Skip to main content

Showing 1–17 of 17 results for author: Abdou, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.01344  [pdf, other

    cs.CL

    Mind Your Neighbours: Leveraging Analogous Instances for Rhetorical Role Labeling for Legal Documents

    Authors: T. Y. S. S Santosh, Hassan Sarwat, Ahmed Abdou, Matthias Grabmair

    Abstract: Rhetorical Role Labeling (RRL) of legal judgments is essential for various tasks, such as case summarization, semantic search and argument mining. However, it presents challenges such as inferring sentence roles from context, interrelated roles, limited annotated data, and label imbalance. This study introduces novel techniques to enhance RRL performance by leveraging knowledge from semantically s… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Accepted to LREC-COLING 2024

  2. arXiv:2205.05493  [pdf, other

    cs.CV cs.AI

    Deep Learning and Computer Vision Techniques for Microcirculation Analysis: A Review

    Authors: Maged Abdalla Helmy Mohamed Abdou, Trung Tuyen Truong, Eric Jul, Paulo Ferreira

    Abstract: The analysis of microcirculation images has the potential to reveal early signs of life-threatening diseases like sepsis. Quantifying the capillary density and the capillary distribution in microcirculation images can be used as a biological marker to assist critically ill patients. The quantification of these biological markers is labor-intensive, time-consuming, and subject to interobserver vari… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

  3. arXiv:2205.00129  [pdf, other

    cs.LG cs.CV

    Gaze-enhanced Crossmodal Embeddings for Emotion Recognition

    Authors: Ahmed Abdou, Ekta Sood, Philipp Müller, Andreas Bulling

    Abstract: Emotional expressions are inherently multimodal -- integrating facial behavior, speech, and gaze -- but their automatic recognition is often limited to a single modality, e.g. speech during a phone call. While previous work proposed crossmodal emotion embeddings to improve monomodal recognition performance, despite its importance, an explicit representation of gaze was not included. We propose a n… ▽ More

    Submitted 29 April, 2022; originally announced May 2022.

  4. arXiv:2204.08462  [pdf, other

    eess.IV cs.CV cs.LG

    CapillaryX: A Software Design Pattern for Analyzing Medical Images in Real-time using Deep Learning

    Authors: Maged Abdalla Helmy Abdou, Paulo Ferreira, Eric Jul, Tuyen Trung Truong

    Abstract: Recent advances in digital imaging, e.g., increased number of pixels captured, have meant that the volume of data to be processed and analyzed from these images has also increased. Deep learning algorithms are state-of-the-art for analyzing such images, given their high accuracy when trained with a large data volume of data. Nevertheless, such analysis requires considerable computational power, ma… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

  5. HoneyModels: Machine Learning Honeypots

    Authors: Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler Shipp, Patrick McDaniel

    Abstract: Machine Learning is becoming a pivotal aspect of many systems today, offering newfound performance on classification and prediction tasks, but this rapid integration also comes with new unforeseen vulnerabilities. To harden these systems the ever-growing field of Adversarial Machine Learning has proposed new attack and defense mechanisms. However, a great asymmetry exists as these defensive method… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: Published in: MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)

  6. arXiv:2202.06459  [pdf, other

    cs.CR

    Work in progress: Identifying Two-Factor Authentication Support in Banking Sites

    Authors: Srivathsan G. Morkonda, AbdelRahman Abdou

    Abstract: Two-factor authentication (2FA) offers several security benefits that security-conscious users might expect from high-value services such as online banks. In this work, we present our preliminary study to develop a scoring scheme to automatically recognize when bank sites mention support for two-factor authentication. We extract information related to security features (primarily 2FA) offered by 3… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

  7. arXiv:2110.11488  [pdf, other

    cs.CR cs.NI

    Certificate Root Stores: An Area of Unity or Disparity?

    Authors: Jegan Purushothaman, Ethan Thompson, AbdelRahman Abdou

    Abstract: Organizations like Apple, Microsoft, Mozilla and Google maintain certificate root stores, which are used as trust anchors by their software platforms. Is there sufficient consensus on their root-store inclusion and trust policies? Disparities appear astounding, including in the government-owned certificates that they trust. Such a status-quo is alarming.

    Submitted 8 August, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

    Journal ref: USENIX Cyber Security Experimentation and Test Workshop (CSET 2022)

  8. CapillaryNet: An Automated System to Quantify Skin Capillary Density and Red Blood Cell Velocity from Handheld Vital Microscopy

    Authors: Maged Helmy, Anastasiya Dykyy, Tuyen Trung Truong, Paulo Ferreira, Eric Jul

    Abstract: Capillaries are the smallest vessels in the body responsible for delivering oxygen and nutrients to surrounding cells. Various life-threatening diseases are known to alter the density of healthy capillaries and the flow velocity of erythrocytes within the capillaries. In previous studies, capillary density and flow velocity were manually assessed by trained specialists. However, manual analysis of… ▽ More

    Submitted 20 January, 2022; v1 submitted 23 April, 2021; originally announced April 2021.

    Comments: Improved overall English text and added few more sections

  9. arXiv:1911.11078  [pdf, other

    cs.CR

    UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband

    Authors: Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun

    Abstract: Mobile autonomous systems, robots, and cyber-physical systems rely on accurate positioning information. To conduct distance-measurement, two devices exchange signals and, knowing these signals propagate at the speed of light, the time of arrival is used for distance estimations. Existing distance-measurement techniques are incapable of protecting against adversarial distance enlargement---a highly… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Journal ref: USENIX Security 2019

  10. arXiv:1906.11288  [pdf, other

    cs.CR

    Secure Client and Server Geolocation Over the Internet

    Authors: AbdelRahman Abdou, Paul C. van Oorschot

    Abstract: In this article, we provide a summary of recent efforts towards achieving Internet geolocation securely, \ie without allowing the entity being geolocated to cheat about its own geographic location. Cheating motivations arise from many factors, including impersonation (in the case locations are used to reinforce authentication), and gaining location-dependent benefits. In particular, we provide a t… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

  11. SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust

    Authors: Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David Basin, Adrian Perrig

    Abstract: The ability to quickly revoke a compromised key is critical to the security of any public-key infrastructure. Regrettably, most traditional certificate revocation schemes suffer from latency, availability, or privacy problems. These problems are exacerbated by the lack of a native delegation mechanism in TLS, which increasingly leads domain owners to engage in dangerous practices such as sharing t… ▽ More

    Submitted 20 April, 2020; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: IEEE European Symposium on Security and Privacy (EuroS&P) 2020

  12. arXiv:1906.02282  [pdf, other

    cs.LG cs.CR cs.LO stat.ML

    Enhancing Gradient-based Attacks with Symbolic Intervals

    Authors: Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana

    Abstract: Recent breakthroughs in defenses against adversarial examples, like adversarial training, make the neural networks robust against various classes of attackers (e.g., first-order gradient-based attacks). However, it is an open question whether the adversarially trained networks are truly robust under unknown attacks. In this paper, we present interval attacks, a new technique to find adversarial ex… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

  13. arXiv:1811.02625  [pdf, other

    cs.LG cs.CR stat.ML

    MixTrain: Scalable Training of Verifiably Robust Neural Networks

    Authors: Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana

    Abstract: Making neural networks robust against adversarial inputs has resulted in an arms race between new defenses and attacks. The most promising defenses, adversarially robust training and verifiably robust training, have limitations that restrict their practical applications. The adversarially robust training only makes the networks robust against a subclass of attackers and we reveal such weaknesses b… ▽ More

    Submitted 1 December, 2018; v1 submitted 6 November, 2018; originally announced November 2018.

  14. arXiv:1802.05169  [pdf, other

    cs.CR cs.ET cs.NI

    Internet Location Verification: Challenges and Solutions

    Authors: AbdelRahman Abdou

    Abstract: This thesis addresses the problem of verifying the geographic locations of Internet clients. First, we demonstrate how current state-of-the-art delay-based geolocation techniques are susceptible to evasion through delay manipulations, which involve both increasing and decreasing the Internet delays that are observed between a client and a remote measuring party. We then propose Client Presence Ver… ▽ More

    Submitted 14 February, 2018; originally announced February 2018.

    Journal ref: PhD Thesis, Carleton University, Ottawa, Canada, 2015

  15. arXiv:1708.01706  [pdf, other

    cs.CR

    Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes

    Authors: Furkan Alaca, AbdelRahman Abdou, Paul C. van Oorschot

    Abstract: Many password alternatives for web authentication proposed over the years, despite having different designs and objectives, all predominantly rely on the knowledge of some secret. This motivates us, herein, to provide the first detailed exploration of the integration of a fundamentally different element of defense into the design of web authentication schemes: a mimicry-resistance dimension. We an… ▽ More

    Submitted 30 March, 2019; v1 submitted 4 August, 2017; originally announced August 2017.

  16. arXiv:1703.06992  [pdf, other

    cs.NI cs.CR

    A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks

    Authors: AbdelRahman Abdou, Paul C. van Oorschot, Tao Wan

    Abstract: Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural difference implies a different design for control functions necessary for essential network properties, e.g., loop prevention and link redundancy. We explore how such differences redefine the security weaknesses in the SDN con… ▽ More

    Submitted 6 December, 2017; v1 submitted 20 March, 2017; originally announced March 2017.

  17. arXiv:1608.03939  [pdf, other

    cs.CR cs.NI

    Server Location Verification and Server Location Pinning: Augmenting TLS Authentication

    Authors: AbdelRahman Abdou, P. C. van Oorschot

    Abstract: We introduce the first known mechanism providing realtime server location verification. Its uses include enhancing server authentication (e.g., augmenting TLS) by enabling browsers to automatically interpret server location information. We describe the design of this new measurement-based technique, Server Location Verification (SLV), and evaluate it using PlanetLab. We explain how SLV is compatib… ▽ More

    Submitted 16 August, 2016; v1 submitted 13 August, 2016; originally announced August 2016.

    Comments: 14 pages, 4 figures