Skip to main content

Showing 1–23 of 23 results for author: Misic, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04046  [pdf

    cs.CR

    MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation

    Authors: Zhenshuai Yue, Haoran Zhu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Junchao Fan

    Abstract: Traditional covert transmission (CT) approaches have been hindering CT application while blockchain technology offers new avenue. Current blockchain-based CT approaches require off-chain negotiation of critical information and often overlook the dynamic session keys updating, which increases the risk of message and key leakage. Additionally, in some approaches the covert transactions exhibit obvio… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  2. arXiv:2401.11305  [pdf, other

    cs.CR cs.CL

    Progress in Privacy Protection: A Review of Privacy Preserving Techniques in Recommender Systems, Edge Computing, and Cloud Computing

    Authors: Syed Raza Bashir, Shaina Raza, Vojislav Misic

    Abstract: As digital technology evolves, the increasing use of connected devices brings both challenges and opportunities in the areas of mobile crowdsourcing, edge computing, and recommender systems. This survey focuses on these dynamic fields, emphasizing the critical need for privacy protection in our increasingly data-oriented world. It explores the latest trends in these interconnected areas, with a sp… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  3. arXiv:2310.05033  [pdf

    cs.CR

    RSMS: Towards Reliable and Secure Metaverse Service Provision

    Authors: Yanwei Gong, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Yingying Yao

    Abstract: Establishing and sustaining Metaverse service necessitates an unprecedented scale of resources. This paper considers the deployment of Metaverse service in a cloud-edge resource architecture, which can satisfy the escalating demand for Metaverse service resources while ensuring both high bandwidth and low latency. We propose a novel mechanism, named Reliable and Secure Metaverse Service (RSMS), to… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  4. arXiv:2309.13864  [pdf

    cs.CR

    PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning

    Authors: Jianhua Wang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Zhi Chen, Junchao Fan

    Abstract: Recently, big data has seen explosive growth in the Internet of Things (IoT). Multi-layer FL (MFL) based on cloud-edge-end architecture can promote model training efficiency and model accuracy while preserving IoT data privacy. This paper considers an improved MFL, where edge layer devices own private data and can join the training process. iMFL can improve edge resource utilization and also allev… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: 12 pages, 11 figures

  5. arXiv:2306.00674  [pdf

    cs.CR cs.DC cs.LG

    CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning

    Authors: Jianhua Wang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Lin Li, Yingying Yao

    Abstract: Federated Learning (FL), a privacy-oriented distributed ML paradigm, is being gaining great interest in Internet of Things because of its capability to protect participants data privacy. Studies have been conducted to address challenges existing in standard FL, including communication efficiency and privacy-preserving. But they cannot achieve the goal of making a tradeoff between communication eff… ▽ More

    Submitted 6 June, 2023; v1 submitted 1 June, 2023; originally announced June 2023.

  6. arXiv:2304.06963  [pdf

    cs.CR math.NA

    Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network

    Authors: Haoran Zhu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić

    Abstract: Stubborn mining attack greatly downgrades Bitcoin throughput and also benefits malicious miners (attackers). This paper aims to quantify the impact of block receiving delay on stubborn mining attack severity in imperfect Bitcoin networks. We develop an analytic model and derive formulas of both relative revenue and system throughput, which are applied to study attack severity. Experiment results v… ▽ More

    Submitted 13 September, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.00210

  7. arXiv:2303.10877  [pdf

    cs.CR

    Practical Solutions in Fully Homomorphic Encryption -- A Survey Analyzing Existing Acceleration Methods

    Authors: Yanwei Gong, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Jianhua Wang, Haoran Zhu

    Abstract: Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure multi-party computing, in order to preserve privacy. Nonetheless, the application of FHE is constrained by its substantial computing overhead and storage cost. Researchers have proposed prac… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: 18 pages, 7 figures

  8. arXiv:2302.00210  [pdf

    cs.CR math.NA

    Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis

    Authors: Haoran Zhu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Lei Han, Zhi Chen

    Abstract: GHOST, like the longest-chain protocol, is a chain selection protocol and its capability in resisting selfish mining attack has been validated in imperfect blockchains of Bitcoin and its variants (Bitcoin-like). This paper explores an analytical-model-based method to investigate the impact of stubborn mining attack in imperfect GHOST Bitcoin-like blockchains. We first quantify chain dynamics based… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

  9. arXiv:2208.01375  [pdf

    cs.IR cs.AI

    BERT4Loc: BERT for Location -- POI Recommender System

    Authors: Syed Raza Bashir, Shaina Raza, Vojislav Misic

    Abstract: Recommending points of interest (POIs) is a challenging task that requires extracting comprehensive location data from location-based social media platforms. To provide effective location-based recommendations, it's important to analyze users' historical behavior and preferences. In this study, we present a sophisticated location-aware recommendation system that uses Bidirectional Encoder Represen… ▽ More

    Submitted 16 May, 2023; v1 submitted 2 August, 2022; originally announced August 2022.

  10. PASS: A Parameter Audit-based Secure and Fair Federated Learning Scheme against Free-Rider Attack

    Authors: Jianhua Wang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Yixiang Wang

    Abstract: Federated Learning (FL) as a secure distributed learning framework gains interests in Internet of Things (IoT) due to its capability of protecting the privacy of participant data. However, traditional FL systems are vulnerable to Free-Rider (FR) attacks, which causes unfairness, privacy leakage and inferior performance to FL systems. The prior defense mechanisms against FR attacks assumed that mal… ▽ More

    Submitted 28 June, 2023; v1 submitted 15 July, 2022; originally announced July 2022.

    Comments: 11 pages, 13 figures, 5 tables. Accepted by IoTJ. For associated file, see early access https://ieeexplore.ieee.org/document/10160204

    Journal ref: IEEE Internet of Things Journal, vol. 11, no. 1, pp. 1374-1384, 1 Jan.1, 2024

  11. arXiv:2203.13446  [pdf, other

    math.OC cs.LG

    Randomized Policy Optimization for Optimal Stop**

    Authors: Xinyi Guan, Velibor V. Mišić

    Abstract: Optimal stop** is the problem of determining when to stop a stochastic system in order to maximize reward, which is of practical importance in domains such as finance, operations management and healthcare. Existing methods for high-dimensional optimal stop** that are popular in practice produce deterministic linear policies -- policies that deterministically stop based on the sign of a weighte… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

    Comments: 65 pages, 1 figure

  12. arXiv:2202.08751  [pdf

    cs.IR cs.LG

    Improving Rating and Relevance with Point-of-Interest Recommender System

    Authors: Syed Raza Bashir, Vojislav Misic

    Abstract: The recommendation of points of interest (POIs) is essential in location-based social networks. It makes it easier for users and locations to share information. Recently, researchers tend to recommend POIs by treating them as large-scale retrieval systems that require a large amount of training data representing query-item relevance. However, gathering user feedback in retrieval systems is an expe… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

  13. arXiv:2201.08468  [pdf, other

    cs.CR cs.LG

    Android Malware Detection using Feature Ranking of Permissions

    Authors: Muhammad Suleman Saleem, Jelena Mišić, Vojislav B. Mišić

    Abstract: We investigate the use of Android permissions as the vehicle to allow for quick and effective differentiation between benign and malware apps. To this end, we extract all Android permissions, eliminating those that have zero impact, and apply two feature ranking algorithms namely Chi-Square test and Fisher's Exact test to rank and additionally filter them, resulting in a comparatively small set of… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

  14. arXiv:2112.02588  [pdf

    cs.CR

    Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum

    Authors: Runkai Yang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić

    Abstract: Bitcoin and Ethereum are the top two blockchain-based cryptocurrencies whether from cryptocurrency market cap or popularity. However, they are vulnerable to selfish mining and stubborn mining due to that both of them adopt Proof-of-Work consensus mechanism. In this paper, we develop a novel Markov model, which can study selfish mining and seven kinds of stubborn mining in both Bitcoin and Ethereum… ▽ More

    Submitted 5 December, 2021; originally announced December 2021.

  15. arXiv:2111.06003  [pdf

    cs.LG cs.AI

    Detecting Fake Points of Interest from Location Data

    Authors: Syed Raza Bashir, Vojislav Misic

    Abstract: The pervasiveness of GPS-enabled mobile devices and the widespread use of location-based services have resulted in the generation of massive amounts of geo-tagged data. In recent times, the data analysis now has access to more sources, including reviews, news, and images, which also raises questions about the reliability of Point-of-Interest (POI) data sources. While previous research attempted to… ▽ More

    Submitted 10 November, 2021; originally announced November 2021.

    Comments: Accepted in IEEE

  16. arXiv:2102.02128  [pdf

    cs.LG cs.CR

    IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks

    Authors: Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić

    Abstract: The widespread application of deep neural network (DNN) techniques is being challenged by adversarial examples, the legitimate input added with imperceptible and well-designed perturbations that can fool DNNs easily in the DNN testing/deploying stage. Previous adversarial example generation algorithms for adversarial white-box attacks used Jacobian gradient information to add perturbations. This i… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

  17. arXiv:2009.05945  [pdf

    cs.CR

    Stochastic Modeling Approaches for Analyzing Blockchain: A Survey

    Authors: Hongyue Kang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Yingying Yao, Zhi Chen

    Abstract: Blockchain technology has been attracting much attention from both academia and industry. It brings many benefits to various applications like Internet of Things. However, there are critical issues to be addressed before its widespread deployment, such as transaction efficiency, bandwidth bottleneck, and security. Techniques are being explored to tackle these issues. Stochastic modeling, as one of… ▽ More

    Submitted 13 September, 2020; originally announced September 2020.

  18. arXiv:1908.01834  [pdf, other

    cs.NI

    Performance analysis of IEEE 802.11ax heterogeneous network in the presence of hidden terminals

    Authors: M. Zulfiker Ali, Jelena Mišić, Vojislav B. Mišić

    Abstract: Performance improvement has been among the foci of all previous amendments of IEEE 802.11 protocol. In addition, the draft high efficiency (HE) amendment IEEE 802.11ax, proposed by TGax, aims at increasing network performance. One of the main obstacles to improving spectral and power efficiency is the presence of hidden terminals which degrade throughput, in particular in uplink transmission. IEEE… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

  19. arXiv:1904.11532  [pdf, other

    cs.LG math.OC stat.ML

    Decision Forest: A Nonparametric Approach to Modeling Irrational Choice

    Authors: Yi-Chun Chen, Velibor V. Mišić

    Abstract: Customer behavior is often assumed to follow weak rationality, which implies that adding a product to an assortment will not increase the choice probability of another product in that assortment. However, an increasing amount of research has revealed that customers are not necessarily rational when making decisions. In this paper, we propose a new nonparametric choice model that relaxes this assum… ▽ More

    Submitted 13 October, 2021; v1 submitted 25 April, 2019; originally announced April 2019.

    Comments: The paper is forthcoming in Management Science (accepted on July 25, 2021)

  20. arXiv:1812.07211  [pdf, other

    math.OC cs.AI cs.LG

    Interpretable Optimal Stop**

    Authors: Dragos Florin Ciocan, Velibor V. Mišić

    Abstract: Optimal stop** is the problem of deciding when to stop a stochastic system to obtain the greatest reward, arising in numerous application areas such as finance, healthcare and marketing. State-of-the-art methods for high-dimensional optimal stop** involve approximating the value function or the continuation value, and then using that approximation within a greedy policy. Although such policies… ▽ More

    Submitted 30 December, 2019; v1 submitted 18 December, 2018; originally announced December 2018.

    Comments: 84 pages, 25 figures; to appear in Management Science

  21. arXiv:1803.08179  [pdf

    cs.NI

    Protocol architectures for IoT domains

    Authors: Jelena Misic, M. Zulfiker Ali, Vojislav B. Misic

    Abstract: In this work we discuss proxy architectures which interconnect IoT domains running CoAP with the rest of Internet including micro datacenters and other domains building scalable hierarchical architectures. We assume that CoAP domain is terminated by an IoT proxy with cache, and we investigate several design issues with respect to successful data transmission, round trip delay and energy consumptio… ▽ More

    Submitted 21 March, 2018; originally announced March 2018.

  22. arXiv:1705.10883  [pdf, other

    math.OC cs.LG stat.ML

    Optimization of Tree Ensembles

    Authors: Velibor V. Mišić

    Abstract: Tree ensemble models such as random forests and boosted trees are among the most widely used and practically successful predictive models in applied machine learning and business analytics. Although such models have been used to make predictions based on exogenous, uncontrollable independent variables, they are increasingly being used to make predictions where the independent variables are control… ▽ More

    Submitted 9 October, 2019; v1 submitted 30 May, 2017; originally announced May 2017.

    Comments: 49 pages, 10 figures; to appear in Operations Research

  23. arXiv:1405.5498  [pdf, other

    math.OC cs.AI

    A Comparison of Monte Carlo Tree Search and Mathematical Optimization for Large Scale Dynamic Resource Allocation

    Authors: Dimitris Bertsimas, J. Daniel Griffith, Vishal Gupta, Mykel J. Kochenderfer, Velibor V. Mišić, Robert Moss

    Abstract: Dynamic resource allocation (DRA) problems are an important class of dynamic stochastic optimization problems that arise in a variety of important real-world applications. DRA problems are notoriously difficult to solve to optimality since they frequently combine stochastic elements with intractably large state and action spaces. Although the artificial intelligence and operations research communi… ▽ More

    Submitted 21 May, 2014; originally announced May 2014.

    Comments: 37 pages, 13 Figures