Skip to main content

Showing 1–12 of 12 results for author: Thuraisingham, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.08824  [pdf, ps, other

    cs.CR cs.LG

    An Automated Vulnerability Detection Framework for Smart Contracts

    Authors: Feng Mi, Chen Zhao, Zhuoyi Wang, Sadaf MD Halim, Xiaodi Li, Zhouxiang Wu, Latifur Khan, Bhavani Thuraisingham

    Abstract: With the increase of the adoption of blockchain technology in providing decentralized solutions to various problems, smart contracts have become more popular to the point that billions of US Dollars are currently exchanged every day through such technology. Meanwhile, various vulnerabilities in smart contracts have been exploited by attackers to steal cryptocurrencies worth millions of dollars. Th… ▽ More

    Submitted 20 January, 2023; originally announced January 2023.

  2. arXiv:2110.10287  [pdf, other

    cs.LG cs.AI cs.CR math.OC stat.ML

    Multi-concept adversarial attacks

    Authors: Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham

    Abstract: As machine learning (ML) techniques are being increasingly used in many applications, their vulnerability to adversarial attacks becomes well-known. Test time attacks, usually launched by adding adversarial noise to test instances, have been shown effective against the deployed ML models. In practice, one test input may be leveraged by different ML models. Test time attacks targeting a single ML m… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

    Comments: 20 pages, 28 figures, 9 tables

  3. arXiv:2108.09435  [pdf, other

    cs.LG

    Fairness-Aware Online Meta-learning

    Authors: Chen Zhao, Feng Chen, Bhavani Thuraisingham

    Abstract: In contrast to offline working fashions, two research paradigms are devised for online learning: (1) Online Meta Learning (OML) learns good priors over model parameters (or learning to learn) in a sequential setting where tasks are revealed one after another. Although it provides a sub-linear regret bound, such techniques completely ignore the importance of learning with fairness which is a signif… ▽ More

    Submitted 21 August, 2021; originally announced August 2021.

    Comments: KDD '21: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining

  4. arXiv:2107.13639  [pdf, other

    cs.LG cs.CR

    Imbalanced Adversarial Training with Reweighting

    Authors: Wentao Wang, Han Xu, Xiaorui Liu, Yaxin Li, Bhavani Thuraisingham, Jiliang Tang

    Abstract: Adversarial training has been empirically proven to be one of the most effective and reliable defense methods against adversarial attacks. However, almost all existing studies about adversarial training are focused on balanced datasets, where each class has an equal amount of training examples. Research on adversarial training with imbalanced training datasets is rather limited. As the initial eff… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

  5. arXiv:2104.01495  [pdf, other

    cs.LG cs.CV cs.IR

    Towards Self-Adaptive Metric Learning On the Fly

    Authors: Yang Gao, Yi-Fan Li, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham

    Abstract: Good quality similarity metrics can significantly facilitate the performance of many large-scale, real-world applications. Existing studies have proposed various solutions to learn a Mahalanobis or bilinear metric in an online fashion by either restricting distances between similar (dissimilar) pairs to be smaller (larger) than a given lower (upper) bound or requiring similar instances to be separ… ▽ More

    Submitted 3 April, 2021; originally announced April 2021.

    Comments: Accepted by WWW 2019 (Long Paper, Oral)

  6. arXiv:2012.11810  [pdf, other

    cs.CV cs.AI

    Progressive One-shot Human Parsing

    Authors: Haoyu He, **g Zhang, Bhavani Thuraisingham, Dacheng Tao

    Abstract: Prior human parsing models are limited to parsing humans into classes pre-defined in the training data, which is not flexible to generalize to unseen classes, e.g., new clothing in fashion analysis. In this paper, we propose a new problem named one-shot human parsing (OSHP) that requires to parse human into an open set of reference classes defined by any single reference example. During training,… ▽ More

    Submitted 7 May, 2021; v1 submitted 21 December, 2020; originally announced December 2020.

    Comments: Accepted in AAAI 2021. 9 pages, 4 figures

  7. arXiv:2012.07006  [pdf, other

    cs.CR cs.LG

    DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation

    Authors: Han Qiu, Yi Zeng, Shangwei Guo, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham

    Abstract: Public resources and services (e.g., datasets, training platforms, pre-trained models) have been widely adopted to ease the development of Deep Learning-based applications. However, if the third-party providers are untrusted, they can inject poisoned samples into the datasets or embed backdoors in those models. Such an integrity breach can cause severe consequences, especially in safety- and secur… ▽ More

    Submitted 11 April, 2021; v1 submitted 13 December, 2020; originally announced December 2020.

  8. arXiv:2009.01267  [pdf

    cs.CY cs.SI

    COVID-19: The Information Warfare Paradigm Shift

    Authors: Jan Kallberg, Rosemary A. Burk, Bhavani Thuraisingham

    Abstract: In Kuhn's The Structure of Scientific Revolutions, the critical term is paradigm-shift when it suddenly becomes evident that earlier assumptions no longer are correct and the plurality of the scientific community that studies this domain accepts the change. These types of events can be scientific findings or as in social science system shock that creates a punctured equilibrium that sets the stage… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

  9. arXiv:1908.06971  [pdf, other

    cs.LG q-fin.ST stat.ML

    ChainNet: Learning on Blockchain Graphs with Topological Features

    Authors: Nazmiye Ceren Abay, Cuneyt Gurcan Akcora, Yulia R. Gel, Umar D. Islambekov, Murat Kantarcioglu, Yahui Tian, Bhavani Thuraisingham

    Abstract: With emergence of blockchain technologies and the associated cryptocurrencies, such as Bitcoin, understanding network dynamics behind Blockchain graphs has become a rapidly evolving research direction. Unlike other financial networks, such as stock and currency trading, blockchain based cryptocurrencies have the entire transaction graph accessible to the public (i.e., all transactions can be downl… ▽ More

    Submitted 18 August, 2019; originally announced August 2019.

    Comments: To Appear in the 2019 IEEE International Conference on Data Mining (ICDM)

  10. arXiv:1703.08859  [pdf, ps, other

    cs.CY cs.CR

    The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research

    Authors: Alan Sherman, M. Dark, A. Chan, R. Chong, T. Morris, L. Oliva, J. Springer, B. Thuraisingham, C. Vatcher, R. Verma, S. Wetzel

    Abstract: Since fall 2012, several National Centers of Academic Excellence in Cyber Defense Research (CAE-Rs) fielded a collaborative course to engage students in solving applied cybersecurity research problems. We describe our experiences with this Information Security Research and Education (INSuRE) research collaborative. We explain how we conducted our project-based research course, give examples of stu… ▽ More

    Submitted 26 March, 2017; originally announced March 2017.

    Comments: A shorter version of this paper has been submitted to IEEE Security and Privacy

  11. arXiv:1105.1982  [pdf, ps, other

    cs.DC

    Secure Data Processing in a Hybrid Cloud

    Authors: Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham, Sharad Mehrotra

    Abstract: Cloud computing has made it possible for a user to be able to select a computing service precisely when needed. However, certain factors such as security of data and regulatory issues will impact a user's choice of using such a service. A solution to these problems is the use of a hybrid cloud that combines a user's local computing capabilities (for mission- or organization-critical tasks) with a… ▽ More

    Submitted 10 May, 2011; originally announced May 2011.

    Comments: 16 pages (13 pages + 3 page appendix), 5 figures

    ACM Class: D.4.6; H.3.3; H.3.4

  12. arXiv:0710.3979  [pdf

    cs.CR cs.NI

    Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs

    Authors: William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham

    Abstract: Network data needs to be shared for distributed security analysis. Anonymization of network data for sharing sets up a fundamental tradeoff between privacy protection versus security analysis capability. This privacy/analysis tradeoff has been acknowledged by many researchers but this is the first paper to provide empirical measurements to characterize the privacy/analysis tradeoff for an enterp… ▽ More

    Submitted 26 October, 2007; v1 submitted 22 October, 2007; originally announced October 2007.

    Comments: 8 pages,1 figure, 4 tables

    ACM Class: C.2.0; C.2.3; C.2.m; D.3.4; K.6.5