Skip to main content

Showing 1–10 of 10 results for author: Sikdar, B

.
  1. arXiv:2404.09722  [pdf, other

    cs.LG cs.AI cs.CR

    VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication

    Authors: Xun Yuan, Yang Yang, Prosanta Gope, Aryan Pasikhani, Biplab Sikdar

    Abstract: In the current artificial intelligence (AI) era, the scale and quality of the dataset play a crucial role in training a high-quality AI model. However, good data is not a free lunch and is always hard to access due to privacy regulations like the General Data Protection Regulation (GDPR). A potential solution is to release a synthetic dataset with a similar distribution to that of the private data… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  2. arXiv:2403.03486  [pdf, other

    cs.CR

    PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices

    Authors: Hongming Fei, Owen Millwood, Gope Prosanta, Jack Miskelly, Biplab Sikdar

    Abstract: Physical Unclonable Functions (PUFs) have been shown to be a highly promising solution for enabling high security systems tailored for low-power devices. Commonly, PUFs are utilised to generate cryptographic keys on-the-fly, replacing the need to store keys in vulnerable, non-volatile memories. Due to the physical nature of PUFs, environmental variations cause noise, manifesting themselves as erro… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 11 pages, 6 figures

    MSC Class: 68M25 ACM Class: I.2.8

  3. arXiv:2403.01438  [pdf, other

    cs.LG

    Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting

    Authors: Asif Iqbal, Prosanta Gope, Biplab Sikdar

    Abstract: Accurate load forecasting is crucial for energy management, infrastructure planning, and demand-supply balancing. Smart meter data availability has led to the demand for sensor-based load forecasting. Conventional ML allows training a single global model using data from multiple smart meters requiring data transfer to a central server, raising concerns for network requirements, privacy, and securi… ▽ More

    Submitted 12 March, 2024; v1 submitted 3 March, 2024; originally announced March 2024.

  4. arXiv:2403.00464  [pdf, other

    cs.CR cs.AR

    Attacking Delay-based PUFs with Minimal Adversary Model

    Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar

    Abstract: Physically Unclonable Functions (PUFs) provide a streamlined solution for lightweight device authentication. Delay-based Arbiter PUFs, with their ease of implementation and vast challenge space, have received significant attention; however, they are not immune to modelling attacks that exploit correlations between their inputs and outputs. Research is therefore polarized between develo** modelli… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

    Comments: 13 pages, 6 figures, journal

    MSC Class: 68M25 ACM Class: I.2.8

  5. arXiv:2309.07730  [pdf, other

    cs.CR cs.AI

    AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks

    Authors: Soumadeep Das, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark, Chintan Patel, Biplab Sikdar

    Abstract: Underwater Acoustic Sensor Networks (UW-ASNs) are predominantly used for underwater environments and find applications in many areas. However, a lack of security considerations, the unstable and challenging nature of the underwater environment, and the resource-constrained nature of the sensor nodes used for UW-ASNs (which makes them incapable of adopting security primitives) make the UW-ASN prone… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  6. arXiv:2307.16149  [pdf, other

    cs.LG cs.AI cs.CR

    A Novel DDPM-based Ensemble Approach for Energy Theft Detection in Smart Grids

    Authors: Xun Yuan, Yang Yang, Asif Iqbal, Prosanta Gope, Biplab Sikdar

    Abstract: Energy theft, characterized by manipulating energy consumption readings to reduce payments, poses a dual threat-causing financial losses for grid operators and undermining the performance of smart grids. Effective Energy Theft Detection (ETD) methods become crucial in mitigating these risks by identifying such fraudulent activities in their early stages. However, the majority of current ETD method… ▽ More

    Submitted 13 January, 2024; v1 submitted 30 July, 2023; originally announced July 2023.

  7. arXiv:2207.05890  [pdf, other

    cs.CR cs.DB

    E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System

    Authors: Zhihui Lin, Prosanta Gope, Jianting Ning, Biplab Sikdar

    Abstract: The transition from paper-based information to Electronic-Health-Records (EHRs) has driven various advancements in the modern healthcare-industry. In many cases, patients need to share their EHR with healthcare professionals. Given the sensitive and security-critical nature of EHRs, it is essential to consider the security and privacy issues of storing and sharing EHR. However, existing security s… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  8. arXiv:2206.13055  [pdf, other

    cs.CR

    Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid

    Authors: Rohini Poolat Parameswarath, Prosanta Gope, Biplab Sikdar

    Abstract: The popularity of Electric Vehicles (EVs) has been rising across the globe in recent years. Smart grids will be the backbone for EV charging and enable efficient consumption of electricity by the EVs. With the demand for EVs, associated cyber threats are also increasing. Users expose their personal information while charging their EVs, leading to privacy threats. This paper proposes a user-empower… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

    Comments: 13 pages

  9. arXiv:2103.13306  [pdf, other

    cs.NI eess.SY

    Delay and Power consumption Analysis for Queue State Dependent Service Rate Control in WirelessHart System

    Authors: Dibyajyoti Guha, Jie Chen, Abhijit Dutta Banik, Biplab Sikdar

    Abstract: To solve the problem of power supply limitation of machines working in wireless industry automation, we evaluated the workload aware service rate control design implanted in the medium access control component of these small devices and proposed a bio-intelligence based algorithm to optimise the design regarding the delay constraint while minimizing power consumption. To achieve this, we provide a… ▽ More

    Submitted 10 February, 2021; originally announced March 2021.

  10. arXiv:1311.6879  [pdf, ps, other

    cs.FL nlin.CG

    Analysis and synthesis of nonlinear reversible cellular automata in linear time

    Authors: Sukanta Das, Biplab K Sikdar

    Abstract: Cellular automata (CA) have been found as an attractive modeling tool for various applications, such as, pattern recognition, image processing, data compression, encryption, and specially for VLSI design & test. For such applications, mostly a special class of CA, called as linear/additive CA, have been utilized. Since linear/additive CA refer a limited number of candidate CA, while searching for… ▽ More

    Submitted 27 November, 2013; originally announced November 2013.