Skip to main content

Showing 1–23 of 23 results for author: Amariucai, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05047  [pdf, other

    cs.LG cs.CR

    Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4

    Authors: Bishwas Mandal, George Amariucai, Shuangqing Wei

    Abstract: We investigate the application of large language models (LLMs), specifically GPT-4, to scenarios involving the tradeoff between privacy and utility in tabular data. Our approach entails prompting GPT-4 by transforming tabular data points into textual format, followed by the inclusion of precise sanitization instructions in a zero-shot manner. The primary objective is to sanitize the tabular data i… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: 8 pages, Paper accepted at 2024 IEEE International Joint Conference on Neural Networks (IJCNN)

  2. arXiv:2404.05043  [pdf, other

    cs.LG cs.CR

    Optimizing Privacy and Utility Tradeoffs for Group Interests Through Harmonization

    Authors: Bishwas Mandal, George Amariucai, Shuangqing Wei

    Abstract: We propose a novel problem formulation to address the privacy-utility tradeoff, specifically when dealing with two distinct user groups characterized by unique sets of private and utility attributes. Unlike previous studies that primarily focus on scenarios where all users share identical private and utility attributes and often rely on auxiliary datasets or manual annotations, we introduce a coll… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: 10 pages, Paper accepted at 2024 IEEE International Joint Conference on Neural Networks (IJCNN)

  3. arXiv:2402.16430  [pdf, other

    cs.CR cs.HC

    Improving behavior based authentication against adversarial attack using XAI

    Authors: Dong Qin, George Amariucai, Daji Qiao, Yong Guan

    Abstract: In recent years, machine learning models, especially deep neural networks, have been widely used for classification tasks in the security domain. However, these models have been shown to be vulnerable to adversarial manipulation: small changes learned by an adversarial attack model, when applied to the input, can cause significant changes in the output. Most research on adversarial attacks and cor… ▽ More

    Submitted 10 March, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

  4. arXiv:2310.18334  [pdf, other

    cs.AR cs.DC

    Hypersparse Traffic Matrix Construction using GraphBLAS on a DPU

    Authors: William Bergeron, Michael Jones, Chase Barber, Kale DeYoung, George Amariucai, Kaleb Ernst, Nathan Fleming, Peter Michaleas, Sandeep Pisharody, Nathan Wells, Antonio Rosa, Eugene Vasserman, Jeremy Kepner

    Abstract: Low-power small form factor data processing units (DPUs) enable offloading and acceleration of a broad range of networking and security services. DPUs have accelerated the transition to programmable networking by enabling the replacement of FPGAs/ASICs in a wide range of network oriented devices. The GraphBLAS sparse matrix graph open standard math library is well-suited for constructing anonymize… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

  5. arXiv:2310.17945  [pdf, other

    cs.LG cs.AI

    A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR)

    Authors: Dong Qin, George Amariucai, Daji Qiao, Yong Guan, Shen Fu

    Abstract: The limited transparency of the inner decision-making mechanism in deep neural networks (DNN) and other machine learning (ML) models has hindered their application in several domains. In order to tackle this issue, feature attribution methods have been developed to identify the crucial features that heavily influence decisions made by these black box models. However, many feature attribution metho… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

    Comments: 16 pages, 22 figures

  6. arXiv:2208.10253  [pdf, other

    cs.CR cs.GT cs.IT

    The Economics of Privacy and Utility: Investment Strategies

    Authors: Chandra Sharma, George Amariucai, Shuangqing Wei

    Abstract: The inevitable leakage of privacy as a result of unrestrained disclosure of personal information has motivated extensive research on robust privacy-preserving mechanisms. However, existing research is mostly limited to solving the problem in a static setting with disregard for the privacy leakage over time. Unfortunately, this treatment of privacy is insufficient in practical settings where users… ▽ More

    Submitted 4 July, 2022; originally announced August 2022.

  7. Uncertainty-Autoencoder-Based Privacy and Utility Preserving Data Type Conscious Transformation

    Authors: Bishwas Mandal, George Amariucai, Shuangqing Wei

    Abstract: We propose an adversarial learning framework that deals with the privacy-utility tradeoff problem under two types of conditions: data-type ignorant, and data-type aware. Under data-type aware conditions, the privacy mechanism provides a one-hot encoding of categorical features, representing exactly one class, while under data-type ignorant conditions the categorical variables are represented by a… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: Paper accepted at the 2022 IEEE International Joint Conference on Neural Networks (IJCNN)

    Journal ref: 2022 International Joint Conference on Neural Networks (IJCNN)

  8. arXiv:2006.11456  [pdf, other

    cs.SI

    Implicit Crowdsourcing for Identifying Abusive Behavior in Online Social Networks

    Authors: Abiola Osho, Ethan Tucker, George Amariucai

    Abstract: The increased use of online social networks for the dissemination of information comes with the misuse of the internet for cyberbullying, cybercrime, spam, vandalism, amongst other things. To proactively identify abuse in the networks, we propose a model to identify abusive posts by crowdsourcing. The crowdsourcing part of the detection mechanism is implemented implicitly, by simply observing the… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  9. Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication

    Authors: Abhishek Jana, Bipin Paudel, Md Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T Amariucai

    Abstract: Powered by new advances in sensor development and artificial intelligence, the decreasing cost of computation, and the pervasiveness of handheld computation devices, biometric user authentication (and identification) is rapidly becoming ubiquitous. Modern approaches to biometric authentication, based on sophisticated machine learning techniques, cannot avoid storing either trained-classifier detai… ▽ More

    Submitted 18 December, 2023; v1 submitted 18 March, 2020; originally announced March 2020.

    Comments: 8 pages, 5 figures

    Journal ref: Proceedings on Privacy Enhancing Technologies, 2022, volume 4, pages 86-104

  10. arXiv:2003.04916  [pdf, other

    cs.IT

    A Practical Approach to Navigating the Tradeoff Between Privacy and Precise Utility

    Authors: Chandra Sharma, George Amariucai

    Abstract: Due to the recent popularity of online social networks, coupled with people's propensity to disclose personal information in an effort to achieve certain gratifications, the problem of navigating the tradeoff between privacy and utility attracted a lot of recent interest and generated a rich body of research. A critical prerequisite to solving the problem is to appropriately capture the privacy an… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

  11. arXiv:2002.11104  [pdf, ps, other

    cs.SI cs.LG stat.ML

    An Information Diffusion Approach to Rumor Propagation and Identification on Twitter

    Authors: Abiola Osho, Caden Waters, George Amariucai

    Abstract: With the increasing use of online social networks as a source of news and information, the propensity for a rumor to disseminate widely and quickly poses a great concern, especially in disaster situations where users do not have enough time to fact-check posts before making the informed decision to react to a post that appears to be credible. In this study, we explore the propagation pattern of ru… ▽ More

    Submitted 24 February, 2020; originally announced February 2020.

  12. arXiv:2002.10522  [pdf, other

    cs.SI physics.soc-ph

    MIDMod-OSN: A Microscopic-level Information Diffusion Model for Online Social Networks

    Authors: Abiola Osho, Colin Goodman, George Amariucai

    Abstract: As online social networks continue to be commonly used for the dissemination of information to the public, understanding the phenomena that govern information diffusion is crucial for many security and safety-related applications, such as maximizing information spread and misinformation containment during crises and natural disasters. In this study, we hypothesize that the features that contribute… ▽ More

    Submitted 4 March, 2020; v1 submitted 24 February, 2020; originally announced February 2020.

  13. Review of the Security of Backward-Compatible Automotive Inter-ECU Communication

    Authors: Chandra Sharma, Samuel Moylan, George Amariucai, Eugene Y. Vasserman

    Abstract: Advanced electronic units inside modern vehicles have enhanced the driving experience, but also introduced a myriad of security problems due to the inherent limitations of the internal communication protocol. In the last two decades, a number of security threats have been identified and accordingly, security measures have been proposed. While a large body of research on the vehicular security doma… ▽ More

    Submitted 26 September, 2021; v1 submitted 9 October, 2019; originally announced October 2019.

  14. arXiv:1701.04873  [pdf, other

    cs.IT

    Tree Structured Synthesis of Gaussian Trees

    Authors: Ali Moharrer, Shuangqing Wei, George T. Amariucai, **g Deng

    Abstract: A new synthesis scheme is proposed to effectively generate a random vector with prescribed joint density that induces a (latent) Gaussian tree structure. The quality of synthesis is measured by total variation distance between the synthesized and desired statistics. The proposed layered and successive encoding scheme relies on the learned structure of tree to use minimal number of common random va… ▽ More

    Submitted 24 April, 2017; v1 submitted 17 January, 2017; originally announced January 2017.

    Comments: Part of this work has been submitted to 2017 IEEE MILCOM, Baltimore, MD, 9 pages, 7 Figures. arXiv admin note: substantial text overlap with arXiv:1608.04484

  15. arXiv:1608.04484  [pdf, other

    cs.IT

    Layered Synthesis of Latent Gaussian Trees

    Authors: Ali Moharrer, Shuangqing Wei, George T. Amariucai, **g Deng

    Abstract: A new synthesis scheme is proposed to generate a random vector with prescribed joint density that induces a (latent) Gaussian tree structure. The quality of synthesis is shown by vanishing total variation distance between the synthesized and desired statistics. The proposed layered and successive synthesis scheme relies on the learned structure of tree to use sufficient number of common random var… ▽ More

    Submitted 7 May, 2017; v1 submitted 16 August, 2016; originally announced August 2016.

    Comments: Submitted to IEEE Trans. on Information Theory, 18 pages

  16. arXiv:1601.06403  [pdf, other

    cs.IT cs.CV stat.ML

    Synthesis of Gaussian Trees with Correlation Sign Ambiguity: An Information Theoretic Approach

    Authors: Ali Moharrer, Shuangqing Wei, George T. Amariucai, **g Deng

    Abstract: In latent Gaussian trees the pairwise correlation signs between the variables are intrinsically unrecoverable. Such information is vital since it completely determines the direction in which two variables are associated. In this work, we resort to information theoretical approaches to achieve two fundamental goals: First, we quantify the amount of information loss due to unrecoverable sign informa… ▽ More

    Submitted 7 July, 2016; v1 submitted 24 January, 2016; originally announced January 2016.

    Comments: 14 pages, 9 figures, part of this work is submitted to Allerton 2016 conference, UIUC, IL, USA

  17. arXiv:1504.03744  [pdf, other

    cs.CR

    KERMAN: A Key Establishment Algorithm based on Harvesting Randomness in MANETs

    Authors: Mohammad Reza Khalili Shoja, George Traian Amariucai, Shuangqing Wei, **g Deng

    Abstract: Establishing secret common randomness between two or multiple devices in a network resides at the root of communication security. The problem is traditionally decomposed into a randomness generation stage (randomness purity is subject to employing often costly true random number generators) and a key-agreement information exchange stage, which can rely on public-key infrastructure or on key wrappi… ▽ More

    Submitted 14 April, 2015; originally announced April 2015.

  18. arXiv:1504.02530  [pdf, other

    cs.IT

    Classifying Unrooted Gaussian Trees under Privacy Constraints

    Authors: A. Moharrer, S. Wei, G. T. Amariucai, J. Deng

    Abstract: In this work, our objective is to find out how topological and algebraic properties of unrooted Gaussian tree models determine their security robustness, which is measured by our proposed max-min information (MaMI) metric. Such metric quantifies the amount of common randomness extractable through public discussion between two legitimate nodes under an eavesdropper attack. We show some general topo… ▽ More

    Submitted 10 March, 2016; v1 submitted 9 April, 2015; originally announced April 2015.

    Comments: 12 pages, 7 figures, part of this work is submitted to IEEE Globecom 2015, San Diego, CA, USA

  19. arXiv:1002.1313  [pdf, ps, other

    cs.IT cs.CR

    Half-Duplex Active Eavesdrop** in Fast Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme

    Authors: George T. Amariucai, Shuangqing Wei

    Abstract: In this paper we study the problem of half-duplex active eavesdrop** in fast fading channels. The active eavesdropper is a more powerful adversary than the classical eavesdropper. It can choose between two functional modes: eavesdrop** the transmission between the legitimate parties (Ex mode), and jamming it (Jx mode) -- the active eavesdropper cannot function in full duplex mode. We conside… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: Submitted to IEEE Transactions on Information Theory

  20. arXiv:0909.5120  [pdf, ps, other

    cs.IT cs.CR

    Feedback-Based Collaborative Secrecy Encoding over Binary Symmetric Channels

    Authors: George Amariucai, Shuangqing Wei

    Abstract: In this paper we propose a feedback scheme for transmitting secret messages between two legitimate parties, over an eavesdropped communication link. Relative to Wyner's traditional encoding scheme \cite{wyner1}, our feedback-based encoding often yields larger rate-equivocation regions and achievable secrecy rates. More importantly, by exploiting the channel randomness inherent in the feedback ch… ▽ More

    Submitted 28 September, 2009; originally announced September 2009.

    Comments: Submitted to IEEE Transactions on Information Theory

  21. arXiv:0808.3431  [pdf, ps, other

    cs.IT cs.CR

    Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part I: Fast Fading Channels

    Authors: George T. Amariucai, Shuangqing Wei

    Abstract: This is the first part of a two-part paper that studies the problem of jamming in a fixed-rate transmission system with fading. Both transmitter and jammer are subject to power constraints which can be enforced over each codeword short-term / peak) or over all codewords (long-term / average), hence generating different scenarios. All our jamming problems are formulated as zero-sum games, having… ▽ More

    Submitted 26 August, 2008; originally announced August 2008.

  22. arXiv:0808.3418  [pdf, ps, other

    cs.IT cs.CR

    Jamming in Fixed-Rate Wireless Systems with Power Constraints - Part II: Parallel Slow Fading Channels

    Authors: George T. Amariucai, Shuangqing Wei, Rajgopal Kannan

    Abstract: This is the second part of a two-part paper that studies the problem of jamming in a fixed-rate transmission system with fading. In the first part, we studied the scenario with a fast fading channel, and found Nash equilibria of mixed strategies for short term power constraints, and for average power constraints with and without channel state information (CSI) feedback. We also solved the equall… ▽ More

    Submitted 26 August, 2008; originally announced August 2008.

  23. arXiv:0707.0454   

    cs.IT

    Optimal Strategies for Gaussian Jamming in Block-Fading Channels under Delay and Power Constraints

    Authors: George T. Amariucai, Shuangqing Wei, Rajgopal Kannan

    Abstract: Without assuming any knowledge on source's codebook and its output signals, we formulate a Gaussian jamming problem in block fading channels as a two-player zero sum game. The outage probability is adopted as an objective function, over which transmitter aims at minimization and jammer aims at maximization by selecting their power control strategies. Optimal power control strategies for each pla… ▽ More

    Submitted 28 September, 2009; v1 submitted 3 July, 2007; originally announced July 2007.

    Comments: Submitted to IEEE Trans. Inform. Theory, June 03, 2007, for review, This paper has been withdrawn by the authors. A more recent ane more elaborate version is available at arXiv:0808.3418