

    Journal ref: The 39th International Symposium on Reliable Distributed Systems (SRDS) 2020

  13. arXiv:2003.12365  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?

    Authors: Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit A. Camtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal

    Abstract: A new collaborative learning, called split learning, was recently introduced, aiming to protect user data privacy without revealing raw input data to a server. It collaboratively runs a deep neural network model where the model is split into two parts, one for the client and the other for the server. Therefore, the server has no direct access to raw data processed at the client. Until now, the spl… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

    Comments: 13 pages, Accepted at ACM ASIACCS 2020

  14. arXiv:1911.00604  [pdf, ps, other

    cs.CR

    IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography

    Authors: Sharif Abuadbba, Ayman Ibaida, Ibrahim Khalil

    Abstract: Remotely generated data by Intent of Things (IoT) has recently had a lot of attention for their huge benefits such as efficient monitoring and risk reduction. The transmitted streams usually consist of periodical streams (e.g. activities) and highly private information (e.g. IDs). Despite the obvious benefits, the concerns are the secrecy and the originality of the transferred data. Surprisingly,… ▽ More

    Submitted 1 April, 2022; v1 submitted 1 November, 2019; originally announced November 2019.

    Comments: 12 pages