Skip to main content

Showing 1–10 of 10 results for author: Ray, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.10214  [pdf, other

    cs.CR

    Healthcare Policy Compliance: A Blockchain Smart Contract-Based Approach

    Authors: Md Al Amin, Hemanth Tummala, Seshamalini Mohan, Indrajit Ray

    Abstract: This paper addresses the critical challenge of ensuring healthcare policy compliance in the context of Electronic Health Records (EHRs). Despite stringent regulations like HIPAA, significant gaps in policy compliance often remain undetected until a data breach occurs. To bridge this gap, we propose a novel blockchain-powered, smart contract-based access control model. This model is specifically de… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

  2. arXiv:2311.04818  [pdf, other

    cs.LG cs.CV cs.DC

    Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment

    Authors: Matt Gorbett, Hossein Shirazi, Indrakshi Ray

    Abstract: Learning from the collective knowledge of data dispersed across private sources can provide neural networks with enhanced generalization capabilities. Federated learning, a method for collaboratively training a machine learning model across remote clients, achieves this by combining client models via the orchestration of a central server. However, current approaches face two critical limitations:… ▽ More

    Submitted 17 May, 2024; v1 submitted 8 November, 2023; originally announced November 2023.

    Comments: Published at IEEE Big Data 2023

  3. arXiv:2308.04637  [pdf, other

    cs.LG cs.AI

    Sparse Binary Transformers for Multivariate Time Series Modeling

    Authors: Matt Gorbett, Hossein Shirazi, Indrakshi Ray

    Abstract: Compressed Neural Networks have the potential to enable deep learning across new applications and smaller computational environments. However, understanding the range of learning tasks in which such models can succeed is not well studied. In this work, we apply sparse and binary-weighted Transformers to multivariate time series problems, showing that the lightweight models achieve accuracy compara… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: Published at KDD '23

  4. arXiv:2001.06579  [pdf, other

    cs.HC

    Towards a Virtual Reality Home IoT Network Visualizer

    Authors: Drew Johnston, Jarret Flack, Indrakshi Ray, Francisco R. Ortega

    Abstract: We present an IoT home network visualizer that utilizes virtual reality (VR). This prototype demonstrates the potential that VR has to aid in the understanding of home IoT networks. This is particularly important due the increased number of household devices now connected to the Internet. This prototype is able to function in a standard display or a VR headset. A prototype was developed to aid in… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

    Comments: This paper was accepted at the Graphics Interface 2019 (GI' 19) HCI Track for a poster paper

  5. arXiv:1908.05366  [pdf, ps, other

    cs.CR

    Systematization of Knowledge and Implementation: Short Identity-Based Signatures

    Authors: Diptendu M. Kar, Indrajit Ray

    Abstract: Identity-Based signature schemes are gaining a lot of popularity every day. Over the last decade, there has been a lot of schemes that have been proposed. Several libraries are there that implement identity-based cryptosystems that include identity-based signature schemes like the JPBC library which is written in Java and the charm-crypto library written in python. However, these libraries do not… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  6. arXiv:1905.01002  [pdf, other

    cs.CR cs.SI

    Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach

    Authors: Pin-Yu Chen, Sutanay Choudhury, Luke Rodriguez, Alfred Hero, Indrajit Ray

    Abstract: Lateral movement attacks are a serious threat to enterprise security. In these attacks, an attacker compromises a trusted user account to get a foothold into the enterprise network and uses it to attack other trusted users, increasingly gaining higher and higher privileges. Such lateral attacks are very hard to model because of the unwitting role that users play in the attack and even harder to de… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

    Comments: Technical report for the book chapter "Towards Cyber-Resiliency Metrics for Action Recommendations Against Lateral Movement Attacks" in the book "Industrial Control Systems Security and Resiliency: Practice and Theory" published by Springer, 2019

  7. arXiv:1804.03852  [pdf, other

    cs.CR

    IoTSense: Behavioral Fingerprinting of IoT Devices

    Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray

    Abstract: The Internet-of-Things (IoT) has brought in new challenges in, device identification --what the device is, and, authentication --is the device the one it claims to be. Traditionally, the authentication problem is solved by means of a cryptographic protocol. However, the computational complexity of cryptographic protocols and/or scalability problems related to key management, render almost all cryp… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: 11 pages, 7 tables, 7 figures Keywords: IoT Devices, IoT Network Security, Device Behavior, Device Type Fingerprinting, Machine Learning, Network Traffic Features

  8. arXiv:1710.00760  [pdf, ps, other

    cs.LG

    Scalable Nonlinear AUC Maximization Methods

    Authors: Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz

    Abstract: The area under the ROC curve (AUC) is a measure of interest in various machine learning and data mining applications. It has been widely used to evaluate classification performance on heavily imbalanced data. The kernelized AUC maximization machines have established a superior generalization ability compared to linear AUC machines because of their capability in modeling the complex nonlinear struc… ▽ More

    Submitted 29 April, 2019; v1 submitted 2 October, 2017; originally announced October 2017.

  9. arXiv:1607.00847  [pdf, other

    cs.LG

    Confidence-Weighted Bipartite Ranking

    Authors: Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz

    Abstract: Bipartite ranking is a fundamental machine learning and data mining problem. It commonly concerns the maximization of the AUC metric. Recently, a number of studies have proposed online bipartite ranking algorithms to learn from massive streams of class-imbalanced data. These methods suggest both linear and kernel-based bipartite ranking algorithms based on first and second-order online learning. U… ▽ More

    Submitted 10 March, 2019; v1 submitted 4 July, 2016; originally announced July 2016.

    Comments: 15 pages, 6 tables, and 2 figures

  10. arXiv:1304.6761  [pdf, other

    cs.CR cs.NI cs.SI

    Towards a Networks-of-Networks Framework for Cyber Security

    Authors: Mahantesh Halappanavar, Sutanay Choudhury, Emilie Hogan, Peter Hui, John R. Johnson, Indrajit Ray, Lawrence Holder

    Abstract: Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in thi… ▽ More

    Submitted 24 April, 2013; originally announced April 2013.

    Comments: A shorter (3-page) version of this paper will appear in the Proceedings of the IEEE Intelligence and Security Informatics 2013, Seattle Washington, USA, June 4-7, 2013