Zobrazeno 1 - 10
of 426
pro vyhledávání: '"Surya, Nepal"'
Autor:
Ma, Hua, Li, Yinshan, Gao, Yansong, Zhang, Zhi, Abuadbba, Alsharif, Fu, Anmin, Al-Sarawi, Said F., Surya, Nepal, Abbott, Derek
Object detection is the foundation of various critical computer-vision tasks such as segmentation, object tracking, and event detection. To train an object detector with satisfactory accuracy, a large amount of data is required. However, due to the i
Externí odkaz:
http://arxiv.org/abs/2209.02339
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Autor:
Ma, Hua, Li, Yinshan, Gao, Yansong, Abuadbba, Alsharif, Zhang, Zhi, Fu, Anmin, Kim, Hyoungshick, Al-Sarawi, Said F., Surya, Nepal, Abbott, Derek
Deep learning models have been shown to be vulnerable to recent backdoor attacks. A backdoored model behaves normally for inputs containing no attacker-secretly-chosen trigger and maliciously for inputs with the trigger. To date, backdoor attacks and
Externí odkaz:
http://arxiv.org/abs/2201.08619
Autor:
Zhang, Zhi, Cheng, Yueqiang, Wang, Minghua, He, Wei, Wang, Wenhao, Surya, Nepal, Gao, Yansong, Li, Kang, Wang, Zhe, Wu, Chenggang
Rowhammer attacks that corrupt level-1 page tables to gain kernel privilege are the most detrimental to system security and hard to mitigate. However, recently proposed software-only mitigations are not effective against such kernel privilege escalat
Externí odkaz:
http://arxiv.org/abs/2102.10269
Autor:
Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng
Publikováno v:
Sensors, Vol 23, Iss 9, p 4346 (2023)
The use of artificial intelligence (AI) to detect phishing emails is primarily dependent on large-scale centralized datasets, which has opened it up to a myriad of privacy, trust, and legal issues. Moreover, organizations have been loath to share ema
Externí odkaz:
https://doaj.org/article/88e5af244f0c4f2787df4021478b5f5b
Publikováno v:
IEEE Access, Vol 9, Pp 47243-47251 (2021)
The availability of an enormous amount of unlabeled datasets drives the anomaly detection research towards unsupervised machine learning algorithms. Deep clustering algorithms for anomaly detection gain significant research attention in this era. We
Externí odkaz:
https://doaj.org/article/a3988257e74049f49b032f67599aa12b
Publikováno v:
Frontiers in Big Data, Vol 5 (2022)
Externí odkaz:
https://doaj.org/article/e8563e6adeb14ce68aab9a0019617f56
Publikováno v:
IEEE Access, Vol 7, Pp 147156-147168 (2019)
Android malware poses serious security and privacy threats to the mobile users. Traditional malware detection and family classification technologies are becoming less effective due to the rapid evolution of the malware landscape, with the emerging of
Externí odkaz:
https://doaj.org/article/b3b1082a18284bbc87d1555a8f19b9ec
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 35:4236-4252
The security of our data stores is underestimated in current practice, which resulted in many large-scale data breaches. To change the status quo, this paper presents the design of ShieldDB, an encrypted document database. ShieldDB adapts the searcha
Publikováno v:
IEEE Transactions on Big Data. 9:701-715
Publikováno v:
Frontiers in Big Data, Vol 4 (2021)
The effectiveness of cyber security measures are often questioned in the wake of hard hitting security events. Despite much work being done in the field of cyber security, most of the focus seems to be concentrated on system usage. In this paper, we
Externí odkaz:
https://doaj.org/article/a8fecdb3beff44339539bcde71dc0f48