Skip to main content

Showing 1–13 of 13 results for author: Sikder, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.15724  [pdf, other

    cs.CL

    RE-GAINS & EnChAnT: Intelligent Tool Manipulation Systems For Enhanced Query Responses

    Authors: Sahil Girhepuje, Siva Sankar Sajeev, Purvam Jain, Arya Sikder, Adithya Rama Varma, Ryan George, Akshay Govind Srinivasan, Mahendra Kurup, Ashmit Sinha, Sudip Mondal

    Abstract: Large Language Models (LLMs) currently struggle with tool invocation and chaining, as they often hallucinate or miss essential steps in a sequence. We propose RE-GAINS and EnChAnT, two novel frameworks that empower LLMs to tackle complex user queries by making API calls to external tools based on tool descriptions and argument lists. Tools are chained based on the expected output, without receivin… ▽ More

    Submitted 20 June, 2024; v1 submitted 28 January, 2024; originally announced January 2024.

  2. arXiv:2309.00848   

    cs.CV cs.LG

    Bengali Document Layout Analysis -- A YOLOV8 Based Ensembling Approach

    Authors: Nazmus Sakib Ahmed, Saad Sakib Noor, Ashraful Islam Shanto Sikder, Abhijit Paul

    Abstract: This paper focuses on enhancing Bengali Document Layout Analysis (DLA) using the YOLOv8 model and innovative post-processing techniques. We tackle challenges unique to the complex Bengali script by employing data augmentation for model robustness. After meticulous validation set evaluation, we fine-tune our approach on the complete dataset, leading to a two-stage prediction strategy for accurate e… ▽ More

    Submitted 29 April, 2024; v1 submitted 2 September, 2023; originally announced September 2023.

    Comments: Need to review and rework this

  3. arXiv:2010.03671  [pdf, other

    cs.LG cs.CR

    Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

    Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The increasing availability of healthcare data requires accurate analysis of disease diagnosis, progression, and realtime monitoring to provide improved treatments to the patients. In this context, Machine Learning (ML) models are used to extract valuable features and insights from high-dimensional and heterogeneous healthcare data to detect different diseases and patient activities in a Smart Hea… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 6 pages, 5 figures, Accepted in IEEE Globecom 2020

  4. arXiv:2005.07359  [pdf, other

    cs.CR

    A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses

    Authors: AKM Iqridar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of the patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices (IMDs), body area networks (BANs), and Internet of… ▽ More

    Submitted 15 May, 2020; originally announced May 2020.

    Comments: Security of modern healthcare systems. submitted and under review. 40 pages, 3 figures, 4 tables

  5. arXiv:1911.10186  [pdf, other

    cs.CR

    KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

    Authors: Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

    Abstract: In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a mult… ▽ More

    Submitted 2 June, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020)

  6. arXiv:1910.11138  [pdf, other

    cs.CR

    A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices

    Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Sensors (e.g., light, gyroscope, accelerometer) and sensing-enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor Application Programming Interface (API). In this way,… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

    Comments: Accepted in IEEE Transaction on Mobile Computing. arXiv admin note: substantial text overlap with arXiv:1706.10220

  7. arXiv:1910.03750  [pdf, other

    cs.CR

    Aegis: A Context-aware Security Framework for Smart Home Systems

    Authors: Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Our everyday lives are expanding fast with the introduction of new Smart Home Systems (SHSs). Today, a myriad of SHS devices and applications are widely available to users and have already started to re-define our modern lives. Smart home users utilize the apps to control and automate such devices. Users can develop their own apps or easily download and install them from vendor-specific app market… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

    Comments: Accepted in 2019 Annual Computer Security Applications Conference (ACSAC)

  8. arXiv:1909.10565  [pdf, other

    cs.CR

    HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems

    Authors: AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac

    Abstract: The integration of Internet-of-Things and pervasive computing in medical devices have made the modern healthcare system "smart". Today, the function of the healthcare system is not limited to treat the patients only. With the help of implantable medical devices and wearables, Smart Healthcare System (SHS) can continuously monitor different vital signs of a patient and automatically detect and prev… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: Accepted to be appeared in The International Symposium on Health and Medical informatics, Management and Security (HMiMS 2019)

  9. arXiv:1809.00745  [pdf, other

    cs.CR

    IoTDots: A Digital Forensics Framework for Smart Environments

    Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac

    Abstract: IoT devices and sensors have been utilized in a cooperative manner to enable the concept of a smart environment. In these smart settings, abundant data is generated as a result of the interactions between devices and users' day-to-day activities. Such data contain valuable forensic information about events and actions occurring inside the smart environment and, if analyzed, may help hold those vio… ▽ More

    Submitted 3 September, 2018; originally announced September 2018.

  10. Peek-a-Boo: I see your smart home activities, even encrypted!

    Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac

    Abstract: A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploi… ▽ More

    Submitted 13 May, 2020; v1 submitted 8 August, 2018; originally announced August 2018.

    Comments: Update (May 13, 2020): This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8-10, 2020, Linz (Virtual Event), Austria, https://doi.org/10.1145/3395351.3399421

  11. arXiv:1802.08307  [pdf, other

    cs.CR cs.PL

    Sensitive Information Tracking in Commodity IoT

    Authors: Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for… ▽ More

    Submitted 22 February, 2018; originally announced February 2018.

    Comments: first submission

  12. arXiv:1802.02041  [pdf, other

    cs.CR

    A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    Authors: Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac

    Abstract: The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, s… ▽ More

    Submitted 6 February, 2018; originally announced February 2018.

    Comments: Sensor-based Threats, Internet-of-Things, Smart Devices, Side Channel Attack

  13. arXiv:1706.10220  [pdf, other

    cs.CR

    6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

    Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac

    Abstract: Sensors (e.g., light, gyroscope, accelerotmeter) and sensing enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor API. In this way, attackers can exploit these sensor… ▽ More

    Submitted 30 June, 2017; originally announced June 2017.

    Comments: 18 pages, Cyber-security, smart devices, sensors, sensor-based threats, 26th USENIX Security Symposium