Skip to main content

Showing 1–3 of 3 results for author: Afifi, M H

.
  1. arXiv:2011.04723  [pdf, other

    cs.SI cs.LG

    F-FADE: Frequency Factorization for Anomaly Detection in Edge Streams

    Authors: Yen-Yu Chang, Pan Li, Rok Sosic, M. H. Afifi, Marco Schweighauser, Jure Leskovec

    Abstract: Edge streams are commonly used to capture interactions in dynamic networks, such as email, social, or computer networks. The problem of detecting anomalies or rare events in edge streams has a wide range of applications. However, it presents many challenges due to lack of labels, a highly dynamic nature of interactions, and the entanglement of temporal and structural changes in the network. Curren… ▽ More

    Submitted 5 February, 2021; v1 submitted 9 November, 2020; originally announced November 2020.

    Comments: WSDM 2021

  2. arXiv:2007.14030  [pdf, other

    cs.CR cs.SI

    A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts

    Authors: Neil Shah, Grant Ho, Marco Schweighauser, M. H. Afifi, Asaf Cidon, David Wagner

    Abstract: We present a large-scale characterization of attacker activity across 111 real-world enterprise organizations. We develop a novel forensic technique for distinguishing between attacker activity and benign activity in compromised enterprise accounts that yields few false positives and enables us to perform fine-grained analysis of attacker behavior. Applying our methods to a set of 159 compromised… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

    Comments: Extended report of workshop paper presented at the 1st MLHat Workshop (MLHat Security and ML 2020). KDD, 2020

  3. arXiv:1602.08472  [pdf, ps, other

    cs.CR

    ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing

    Authors: Kai Zhou, M. H. Afifi, Jian Ren

    Abstract: Discrete exponential operation, such as modular exponentiation and scalar multiplication on elliptic curves, is a basic operation of many public-key cryptosystems. However, the exponential operations are considered prohibitively expensive for resource-constrained mobile devices. In this paper, we address the problem of secure outsourcing of exponentiation operations to one single untrusted server.… ▽ More

    Submitted 26 February, 2016; originally announced February 2016.

    Comments: 28 pages, journal paper