7,534 Hits in 4.3 sec

Mitigating Adversarial Attacks by Distributing Different Copies to Different Users [article]

Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang
2022 arXiv   pre-print
By distributing different copies of the model to different users, we can mitigate such attacks wherein adversarial samples found on one copy would not work on another copy.  ...  In this paper, we consider the scenario where a model is to be distributed to many users, among which a malicious user attempts to attack another user.  ...  Contributions: 1) We point out that it is possible to mitigate adversarial attacks in the owner-user distribution setting by distributing unique copies to each user. 2) We propose a parameter rewriting  ... 
arXiv:2111.15160v2 fatcat:cxz5mzgkojddbkzc5mbzm27v7y

RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies

Milan Stute, Florian Kohnhauser, Lars Baumgartner, Lars Almon, Matthias Hollick, Stefan Katzenbeisser, Bernd Freisleben
2020 IEEE Transactions on Dependable and Secure Computing  
To further protect against message flooding and Sybil attacks, we present a twofold mitigation technique.  ...  Unfortunately, such distributed and resource-constrained networks are particularly susceptible to a wide range of attacks such as terrorists trying to cause more harm.  ...  ACKNOWLEDGMENTS This work has been co-funded by the LOEWE initiative (Hesse, Germany) within the emergenCITY center and by the German Federal Ministry of Education and Research and the Hessen State Ministry  ... 
doi:10.1109/tdsc.2020.3036224 fatcat:ija7uyxr3fb7xj6d6vunkt7kyi

(More) Side Channels in Cloud Storage [chapter]

Tobias Pulls
2012 IFIP Advances in Information and Communication Technology  
Our conclusions are that cross-user deduplication should be disabled by default and that public cloud storage services need to be designed to provide unlinkability of users and data, even if the data is  ...  encrypted by users before storing it in the cloud.  ...  This work is funded by a Google research grant on "Usable Privacy and Transparency Tools".  ... 
doi:10.1007/978-3-642-31668-5_8 fatcat:56ar3p4ddbgdpa56vbva4bflga

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov
2007 IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference  
Simulation results show that ARRP can effectively mitigate the impacts of DoS attacks and host failures to ensure continuous availability of critical data, with better performance and reasonable overhead  ...  compared to only using static replicas.  ...  Therefore by increasing the number of roaming copies by just one, we can achieve exponential increase in the difficulty for the adversary.  ... 
doi:10.1109/glocom.2007.524 dblp:conf/globecom/HuangKA07 fatcat:zff2qlxm4zhbrbomviyf4vtqoe

Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction [article]

Ferhat Ozgur Catak, Evren Catak, Murat Kuzlu, Umit Cali, Devrim Unal
2021 arXiv   pre-print
The main idea behind adversarial attacks against machine learning models is to produce faulty results by manipulating trained deep learning models for 6G applications for mmWave beam prediction.  ...  This paper proposes a mitigation method for adversarial attacks against proposed 6G machine learning models for the millimeter-wave (mmWave) beam prediction using adversarial learning.  ...  The Figure 1 shows the details of the FGSM attack. Attackers can get involved in the system by using different way such as mobile malware applications, copying mobile base stations.  ... 
arXiv:2105.03905v3 fatcat:rtp75vsoure5lfozju53odz7oa

Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection

Panagiotis Kantartopoulos, Nikolaos Pitropakis, Alexios Mylonas, Nicolas Kylilis
2020 Technologies  
vulnerable to adversarial attacks.  ...  Moreover, we propose and evaluate the use of k-NN as a countermeasure to remedy the effects of the adversarial attacks that we have implemented.  ...  All authors have read and agreed to the published version of the manuscript. Funding: The research leading to these results has been partially supported by the H2020 project CARAMEL, (GA 833611).  ... 
doi:10.3390/technologies8040064 fatcat:sn3c4k3e2jemnfjdzxrf53aoy4

An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior [chapter]

Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel, Johannes Schickel
2018 IFIP Advances in Information and Communication Technology  
In this article, we study the effects of bucketing, a previously proposed mitigation technique against timing side channels.  ...  This work was funded by the DFG as part of project Secure Refinement of Cryptographic Algorithms (E3) in CRC 1119 CROSSING.  ...  Multiple techniques against timing side-channel attacks have been proposed like, e.g., predictive mitigation [22] , unification [15] , or cross-copying [1] .  ... 
doi:10.1007/978-3-319-99828-2_23 fatcat:fb5kvwf5x5bsjlu5p3alylguvq

Privacy leakage analysis in online social networks

Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng
2015 Computers & security  
We provide remedies for OSN users to mitigate the risk of involuntary information leakage in OSNs. Finally, we discuss the costs and implications of resolving the privacy exploits.  ...  Privacy control mechanisms have been deployed in popular OSNs for users to determine who can view their personal information.  ...  Alice can receive information distributed from the users in her incoming list, and distribute her information to the users in her outgoing list.  ... 
doi:10.1016/j.cose.2014.10.012 fatcat:yc2db64fmrfc3gdy6urxhjeeum

User authentication using wrist mounted inertial sensors

Md Abu Sayeed Mondol, Ifat Afrin Emi, Sarah Masud Preum, John A. Stankovic
2017 Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks - IPSN '17  
This opens an opportunity to use these devices for user authentication, exploiting an important biometric trait of a user: the wrist gestures during performing a signature in the air.  ...  This paper presents result from a preliminary study that shows the potential of the proposed approach to be used for robust user authentication.  ...  For example, we can achieve nearly 100% protection against the adversary attacks by setting the threshold value to 1.5.  ... 
doi:10.1145/3055031.3055063 dblp:conf/ipsn/MondolEPS17 fatcat:wjzkb2ivcvdjfiqggt3bmechxa


Lei Jin, Balaji Palanisamy, James B.D. Joshi
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Such vulnerability can lead to a new class of attacks called location injection attacks which can successfully break users' anonymity among a set of users through the injection of fake user accounts and  ...  Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' location privacy while traveling on road networks.  ...  is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page.  ... 
doi:10.1145/2660267.2662386 dblp:conf/ccs/JinPJ14 fatcat:divgszsaxrdnbgc2le6uml64n4

A Defense Framework for Privacy Risks in Remote Machine Learning Service

Yang Bai, Yu Li, Mingchuang Xie, Mingyu Fan, Jiang Ming
2021 Security and Communication Networks  
The adversarial method as one of typical mitigation has been studied by several recent works.  ...  In this scene, users upload their local data and utilize the computation capability to train models, or users directly access models trained by MLaaS.  ...  We propose a pioneering study to categorize adversarial method-based defenses by different perturbation objects; and we analyze the limitation of this existing mitigation. ese works help us to build general  ... 
doi:10.1155/2021/9924684 fatcat:fqanrrvdcrf3feqomhdwkezxwy

Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks

Jean Louis Raisaro, Florian Tramèr, Zhanglong Ji, Diyue Bu, Yongan Zhao, Knox Carey, David Lloyd, Heidi Sofia, Dixie Baker, Paul Flicek, Suyash Shringarpure, Carlos Bustamante (+6 others)
2017 JAMIA Journal of the American Medical Informatics Association  
The first two strategies manipulate the beacon such that the presence of rare alleles is obscured; the third strategy budgets the number of accesses per user for each individual genome.  ...  However, recent work demonstrated that, given a beacon with specific characteristics (including relatively small sample size and an adversary who possesses an individual's whole genome sequence), the individual's  ...  ACKNOWLEDGMENTS The authors would like to thank the GA4GH for its continuous support and Konrad Karczewski and Marc Duby from the Broad Institute for their valuable feedback and for having provided the  ... 
doi:10.1093/jamia/ocw167 pmid:28339683 pmcid:PMC5881894 fatcat:ihszb3gmrfglvp63is37ing2ee

Mitigating Presentation Attack using DCGAN and Deep CNN [article]

Nyle Siddiqui, Rushit Dave
2022 arXiv   pre-print
Our work focusses on generating photorealistic synthetic images from the real image sets by implementing Deep Convolution Generative Adversarial Net (DCGAN).  ...  Our work detects the presentation attacks on facial and iris images using our deep CNN, inspired by VGGNet [1].  ...  This work is supported in part by the National Science Foundation under Grant HRD-1719488 and National Security Agency under Grant H98230-18-1-0097.  ... 
arXiv:2207.00161v1 fatcat:mbrb7xqj2jcgravl3ukzr7keea

Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems [article]

Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim
2022 arXiv   pre-print
By including the unknown detected samples into the dataset of the detector, we augment the BFF-IDS with an additional model to detect original known attacks and the new adversarial inputs.  ...  However, ML models created this way are still vulnerable to evasion, poisoning, and exploratory attacks using adversarial examples.  ...  BFF-IDS Augmentation for Adversarial examples mitigation The previous section observed that the adversarial sample distribution differs statistically from the benign sample distribution.  ... 
arXiv:2207.04843v1 fatcat:5k5uxsd6ezdcpa3zhtgsvz5a4a

Differentially private client-side data deduplication protocol for cloud storage services

Youngjoo Shin, Kwangjo Kim
2014 Security and Communication Networks  
However, deduplication can be used as a side channel by attackers who try to obtain sensitive information of other users' data. We propose a differentially private client-side deduplication protocol.  ...  Cloud storage service providers apply data client-side deduplication across multiple users to achieve cost savings of network bandwidth and disk storage.  ...  In order to mitigate such an attack, we proposed a storage GW-based secure client-side deduplication protocol.  ... 
doi:10.1002/sec.1159 fatcat:gz26ubwzo5cbteqs54ezq3265y
« Previous Showing results 1 — 15 out of 7,534 results