Skip to main content

Showing 1–5 of 5 results for author: Sommer, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.05334  [pdf, other

    eess.IV cs.CV

    ProsDectNet: Bridging the Gap in Prostate Cancer Detection via Transrectal B-mode Ultrasound Imaging

    Authors: Sulaiman Vesal, Indrani Bhattacharya, Hassan Jahanandish, Xinran Li, Zachary Kornberg, Steve Ran Zhou, Elijah Richard Sommer, Moon Hyung Choi, Richard E. Fan, Geoffrey A. Sonn, Mirabela Rusu

    Abstract: Interpreting traditional B-mode ultrasound images can be challenging due to image artifacts (e.g., shadowing, speckle), leading to low sensitivity and limited diagnostic accuracy. While Magnetic Resonance Imaging (MRI) has been proposed as a solution, it is expensive and not widely available. Furthermore, most biopsies are guided by Transrectal Ultrasound (TRUS) alone and can miss up to 52% cancer… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

    Comments: Accepted in NeurIPS 2023 (Medical Imaging meets NeurIPS Workshop)

  2. arXiv:2106.12454  [pdf, other

    cs.NI

    Advancing Protocol Diversity in Network Security Monitoring

    Authors: Jan Grashöfer, Peter Oettig, Robin Sommer, Tim Wojtulewicz, Hannes Hartenstein

    Abstract: With information technology entering new fields and levels of deployment, e.g., in areas of energy, mobility, and production, network security monitoring needs to be able to cope with those environments and their evolution. However, state-of-the-art Network Security Monitors (NSMs) typically lack the necessary flexibility to handle the diversity of the packet-oriented layers below the abstraction… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

  3. zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection

    Authors: Steffen Haas, Robin Sommer, Mathias Fischer

    Abstract: Intrusion Detection Systems (IDSs) can analyze network traffic for signs of attacks and intrusions. However, encrypted communication limits their visibility and sophisticated attackers additionally try to evade their detection. To overcome these limitations, we extend the scope of Network IDSs (NIDSs) with additional data from the hosts. For that, we propose the integrated open-source zeek-osquery… ▽ More

    Submitted 11 March, 2020; v1 submitted 11 February, 2020; originally announced February 2020.

    Comments: Accepted for publication at ICT Systems Security and Privacy Protection (IFIP) SEC 2020

  4. arXiv:1811.06584  [pdf, other

    cs.CR

    Cybercasing 2.0: You Get What You Pay For

    Authors: Jaeyoung Choi, Istemi Ekin Akkus, Serge Egelman, Gerald Friedland, Robin Sommer, Michael Carl Tschantz, Nicholas Weaver

    Abstract: Under U.S. law, marketing databases exist under almost no legal restrictions concerning accuracy, access, or confidentiality. We explore the possible (mis)use of these databases in a criminal context by conducting two experiments. First, we show how this data can be used for "cybercasing" by using this data to resolve the physical addresses of individuals who are likely to be on vacation. Second,… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

  5. arXiv:1506.02289  [pdf, ps, other

    cs.SI

    On the Reliability of Profile Matching Across Large Online Social Networks

    Authors: Oana Goga, Patrick Loiseau, Robin Sommer, Renata Teixeira, Krishna P. Gummadi

    Abstract: Matching the profiles of a user across multiple online social networks brings opportunities for new services and applications as well as new insights on user online behavior, yet it raises serious privacy concerns. Prior literature has proposed methods to match profiles and showed that it is possible to do it accurately, but using evaluations that focused on sampled datasets only. In this paper, w… ▽ More

    Submitted 7 June, 2015; originally announced June 2015.

    Comments: 12 pages. To appear in KDD 2015. Extended version