Skip to main content

Showing 1–20 of 20 results for author: Yeun, C

.
  1. arXiv:2401.12982  [pdf

    cs.CL

    Text Classification: A Review, Empirical, and Experimental Evaluation

    Authors: Kamal Taha, Paul D. Yoo, Chan Yeun, Aya Taha

    Abstract: The explosive and widespread growth of data necessitates the use of text classification to extract crucial information from vast amounts of data. Consequently, there has been a surge of research in both classical and deep learning text classification methods. Despite the numerous methods proposed in the literature, there is still a pressing need for a comprehensive and up-to-date survey. Existing… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

  2. arXiv:2401.01896  [pdf

    cs.CR cs.LG eess.SP

    Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification

    Authors: Zhibo Zhang, Pengfei Li, Ahmed Y. Al Hammadi, Fusen Guo, Ernesto Damiani, Chan Yeob Yeun

    Abstract: This paper presents a reputation-based threat mitigation framework that defends potential security threats in electroencephalogram (EEG) signal classification during model aggregation of Federated Learning. While EEG signal analysis has attracted attention because of the emergence of brain-computer interface (BCI) technology, it is difficult to create efficient learning models for EEG analysis bec… ▽ More

    Submitted 22 October, 2023; originally announced January 2024.

  3. arXiv:2401.01895  [pdf

    cs.CR cs.LG

    A Robust Adversary Detection-Deactivation Method for Metaverse-oriented Collaborative Deep Learning

    Authors: Pengfei Li, Zhibo Zhang, Ameena S. Al-Sumaiti, Naoufel Werghi, Chan Yeob Yeun

    Abstract: Metaverse is trending to create a digital circumstance that can transfer the real world to an online platform supported by large quantities of real-time interactions. Pre-trained Artificial Intelligence (AI) models are demonstrating their increasing capability in aiding the metaverse to achieve an excellent response with negligible delay, and nowadays, many large models are collaboratively trained… ▽ More

    Submitted 21 October, 2023; originally announced January 2024.

  4. arXiv:2302.04224  [pdf

    eess.SP

    Data Poisoning Attacks on EEG Signal-based Risk Assessment Systems

    Authors: Zhibo Zhang, Sani Umar, Ahmed Y. Al Hammadi, Sangyoung Yoon, Ernesto Damiani, Chan Yeob Yeun

    Abstract: Industrial insider risk assessment using electroencephalogram (EEG) signals has consistently attracted a lot of research attention. However, EEG signal-based risk assessment systems, which could evaluate the emotional states of humans, have shown several vulnerabilities to data poison attacks. In this paper, from the attackers' perspective, data poison attacks involving label-flip** occurring in… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

    Comments: 2nd International Conference on Business Analytics For Technology and Security (ICBATS)

  5. arXiv:2302.04109  [pdf

    cs.LG

    Explainable Label-flip** Attacks on Human Emotion Assessment System

    Authors: Zhibo Zhang, Ahmed Y. Al Hammadi, Ernesto Damiani, Chan Yeob Yeun

    Abstract: This paper's main goal is to provide an attacker's point of view on data poisoning assaults that use label-flip** during the training phase of systems that use electroencephalogram (EEG) signals to evaluate human emotion. To attack different machine learning classifiers such as Adaptive Boosting (AdaBoost) and Random Forest dedicated to the classification of 4 different human emotions using EEG… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

  6. Explainable Data Poison Attacks on Human Emotion Evaluation Systems based on EEG Signals

    Authors: Zhibo Zhang, Sani Umar, Ahmed Y. Al Hammadi, Sangyoung Yoon, Ernesto Damiani, Claudio Agostino Ardagna, Nicola Bena, Chan Yeob Yeun

    Abstract: The major aim of this paper is to explain the data poisoning attacks using label-flip** during the training stage of the electroencephalogram (EEG) signal-based human emotion evaluation systems deploying Machine Learning models from the attackers' perspective. Human emotion evaluation using EEG signals has consistently attracted a lot of research attention. The identification of human emotional… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

    Journal ref: IEEE Access 2023

  7. arXiv:2210.14616   

    cs.CR cs.AI

    A Late Multi-Modal Fusion Model for Detecting Hybrid Spam E-mail

    Authors: Zhibo Zhang, Ernesto Damiani, Hussam Al Hamadi, Chan Yeob Yeun, Fatma Taher

    Abstract: In recent years, spammers are now trying to obfuscate their intents by introducing hybrid spam e-mail combining both image and text parts, which is more challenging to detect in comparison to e-mails containing text or image only. The motivation behind this research is to design an effective approach filtering out hybrid spam e-mails to avoid situations where traditional text-based or image-baesd… ▽ More

    Submitted 15 May, 2023; v1 submitted 26 October, 2022; originally announced October 2022.

    Comments: The content of this paper needs to be updated

    Journal ref: Index in journal International Journal of Computer Theory and Engineering (IJCTE), 2023

  8. arXiv:2210.11592  [pdf, other

    cs.CR eess.SY

    New data poison attacks on machine learning classifiers for mobile exfiltration

    Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun

    Abstract: Most recent studies have shown several vulnerabilities to attacks with the potential to jeopardize the integrity of the model, opening in a few recent years a new window of opportunity in terms of cyber-security. The main interest of this paper is directed towards data poisoning attacks involving label-flip**, this kind of attacks occur during the training phase, being the aim of the attacker to… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2202.10276

  9. On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach

    Authors: Marco Anisetti, Claudio A. Ardagna, Alessandro Balestrucci, Nicola Bena, Ernesto Damiani, Chan Yeob Yeun

    Abstract: Machine learning is becoming ubiquitous. From finance to medicine, machine learning models are boosting decision-making processes and even outperforming humans in some tasks. This huge progress in terms of prediction quality does not however find a counterpart in the security of such models and corresponding predictions, where perturbations of fractions of the training set (poisoning) can seriousl… ▽ More

    Submitted 28 August, 2023; v1 submitted 28 September, 2022; originally announced September 2022.

    Comments: Accepted in IEEE Transactions on Sustainable Computing; 15 pages, 8 figures

  10. Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network

    Authors: Zhibo Zhang, Ernesto Damiani, Hussam Al Hamadi, Chan Yeob Yeun, Fatma Taher

    Abstract: Image spam threat detection has continually been a popular area of research with the internet's phenomenal expansion. This research presents an explainable framework for detecting spam images using Convolutional Neural Network(CNN) algorithms and Explainable Artificial Intelligence (XAI) algorithms. In this work, we use CNN model to classify image spam respectively whereas the post-hoc XAI methods… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: Under review by International Conference on Cyber Resilience (ICCR), Dubai 2022

  11. Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research

    Authors: Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher

    Abstract: This survey presents a comprehensive review of current literature on Explainable Artificial Intelligence (XAI) methods for cyber security applications. Due to the rapid development of Internet-connected systems and Artificial Intelligence in recent years, Artificial Intelligence including Machine Learning (ML) and Deep Learning (DL) has been widely utilized in the fields of cyber security includin… ▽ More

    Submitted 31 August, 2022; originally announced August 2022.

    Comments: Accepted by IEEE Access

    Journal ref: IEEE Access 2022

  12. arXiv:2202.10276  [pdf, other

    cs.CR cs.AI

    Poisoning Attacks and Defenses on Artificial Intelligence: A Survey

    Authors: Miguel A. Ramirez, Song-Kyoo Kim, Hussam Al Hamadi, Ernesto Damiani, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun

    Abstract: Machine learning models have been widely adopted in several fields. However, most recent studies have shown several vulnerabilities from attacks with a potential to jeopardize the integrity of the model, presenting a new window of research opportunity in terms of cyber-security. This survey is conducted with a main intention of highlighting the most relevant information related to security vulnera… ▽ More

    Submitted 22 February, 2022; v1 submitted 21 February, 2022; originally announced February 2022.

  13. arXiv:2111.09529  [pdf, other

    cs.CR

    Blockchain Interoperability in UAV Networks: State-of-the-art and Open Issues

    Authors: Ruba Alkadi, Noura Alnuaimi, Abdulhadi Shoufan, Chan Yeun

    Abstract: The breakthrough of blockchain technology has facilitated the emergence and deployment of a wide range of Unmanned Aerial Vehicles (UAV) network-based applications. Yet, the full utilization of these applications is still limited due to the fact that each application is operating on an isolated blockchain. Thus, it is inevitable to orchestrate these blockchain fragments by introducing a cross-bloc… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

    Comments: This paper is submitted to an IEEE journal for possible publication

  14. arXiv:2012.00348  [pdf

    cs.LG eess.SP stat.ML

    Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms

    Authors: Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo, Nai-Wei Lo, Ernesto Damiani

    Abstract: Deep learning applied to electrocardiogram (ECG) data can be used to achieve personal authentication in biometric security applications, but it has not been widely used to diagnose cardiovascular disorders. We developed a deep learning model for the detection of arrhythmia in which time-sliced ECG data representing the distance between successive R-peaks are used as the input for a convolutional n… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: This paper is considered to be submitted to an international journal

  15. arXiv:1909.05417  [pdf, other

    cs.CV cs.LG eess.SP

    Deep User Identification Model with Multiple Biometrics

    Authors: Hyoung-Kyu Song, Ebrahim AlAlkeem, Jaewoong Yun, Tae-Ho Kim, Tae-Ho Kim, Hyerin Yoo, Dasom Heo, Chan Yeob Yeun, Myungsu Chae

    Abstract: Identification using biometrics is an important yet challenging task. Abundant research has been conducted on identifying personal identity or gender using given signals. Various types of biometrics such as electrocardiogram (ECG), electroencephalogram (EEG), face, fingerprint, and voice have been used for these tasks. Most research has only focused on single modality or a single task, while the c… ▽ More

    Submitted 3 September, 2019; originally announced September 2019.

    Comments: Accepted, CIKM 2019 Workshop on DTMBio

  16. arXiv:1907.13517  [pdf

    cs.CR cs.LG eess.SP

    An Enhanced Machine Learning-based Biometric Authentication System Using RR-Interval Framed Electrocardiograms

    Authors: Amang Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo

    Abstract: This paper is targeted in the area of biometric data enabled security system based on the machine learning for the digital health. The disadvantages of traditional authentication systems include the risks of forgetfulness, loss, and theft. Biometric authentication is therefore rapidly replacing traditional authentication methods and is becoming an everyday part of life. The electrocardiogram (ECG)… ▽ More

    Submitted 30 November, 2019; v1 submitted 27 July, 2019; originally announced July 2019.

    Comments: The paper has been accepted and published in the IEEE Access

    Journal ref: IEEE Access 7 (2019), pp. 168669-168674

  17. A Versatile Queuing System For Sharing Economy Platform Operations

    Authors: Song-Kyoo Kim, Chan Yeob Yeun

    Abstract: The paper deals with a sharing economy system with various management factors by using a bulk input G/M/1 type queuing model. The effective management of operating costs is vital for controlling the sharing economy platform and this research builds the theoretical background to understand the sharing economy business model. Analytically, the techniques include a classical Markov process of the sin… ▽ More

    Submitted 23 October, 2019; v1 submitted 12 July, 2019; originally announced July 2019.

    Comments: This original paper has been published in the Mathematics

    MSC Class: 60J10; 60K15; 60K25; 60K20; 90B05; 90B22; 90B50; 90C15

  18. arXiv:1907.00366  [pdf

    cs.CR cs.LG eess.SP stat.ML

    An Enhanced Electrocardiogram Biometric Authentication System Using Machine Learning

    Authors: Ebrahim Al Alkeem, Song-Kyoo Kim, Chan Yeob Yeun, M. Jamal Zemerly, Kin Poon, Paul D. Yoo

    Abstract: Traditional authentication systems use alphanumeric or graphical passwords, or token-based techniques that require "something you know and something you have". The disadvantages of these systems include the risks of forgetfulness, loss, and theft. To address these shortcomings, biometric authentication is rapidly replacing traditional authentication methods and is becoming a part of everyday life.… ▽ More

    Submitted 24 September, 2019; v1 submitted 30 June, 2019; originally announced July 2019.

    Comments: This paper has been published in the IEEE Access

    Journal ref: IEEE Access 7 (2019), pp. 123069-123075

  19. A Machine Learning Framework for Biometric Authentication using Electrocardiogram

    Authors: Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo

    Abstract: This paper introduces a framework for how to appropriately adopt and adjust Machine Learning (ML) techniques used to construct Electrocardiogram (ECG) based biometric authentication schemes. The proposed framework can help investigators and developers on ECG based biometric authentication mechanisms define the boundaries of required datasets and get training data with good quality. To determine th… ▽ More

    Submitted 5 August, 2019; v1 submitted 28 March, 2019; originally announced March 2019.

    Comments: This paper has been published in the IEEE Access

    Journal ref: IEEE Access 7 (2019), pp. 94858-94868

  20. arXiv:1706.07187  [pdf

    cs.ET

    Pay-with-a-Selfie, a human-centred digital payment system

    Authors: Ernesto Damiani, Perpetus Jacques Houngbo, Rasool Asal, Stelvio Cimato, Fulvio Frati, Joel T. Honsou, Dina Shehada, Chan Yeob Yeun

    Abstract: Mobile payment systems are increasingly used to simplify the way in which money transfers and transactions can be performed. We argue that, to achieve their full potential as economic boosters in develo** countries, mobile payment systems need to rely on new metaphors suitable for the business models, lifestyle, and technology availability conditions of the targeted communities. The Pay-with-a-G… ▽ More

    Submitted 22 June, 2017; originally announced June 2017.