Skip to main content

Showing 1–13 of 13 results for author: Ou, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.03473  [pdf, other

    cs.LG cs.CV

    Inverse-Free Fast Natural Gradient Descent Method for Deep Learning

    Authors: Xinwei Ou, Ce Zhu, Xiaolin Huang, Yipeng Liu

    Abstract: Second-order optimization techniques have the potential to achieve faster convergence rates compared to first-order methods through the incorporation of second-order derivatives or statistics. However, their utilization in deep learning is limited due to their computational inefficiency. Various approaches have been proposed to address this issue, primarily centered on minimizing the size of the m… ▽ More

    Submitted 28 April, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

  2. arXiv:2401.17459  [pdf, ps, other

    cs.CR cs.AI

    A Preliminary Study on Using Large Language Models in Software Pentesting

    Authors: Kumar Shashwat, Francis Hahn, Xinming Ou, Dmitry Goldgof, Lawrence Hall, Jay Ligatti, S. Raj Rajgopalan, Armin Ziaie Tabari

    Abstract: Large language models (LLM) are perceived to offer promising potentials for automating security tasks, such as those found in security operation centers (SOCs). As a first step towards evaluating this perceived potential, we investigate the use of LLMs in software pentesting, where the main task is to automatically identify software security vulnerabilities in source code. We hypothesize that an L… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  3. arXiv:2306.02298  [pdf, other

    cs.IT

    NB-IoT Uplink Synchronization by Change Point Detection of Phase Series in NTNs

    Authors: Jiaqi Jiang, Yihang Huang, Yin Xu, Runnan Liu, XiaoWu Ou, Dazhi He

    Abstract: Non-Terrestrial Networks (NTNs) are widely recognized as a potential solution to achieve ubiquitous connections of Narrow Bandwidth Internet of Things (NB-IoT). In order to adopt NTNs in NB-IoT, one of the main challenges is the uplink synchronization of Narrowband Physical Random Access procedure which refers to the estimation of time of arrival (ToA) and carrier frequency offset (CFO). Due to th… ▽ More

    Submitted 4 June, 2023; originally announced June 2023.

  4. arXiv:2303.13635  [pdf, other

    cs.LG

    Low Rank Optimization for Efficient Deep Learning: Making A Balance between Compact Architecture and Fast Training

    Authors: Xinwei Ou, Zhangxin Chen, Ce Zhu, Yipeng Liu

    Abstract: Deep neural networks have achieved great success in many data processing applications. However, the high computational complexity and storage cost makes deep learning hard to be used on resource-constrained devices, and it is not environmental-friendly with much power cost. In this paper, we focus on low-rank optimization for efficient deep learning techniques. In the space domain, deep neural net… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

  5. arXiv:2112.10974  [pdf, other

    cs.CR cs.LG

    What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering

    Authors: Armin Ziaie Tabari, Xinming Ou, Anoop Singhal

    Abstract: The growing number of Internet of Things (IoT) devices makes it imperative to be aware of the real-world threats they face in terms of cybersecurity. While honeypots have been historically used as decoy devices to help researchers/organizations gain a better understanding of the dynamic of threats on a network and their impact, IoT devices pose a unique challenge for this purpose due to the variet… ▽ More

    Submitted 20 December, 2021; originally announced December 2021.

    Comments: arXiv admin note: text overlap with arXiv:2003.01218

  6. arXiv:2004.06563  [pdf, other

    cs.CR

    Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis

    Authors: Yu** Li, Jiong Jang, Xinming Ou

    Abstract: Control Flow Graph (CFG) similarity analysis is an essential technique for a variety of security analysis tasks, including malware detection and malware clustering. Even though various algorithms have been developed, existing CFG similarity analysis methods still suffer from limited efficiency, accuracy, and usability. In this paper, we propose a novel fuzzy hashing scheme called topology-aware ha… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

    Comments: 20 pages, published in SecureComm 2019, see https://link.springer.com/chapter/10.1007/978-3-030-37228-6_14

    Journal ref: In International Conference on Security and Privacy in Communication Systems, pp. 278-298. Springer, Cham, 2019

  7. arXiv:2003.01218  [pdf, other

    cs.CR

    A First Step Towards Understanding Real-world Attacks on IoT Devices

    Authors: Armin Ziaie Tabari, Xinming Ou

    Abstract: With the rapid growth of Internet of Things (IoT) devices, it is imperative to proactively understand the real-world cybersecurity threats posed to them. This paper describes our initial efforts towards building a honeypot ecosystem as a means to gathering and analyzing real attack data against IoT devices. A primary condition for a honeypot to yield useful insights is to let attackers believe the… ▽ More

    Submitted 2 March, 2020; originally announced March 2020.

  8. arXiv:1908.05310  [pdf, other

    cs.CR cs.NI

    Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems

    Authors: Ruffin White, Gianluca Caiazza, Chenxu Jiang, Xinyue Ou, Zhiyue Yang, Agostino Cortesi, Henrik Christensen

    Abstract: Distribution Service (DDS) is a realtime peer-to-peer protocol that serves as a scalable middleware between distributed networked systems found in many Industrial IoT domains such as automotive, medical, energy, and defense. Since the initial ratification of the standard, specifications have introduced a Security Model and Service Plugin Interface (SPI) architecture, facilitating authenticated enc… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

    Comments: 10 pages, 7 figures, 1 algorithm, 10 sections plus references

    Journal ref: Workshop on Software Security for Internet of Things (SSIoT) at IEEE EuroS&P 2019

  9. arXiv:1801.01681  [pdf, other

    cs.CR cs.AI cs.LG

    VulDeePecker: A Deep Learning-Based System for Vulnerability Detection

    Authors: Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai **, Sujuan Wang, Zhijun Deng, Yuyi Zhong

    Abstract: The automatic detection of software vulnerabilities is an important research problem. However, existing solutions to this problem rely on human experts to define features and often miss many vulnerabilities (i.e., incurring high false negative rate). In this paper, we initiate the study of using deep learning-based vulnerability detection to relieve human experts from the tedious and subjective ta… ▽ More

    Submitted 5 January, 2018; originally announced January 2018.

  10. arXiv:1707.04795  [pdf, other

    cs.CR

    Android Malware Clustering through Malicious Payload Mining

    Authors: Yu** Li, Jiyong Jang, Xin Hu, Xinming Ou

    Abstract: Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party libraries in Android application development and the widespread use of repackaging in malware development. We design and implement an Android malwa… ▽ More

    Submitted 15 July, 2017; originally announced July 2017.

    Comments: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)

  11. arXiv:1606.01349  [pdf

    cs.CY

    Investigating the Impacts of Recommendation Agents on Impulsive Purchase Behaviour

    Authors: Hui Zhu, Zherui Yang, Carol Xj Ou, Hongwei Liu, Robert M Davison

    Abstract: The usage of recommendation agents (RAs) in the online marketplace can help consumers to locate their desired products. RAs can help consumers effectively obtain comprehensive product information and compare their candidate target products. As a result, RAs have affected consumers shop** behaviour. In this study, we investigate the usage and the influence of RAs in the online marketplace. Based… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/105

  12. arXiv:1604.07102  [pdf, other

    cs.CV cs.AI

    Makeup like a superstar: Deep Localized Makeup Transfer Network

    Authors: Si Liu, Xinyu Ou, Ruihe Qian, Wei Wang, Xiaochun Cao

    Abstract: In this paper, we propose a novel Deep Localized Makeup Transfer Network to automatically recommend the most suitable makeup for a female and synthesis the makeup on her face. Given a before-makeup face, her most suitable makeup is determined automatically. Then, both the beforemakeup and the reference faces are fed into the proposed Deep Transfer Network to generate the after-makeup face. Our end… ▽ More

    Submitted 24 April, 2016; originally announced April 2016.

    Comments: 7pages, 11 figures, to appear in IJCAI 2016

  13. arXiv:1603.04746  [pdf, other

    cs.CV physics.optics

    Fourier ptychographic reconstruction using Poisson maximum likelihood and truncated Wirtinger gradient

    Authors: Liheng Bian, **li Suo, Jaebum Chung, Xiaoze Ou, Changhuei Yang, Feng Chen, Qionghai Dai

    Abstract: Fourier ptychographic microscopy (FPM) is a novel computational coherent imaging technique for high space-bandwidth product imaging. Mathematically, Fourier ptychographic (FP) reconstruction can be implemented as a phase retrieval optimization process, in which we only obtain low resolution intensity images corresponding to the sub-bands of the sample's high resolution (HR) spatial spectrum, and a… ▽ More

    Submitted 1 March, 2016; originally announced March 2016.