Skip to main content

Showing 1–25 of 25 results for author: Doan, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.18309  [pdf, other

    cs.CR

    Bayesian Learned Models Can Detect Adversarial Malware For Free

    Authors: Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: The vulnerability of machine learning-based malware detectors to adversarial attacks has prompted the need for robust solutions. Adversarial training is an effective method but is computationally expensive to scale up to large datasets and comes at the cost of sacrificing model performance for robustness. We hypothesize that adversarial malware exploits the low-confidence regions of models and can… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted to the 29th European Symposium on Research in Computer Security (ESORICS) 2024 Conference

  2. arXiv:2401.17052  [pdf, other

    cs.LG

    Making Parametric Anomaly Detection on Tabular Data Non-Parametric Again

    Authors: Hugo Thimonier, Fabrice Popineau, Arpad Rimmel, Bich-Liên Doan

    Abstract: Deep learning for tabular data has garnered increasing attention in recent years, yet employing deep models for structured data remains challenging. While these models excel with unstructured data, their efficacy with structured data has been limited. Recent research has introduced retrieval-augmented models to address this gap, demonstrating promising results in supervised tasks such as classific… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  3. arXiv:2401.08474  [pdf, other

    cs.CV

    TUMTraf Event: Calibration and Fusion Resulting in a Dataset for Roadside Event-Based and RGB Cameras

    Authors: Christian Creß, Walter Zimmer, Nils Purschke, Bach Ngoc Doan, Sven Kirchner, Venkatnarayanan Lakshminarasimhan, Leah Strand, Alois C. Knoll

    Abstract: Event-based cameras are predestined for Intelligent Transportation Systems (ITS). They provide very high temporal resolution and dynamic range, which can eliminate motion blur and improve detection performance at night. However, event-based images lack color and texture compared to images from a conventional RGB camera. Considering that, data fusion between event-based and conventional cameras can… ▽ More

    Submitted 9 March, 2024; v1 submitted 16 January, 2024; originally announced January 2024.

    Comments: 18 pages, 10 figures, 6 tables. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  4. arXiv:2312.13896  [pdf, other

    cs.LG q-fin.ST

    Comparative Evaluation of Anomaly Detection Methods for Fraud Detection in Online Credit Card Payments

    Authors: Hugo Thimonier, Fabrice Popineau, Arpad Rimmel, Bich-Liên Doan, Fabrice Daniel

    Abstract: This study explores the application of anomaly detection (AD) methods in imbalanced learning tasks, focusing on fraud detection using real online credit card payment data. We assess the performance of several recent AD methods and compare their effectiveness against standard supervised learning methods. Offering evidence of distribution shift within our dataset, we analyze its impact on the tested… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: Accepted at ICICT 2024

  5. Benchmarking Robustness of Deep Reinforcement Learning approaches to Online Portfolio Management

    Authors: Marc Velay, Bich-Liên Doan, Arpad Rimmel, Fabrice Popineau, Fabrice Daniel

    Abstract: Deep Reinforcement Learning approaches to Online Portfolio Selection have grown in popularity in recent years. The sensitive nature of training Reinforcement Learning agents implies a need for extensive efforts in market representation, behavior objectives, and training processes, which have often been lacking in previous works. We propose a training and evaluation process to assess the performanc… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

    Comments: Submitted to INISTA 2023

  6. arXiv:2305.15121  [pdf, other

    cs.LG

    Beyond Individual Input for Deep Anomaly Detection on Tabular Data

    Authors: Hugo Thimonier, Fabrice Popineau, Arpad Rimmel, Bich-Liên Doan

    Abstract: Anomaly detection is vital in many domains, such as finance, healthcare, and cybersecurity. In this paper, we propose a novel deep anomaly detection method for tabular data that leverages Non-Parametric Transformers (NPTs), a model initially proposed for supervised tasks, to capture both feature-feature and sample-sample dependencies. In a reconstruction-based framework, we train an NPT to reconst… ▽ More

    Submitted 2 May, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

  7. arXiv:2301.12680  [pdf, other

    cs.CR

    Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

    Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: We present a new algorithm to train a robust malware detector. Modern malware detectors rely on machine learning algorithms. Now, the adversarial objective is to devise alterations to the malware code to decrease the chance of being detected whilst preserving the functionality and realism of the malware. Adversarial learning is effective in improving robustness but generating functional and realis… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: Accepted to AAAI 2023 conference

  8. arXiv:2212.02003  [pdf, other

    cs.LG cs.CR cs.CV

    Bayesian Learning with Information Gain Provably Bounds Risk for a Robust Adversarial Defense

    Authors: Bao Gia Doan, Ehsan Abbasnejad, Javen Qinfeng Shi, Damith C. Ranasinghe

    Abstract: We present a new algorithm to learn a deep neural network model robust against adversarial attacks. Previous algorithms demonstrate an adversarially trained Bayesian Neural Network (BNN) provides improved robustness. We recognize the adversarial learning approach for approximating the multi-modal posterior distribution of a Bayesian model can lead to mode collapse; consequently, the model's achiev… ▽ More

    Submitted 1 December, 2023; v1 submitted 4 December, 2022; originally announced December 2022.

    Comments: Published at ICML 2022. Code is available at https://github.com/baogiadoan/IG-BNN

    Journal ref: Proceedings of the 39th International Conference on Machine Learning, PMLR 162:5309-5323, 2022

  9. arXiv:2209.14599  [pdf, other

    cs.CV

    Online pseudo labeling for polyp segmentation with momentum networks

    Authors: Toan Pham Van, Linh Bao Doan, Thanh Tung Nguyen, Duc Trung Tran, Quan Van Nguyen, Dinh Viet Sang

    Abstract: Semantic segmentation is an essential task in develo** medical image diagnosis systems. However, building an annotated medical dataset is expensive. Thus, semi-supervised methods are significant in this circumstance. In semi-supervised learning, the quality of labels plays a crucial role in model performance. In this work, we present a new pseudo labeling strategy that enhances the quality of ps… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: Accepted in KSE 2022

  10. arXiv:2207.00425  [pdf, other

    cs.CR cs.AI cs.LG

    Transferable Graph Backdoor Attack

    Authors: Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere

    Abstract: Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting from the message passing strategy that fuses the local structure and node features for better graph representation learning. Despite the success of GNNs, and similar to other types of deep neural networks, GNNs are found to be vulnerable to unnoticeable perturbations on both graph structure and nod… ▽ More

    Submitted 4 July, 2022; v1 submitted 21 June, 2022; originally announced July 2022.

    Comments: Accepted by the 25th International Symposium on Research in Attacks, Intrusions, and Defenses

  11. TracInAD: Measuring Influence for Anomaly Detection

    Authors: Hugo Thimonier, Fabrice Popineau, Arpad Rimmel, Bich-Liên Doan, Fabrice Daniel

    Abstract: As with many other tasks, neural networks prove very effective for anomaly detection purposes. However, very few deep-learning models are suited for detecting anomalies on tabular datasets. This paper proposes a novel methodology to flag anomalies based on TracIn, an influence measure initially introduced for explicability purposes. The proposed methods can serve to augment any unsupervised deep a… ▽ More

    Submitted 30 January, 2024; v1 submitted 3 May, 2022; originally announced May 2022.

    Journal ref: 2022 International Joint Conference on Neural Networks (IJCNN)

  12. arXiv:2112.05240  [pdf

    q-bio.QM cs.LG eess.IV physics.med-ph

    Label-free virtual HER2 immunohistochemical staining of breast tissue using deep learning

    Authors: Bijie Bai, Hongda Wang, Yuzhu Li, Kevin de Haan, Francesco Colonnese, Yujie Wan, **gyi Zuo, Ngan B. Doan, Xiaoran Zhang, Yijie Zhang, **gxi Li, Wenjie Dong, Morgan Angus Darrow, Elham Kamangar, Han Sung Lee, Yair Rivenson, Aydogan Ozcan

    Abstract: The immunohistochemical (IHC) staining of the human epidermal growth factor receptor 2 (HER2) biomarker is widely practiced in breast tissue analysis, preclinical studies and diagnostic decisions, guiding cancer treatment and investigation of pathogenesis. HER2 staining demands laborious tissue treatment and chemical processing performed by a histotechnologist, which typically takes one day to pre… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: 26 Pages, 5 Figures

    Journal ref: BME Frontiers (2022)

  13. arXiv:2111.09999  [pdf, other

    cs.CV cs.CR

    TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems

    Authors: Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: Deep neural networks are vulnerable to attacks from adversarial inputs and, more recently, Trojans to misguide or hijack the model's decision. We expose the existence of an intriguing class of spatially bounded, physically realizable, adversarial examples -- Universal NaTuralistic adversarial paTches -- we call TnTs, by exploring the superset of the spatially bounded adversarial example space and… ▽ More

    Submitted 25 July, 2022; v1 submitted 18 November, 2021; originally announced November 2021.

    Comments: Accepted for publication in the IEEE Transactions on Information Forensics & Security (TIFS)

  14. From Universal Language Model to Downstream Task: Improving RoBERTa-Based Vietnamese Hate Speech Detection

    Authors: Quang Huu Pham, Viet Anh Nguyen, Linh Bao Doan, Ngoc N. Tran, Ta Minh Thanh

    Abstract: Natural language processing is a fast-growing field of artificial intelligence. Since the Transformer was introduced by Google in 2017, a large number of language models such as BERT, GPT, and ELMo have been inspired by this architecture. These models were trained on huge datasets and achieved state-of-the-art results on natural language understanding. However, fine-tuning a pre-trained language m… ▽ More

    Submitted 24 February, 2021; originally announced February 2021.

    Comments: Published in 2020 12th International Conference on Knowledge and Systems Engineering (KSE)

    Journal ref: 2020 12th International Conference on Knowledge and Systems Engineering (KSE), Can Tho, Vietnam, 2020, pp. 37-42

  15. Interpreting the Latent Space of Generative Adversarial Networks using Supervised Learning

    Authors: Toan Pham Van, Tam Minh Nguyen, Ngoc N. Tran, Hoai Viet Nguyen, Linh Bao Doan, Huy Quang Dao, Thanh Ta Minh

    Abstract: With great progress in the development of Generative Adversarial Networks (GANs), in recent years, the quest for insights in understanding and manipulating the latent space of GAN has gained more and more attention due to its wide range of applications. While most of the researches on this task have focused on unsupervised learning method, which induces difficulties in training and limitation in r… ▽ More

    Submitted 24 February, 2021; originally announced February 2021.

    Comments: Published in 2020 International Conference on Advanced Computing and Applications (ACOMP)

    Journal ref: 2020 International Conference on Advanced Computing and Applications (ACOMP), Quy Nhon, Vietnam, 2020, pp. 49-54

  16. Efficient Palm-Line Segmentation with U-Net Context Fusion Module

    Authors: Toan Pham Van, Son Trung Nguyen, Linh Bao Doan, Ngoc N. Tran, Ta Minh Thanh

    Abstract: Many cultures around the world believe that palm reading can be used to predict the future life of a person. Palmistry uses features of the hand such as palm lines, hand shape, or fingertip position. However, the research on palm-line detection is still scarce, many of them applied traditional image processing techniques. In most real-world scenarios, images usually are not in well-conditioned, ca… ▽ More

    Submitted 24 February, 2021; originally announced February 2021.

    Comments: Published in 2020 International Conference on Advanced Computing and Applications (ACOMP)

    Journal ref: 2020 International Conference on Advanced Computing and Applications (ACOMP), Quy Nhon, Vietnam, 2020, pp. 23-28

  17. arXiv:2007.10760  [pdf, other

    cs.CR cs.CV cs.LG

    Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

    Authors: Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim

    Abstract: This work provides the community with a timely comprehensive review of backdoor attacks and countermeasures on deep learning. According to the attacker's capability and affected stage of the machine learning pipeline, the attack surfaces are recognized to be wide and then formalized into six categorizations: code poisoning, outsourcing, pretrained, data collection, collaborative learning and post-… ▽ More

    Submitted 2 August, 2020; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: 29 pages, 9 figures, 2 tables

  18. arXiv:1911.10312  [pdf, other

    cs.CR

    Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks

    Authors: Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, Hyoungshick Kim

    Abstract: This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan detection defence across Vision, Text and Audio domains---thus termed as STRIP-ViTA. Specifically, STRIP-ViTA is the first confirmed Trojan detection method that is demonstratively independent of both the task domain and model architectures. We have extensively e… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: 14 pages

  19. Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems

    Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: We propose Februus; a new idea to neutralize highly potent and insidious Trojan attacks on Deep Neural Network (DNN) systems at run-time. In Trojan attacks, an adversary activates a backdoor crafted in a deep neural network model using a secret trigger, a Trojan, applied to any input to alter the model's decision to a target prediction---a target determined by and only known to the attacker. Febru… ▽ More

    Submitted 28 September, 2020; v1 submitted 9 August, 2019; originally announced August 2019.

    Comments: 16 pages, to appear in the 36th Annual Computer Security Applications Conference (ACSAC 2020)

    Journal ref: In the 36th Annual Computer Security Applications Conference (ACSAC 2020)

  20. Quantum Semantic Correlations in Hate and Non-Hate Speeches

    Authors: Francesco Galofaro, Zeno Toffano, Bich-Liên Doan

    Abstract: This paper aims to apply the notions of quantum geometry and correlation to the typification of semantic relations between couples of keywords in different documents. In particular we analysed texts classified as hate / non hate speeches, containing the keywords "women", "white", and "black". The paper compares this approach to cosine similarity, a classical methodology, to cast light on the noti… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

    Comments: In Proceedings CAPNS 2018, arXiv:1811.02701

    ACM Class: H.3.3; I.2.7

    Journal ref: EPTCS 283, 2018, pp. 62-74

  21. arXiv:1304.6920  [pdf, other

    cs.IR quant-ph

    Contextual Query Using Bell Tests

    Authors: Joao Barros, Zeno Toffano, Youssef Meguebli, Bich-Liên Doan

    Abstract: Tests are essential in Information Retrieval and Data Mining in order to evaluate the effectiveness of a query. An automatic measure tool intended to exhibit the meaning of words in context has been developed and linked with Quantum Theory, particularly entanglement. "Quantum like" experiments were undertaken on semantic space based on the Hyperspace Analogue Language (HAL) method. A quantum HAL m… ▽ More

    Submitted 30 September, 2013; v1 submitted 25 April, 2013; originally announced April 2013.

    Comments: 12 pages, 3 figures

  22. An ontology-based approach for semantics ranking of the web search engines results

    Authors: Abdelkrim Bouramoul, Mohamed-Khireddine Kholladi, Bich-Liên Doan

    Abstract: This work falls in the areas of information retrieval and semantic web, and aims to improve the evaluation of web search tools. Indeed, the huge number of information on the web as well as the growth of new inexperienced users creates new challenges for information retrieval; certainly the current search engines (such as Google, Bing and Yahoo) offer an efficient way to browse the web content. How… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

    Comments: 6 pages, 5 figures, appears in: (ICMCS), 2012 International Conference on Multimedia Computing and Systems, Print ISBN: 978-1-4673-1518-0

    Journal ref: In The 3rd International Conference on Multimedia Computing and Systems, IEEE. 797-802, Tanger, Morocco, 2012

  23. arXiv:1207.4328  [pdf

    cs.IR quant-ph

    Quantum-like Tests for Contextual Querying

    Authors: Zeno Toffano, Bich-Lien Doan

    Abstract: Tests are essential in Information Retrieval (IR), in order to evaluate the effectiveness of a query. Tests intended to exhibit the sense of words in con-text were undertaken and linked with Quantum Mechanics (QM). Poll tests were undertaken on heterogeneous media such as music and polysemy in foreign languages. Interference effects are shown in the results. Bell inequality was used leading to a s… ▽ More

    Submitted 18 July, 2012; originally announced July 2012.

    Comments: 11 pages, 5 tables

  24. PRESY: A Context Based Query Reformulation Tool for Information Retrieval on the Web

    Authors: Abdelkrim Bouramoul, Mohamed-Khireddine Kholladi, Bich-Lien Doan

    Abstract: Problem Statement: The huge number of information on the web as well as the growth of new inexperienced users creates new challenges for information retrieval. It has become increasingly difficult for these users to find relevant documents that satisfy their individual needs. Certainly the current search engines (such as Google, Bing and Yahoo) offer an efficient way to browse the web content. How… ▽ More

    Submitted 12 June, 2011; originally announced June 2011.

    Comments: 8 pages

    Journal ref: Journal of Computer Science (JCS) - ISSN: 15493636, Vol.6, No.4 : 470-477, April 2010

  25. Using Context to Improve the Evaluation of Information Retrieval Systems

    Authors: Abdelkrim Bouramoul, Mohamed-Khireddine Kholladi, Bich-Lien Doan

    Abstract: The crucial role of the evaluation in the development of the information retrieval tools is useful evidence to improve the performance of these tools and the quality of results that they return. However, the classic evaluation approaches have limitations and shortcomings especially regarding to the user consideration, the measure of the adequacy between the query and the returned documents and the… ▽ More

    Submitted 31 May, 2011; originally announced May 2011.

    Comments: 18 pages

    Journal ref: International Journal of Database Management Systems ( IJDMS ), Vol.3, No.2, May 2011