Skip to main content

Showing 1–16 of 16 results for author: Sencar, H T

.
  1. arXiv:2405.17130  [pdf, other

    cs.LG cs.CL

    Exploiting the Layered Intrinsic Dimensionality of Deep Models for Practical Adversarial Training

    Authors: Enes Altinisik, Safa Messaoud, Husrev Taha Sencar, Hassan Sajjad, Sanjay Chawla

    Abstract: Despite being a heavily researched topic, Adversarial Training (AT) is rarely, if ever, deployed in practical AI systems for two primary reasons: (i) the gained robustness is frequently accompanied by a drop in generalization and (ii) generating adversarial examples (AEs) is computationally prohibitively expensive. To address these limitations, we propose SMAAT, a new AT algorithm that leverages t… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2403.17068  [pdf, other

    cs.CR

    Semantic Ranking for Automated Adversarial Technique Annotation in Security Text

    Authors: Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov

    Abstract: We introduce a new method for extracting structured threat behaviors from threat intelligence text. Our method is based on a multi-stage ranking architecture that allows jointly optimizing for efficiency and effectiveness. Therefore, we believe this problem formulation better aligns with the real-world nature of the task considering the large number of adversary techniques and the extensive body o… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  3. arXiv:2309.03647  [pdf, other

    cs.CR

    ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search

    Authors: Enes Altinisik, Fatih Deniz, Husrev Taha Sencar

    Abstract: We present ProvG-Searcher, a novel approach for detecting known APT behaviors within system security logs. Our approach leverages provenance graphs, a comprehensive graph representation of event logs, to capture and depict data provenance relations by map** system entities as nodes and their interactions as edges. We formulate the task of searching provenance graphs as a subgraph matching proble… ▽ More

    Submitted 19 December, 2023; v1 submitted 7 September, 2023; originally announced September 2023.

  4. arXiv:2211.16316  [pdf, other

    cs.LG

    A3T: Accuracy Aware Adversarial Training

    Authors: Enes Altinisik, Safa Messaoud, Husrev Taha Sencar, Sanjay Chawla

    Abstract: Adversarial training has been empirically shown to be more prone to overfitting than standard training. The exact underlying reasons still need to be fully understood. In this paper, we identify one cause of overfitting related to current practices of generating adversarial samples from misclassified samples. To address this, we propose an alternative approach that leverages the misclassified samp… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

  5. arXiv:2211.05533  [pdf, other

    cs.LG cs.AI cs.CL

    GREENER: Graph Neural Networks for News Media Profiling

    Authors: Panayot Panayotov, Utsav Shukla, Husrev Taha Sencar, Mohamed Nabeel, Preslav Nakov

    Abstract: We study the problem of profiling news media on the Web with respect to their factuality of reporting and bias. This is an important but under-studied problem related to disinformation and "fake news" detection, but it addresses the issue at a coarser granularity compared to looking at an individual article or an individual claim. This is useful as it allows to profile entire media outlets in adva… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

  6. arXiv:2211.05523  [pdf, other

    cs.CL cs.AI

    Impact of Adversarial Training on Robustness and Generalizability of Language Models

    Authors: Enes Altinisik, Hassan Sajjad, Husrev Taha Sencar, Safa Messaoud, Sanjay Chawla

    Abstract: Adversarial training is widely acknowledged as the most effective defense against adversarial attacks. However, it is also well established that achieving both robustness and generalization in adversarially trained models involves a trade-off. The goal of this work is to provide an in depth comparison of different approaches for adversarial training in language models. Specifically, we study the e… ▽ More

    Submitted 10 December, 2023; v1 submitted 10 November, 2022; originally announced November 2022.

  7. arXiv:2210.01797  [pdf, other

    cs.LG cs.AI cs.IR

    Ten Years after ImageNet: A 360° Perspective on AI

    Authors: Sanjay Chawla, Preslav Nakov, Ahmed Ali, Wendy Hall, Issa Khalil, Xiaosong Ma, Husrev Taha Sencar, Ingmar Weber, Michael Wooldridge, Ting Yu

    Abstract: It is ten years since neural networks made their spectacular comeback. Prompted by this anniversary, we take a holistic perspective on Artificial Intelligence (AI). Supervised Learning for cognitive tasks is effectively solved - provided we have enough high-quality labeled data. However, deep neural network models are not easily interpretable, and thus the debate between blackbox and whitebox mode… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

  8. arXiv:2206.05679  [pdf, other

    cs.CR

    Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior

    Authors: Enes Altinisik, Husrev Taha Sencar, Mohamed Nabeel, Issa Khalil, Ting Yu

    Abstract: Enterprise networks are one of the major targets for cyber attacks due to the vast amount of sensitive and valuable data they contain. A common approach to detecting attacks in the enterprise environment relies on modeling the behavior of users and systems to identify unexpected deviations. The feasibility of this approach crucially depends on how well attack-related events can be isolated from be… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

  9. Video Source Characterization Using Encoding and Encapsulation Characteristics

    Authors: Enes Altinisik, Husrev Taha Sencar, Diram Tabaa

    Abstract: We introduce a new method for camera-model identification. Our approach combines two independent aspects of video file generation corresponding to video coding and media data encapsulation. To this end, a joint representation of the overall file metadata is developed and used in conjunction with a two-level hierarchical classification method. At the first level, our method groups videos into metac… ▽ More

    Submitted 28 August, 2022; v1 submitted 9 January, 2022; originally announced January 2022.

  10. Automatic Generation of H.264 Parameter Sets to Recover Video File Fragments

    Authors: Enes Altinisik, Hüsrev Taha Sencar

    Abstract: We address the problem of decoding video file fragments when the necessary encoding parameters are missing. With this objective, we propose a method that automatically generates H.264 video headers containing these parameters and extracts coded pictures in the partially available compressed video data. To accomplish this, we examined a very large corpus of videos to learn patterns of encoding sett… ▽ More

    Submitted 13 September, 2021; v1 submitted 29 April, 2021; originally announced April 2021.

  11. arXiv:2103.16235  [pdf, other

    cs.CR

    BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection

    Authors: Muhammed Ali Yurdagul, Husrev Taha Sencar

    Abstract: Bluetooth Low Energy (BLE) has become one of the most popular wireless communication protocols and is used in billions of smart devices. Despite several security features, the hardware and software limitations of these devices makes them vulnerable to man-in-the-middle (MITM) attacks. Due to the use of these devices in increasingly diverse and safety-critical applications, the capability to detect… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

  12. arXiv:2103.12506  [pdf, ps, other

    cs.SI cs.CL

    A Survey on Predicting the Factuality and the Bias of News Media

    Authors: Preslav Nakov, Husrev Taha Sencar, Jisun An, Haewoon Kwak

    Abstract: The present level of proliferation of fake, biased, and propagandistic content online has made it impossible to fact-check every single suspicious claim or article, either manually or automatically. Thus, many researchers are shifting their attention to higher granularity, aiming to profile entire news outlets, which makes it possible to detect likely "fake news" the moment it is published, by sim… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Comments: factuality of reporting, fact-checking, political ideology, media bias, disinformation, propaganda, social media, news media

    MSC Class: 68T50 ACM Class: I.2.7

  13. arXiv:2008.11985  [pdf, ps, other

    eess.AS cs.SD

    Estimating Uniqueness of I-Vector Representation of Human Voice

    Authors: Erkam Sinan Tandogan, Husrev Taha Sencar

    Abstract: We study the individuality of the human voice with respect to a widely used feature representation of speech utterances, namely, the i-vector model. As a first step toward this goal, we compare and contrast uniqueness measures proposed for different biometric modalities. Then, we introduce a new uniqueness measure that evaluates the entropy of i-vectors while taking into account speaker level vari… ▽ More

    Submitted 3 March, 2021; v1 submitted 27 August, 2020; originally announced August 2020.

    Comments: 13 pages

  14. PRNU Estimation from Encoded Videos Using Block-Based Weighting

    Authors: Enes Altinisik, Kasim Tasdemir, Husrev Taha Sencar

    Abstract: Estimating the photo-response non-uniformity (PRNU) of an imaging sensor from videos is a challenging task due to complications created by several processing steps in the camera imaging pipeline. Among these steps, video coding is one of the most disruptive to PRNU estimation because of its lossy nature. Since videos are always stored in a compressed format, the ability to cope with the disruptive… ▽ More

    Submitted 28 January, 2021; v1 submitted 18 August, 2020; originally announced August 2020.

  15. Source Camera Verification from Strongly Stabilized Videos

    Authors: Enes Altinisik, Husrev Taha Sencar

    Abstract: Image stabilization performed during imaging and/or post-processing poses one of the most significant challenges to photo-response non-uniformity based source camera attribution from videos. When performed digitally, stabilization involves crop**, war**, and inpainting of video frames to eliminate unwanted camera motion. Hence, successful attribution requires the inversion of these transformat… ▽ More

    Submitted 22 July, 2020; v1 submitted 26 November, 2019; originally announced December 2019.

  16. Mitigation of H.264 and H.265 Video Compression for Reliable PRNU Estimation

    Authors: Enes Altınışık, Kasım Taşdemir, Hüsrev Taha Sencar

    Abstract: The photo-response non-uniformity (PRNU) is a distinctive image sensor characteristic, and an imaging device inadvertently introduces its sensor's PRNU into all media it captures. Therefore, the PRNU can be regarded as a camera fingerprint and used for source attribution. The imaging pipeline in a camera, however, involves various processing steps that are detrimental to PRNU estimation. In the co… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.