Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems
- Giuseppe Aceto,
- Fabio Giampaolo,
- Ciro Guida,
- Stefano Izzo,
- Antonio Pescapè,
- Francesco Piccialli,
- Edoardo Prezioso
Journal of Network and Computer Applications (JNCA), Volume 229, Issue Chttps://doi.org/10.1016/j.jnca.2024.103926AbstractNetwork Intrusion Detection Systems (NIDS) are crucial tools for protecting networked devices from cyberattacks. Recent development in the field of Artificial Intelligence (AI) has provided tremendous advantages in implementing NIDSs able to ...
Graphical abstractDisplay Omitted
Highlights- Sharing artificial intelligence models or training data poses privacy challenges.
- We synthesize training datasets for Network Intrusion Detection Systems.
- Our evaluation uses three open cybersecurity datasets and other two ...
- research-articleMay 2024
Analysis and Implementation of Nanotargeting on LinkedIn Based on Publicly Available Non-PII
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 1019, Pages 1–22https://doi.org/10.1145/3613904.3642107The literature has shown that combining a few non-Personal Identifiable Information (non-PII) is enough to make a user unique in a dataset including millions of users. This work demonstrates that a combination of a few non-PII items can be activated to ...
- research-articleMay 2024
Privacy in Immersive Extended Reality: Exploring User Perceptions, Concerns, and Coping Strategies
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 784, Pages 1–24https://doi.org/10.1145/3613904.3642104Extended Reality (XR) technology is changing online interactions, but its granular data collection sensors may be more invasive to user privacy than web, mobile, and the Internet of Things technologies. Despite an increased interest in studying ...
- research-articleNovember 2023
Privacy-preserving graph convolution network for federated item recommendation
AbstractIn traditional recommender systems, we often build models based on a centralized storage of user data, which however will lead to user privacy concerns and risks. In this paper, we study an emerging and important recommendation problem called ...
- research-articleSeptember 2023
An effective method for the protection of user health topic privacy for health information services
AbstractWith the rapid development of emerging network technologies such as cloud computing, the background server-side of public health information services is widely deployed on the untrusted cloud, which has become one of the main threats of user ...
-
- research-articleJune 2023
Few-shot website fingerprinting attack with cluster adaptation
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 229, Issue Chttps://doi.org/10.1016/j.comnet.2023.109780AbstractWebsite fingerprinting attacks can destroy users’ privacy on the Internet, even when the communication is through an anonymous system, such as Tor. Deep learning-based website fingerprinting attacks have made great progress in ...
- research-articleDecember 2022
Towards addressing unauthorized sharing of subscriptions
Applied Intelligence (KLU-APIN), Volume 52, Issue 15Pages 17090–17102https://doi.org/10.1007/s10489-021-02812-6AbstractSubscription-based business is booming in recent years, especially in the entertainment sector such as video and music streaming. Usually one subscription account can be shared among family members for the convenience of subscribers. However, ...
- research-articleOctober 2022
Federated one-class collaborative filtering via privacy-aware non-sampling matrix factorization
AbstractIn this paper, we study an emerging and important recommendation problem called federated one-class collaborative filtering (FOCCF). Specifically, we aim to build a recommendation model by exploiting each user’s one-class or implicit ...
- research-articleOctober 2022
Few-shot Website Fingerprinting attack with Meta-Bias Learning
Highlights- We investigate the under-studied, more realistic, and more challenging few-shot website fingerprinting attackproblem. Crucially, we focus on the model ...
Website fingerprinting (WF) attack aims to identify which website a user is visiting from the traffic data patterns. Whilst existing methods assume many training samples, we investigate a more realistic and scalable few-shot WF attack ...
- research-articleOctober 2021
Few-shot website fingerprinting attack
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 198, Issue Chttps://doi.org/10.1016/j.comnet.2021.108298AbstractWebsite fingerprinting (WF) attack stands opposite against privacy protection in using the Internet, even when the content details are encrypted, such as Tor networks. Whilst existing difficulty in the preparation of many training ...
Highlights- We study a realistic and difficult few-shot website fingerprinting attack problem.
- ArticleOctober 2021
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand
AbstractCharging an EV (Electric Vehicle) comprises two phases: a) resource negotiation, and b) actual charging. While the former phase runs over secure communication protocols, the latter is usually assumed not to be a threat to security and privacy. ...
- research-articleAugust 2021
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System
Information Systems Frontiers (KLU-ISFI), Volume 23, Issue 4Pages 835–848https://doi.org/10.1007/s10796-021-10115-xAbstractThe usage of different technologies and smart devices helps people to get medical services remotely for multiple benefits. Thus, critical and sensitive data is exchanged between a user and a doctor. When health data is transmitted over a common ...
- research-articleDecember 2020
Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing
Digital Threats: Research and Practice (DTRAP), Volume 1, Issue 4Article No.: 24, Pages 1–24https://doi.org/10.1145/3419473Cookies were originally introduced as a way to provide state awareness to websites, and they are now one of the backbones of the current web. However, their use is not limited to store the login information or to save the current state of user browsing. ...
- ArticleOctober 2020
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069: Abridged Conference Version
AbstractTR-069 is a standard for the remote management of end-user devices by service providers. Despite being implemented in nearly a billion devices, almost no research has been published on the security and privacy aspects of TR-069. The first ...
- ArticleSeptember 2020
User Privacy Concerns and Preferences in Smart Buildings
Socio-Technical Aspects in Security and TrustPages 85–106https://doi.org/10.1007/978-3-030-79318-0_5AbstractSmart buildings are socio-technical systems that bring together building systems, IoT technology and occupants. A multitude of embedded sensors continually collect and share building data on a large scale which is used to understand and streamline ...
- ArticleJuly 2020
Secure Agents for Supporting Best-Balanced Multilingual Communication
Cross-Cultural Design. Applications in Health, Learning, Communication, and CreativityPages 376–388https://doi.org/10.1007/978-3-030-49913-6_32AbstractThere are technologies that support intercultural collaboration by allowing people to communicate more easily across the barriers of culture and language. However, sometimes user-sensitive information needs to be accessed. In best-balanced ...
- ArticleJune 2020
Capturing Privacy-Preserving User Contexts with IndoorHash
Distributed Applications and Interoperable SystemsPages 21–38https://doi.org/10.1007/978-3-030-50323-9_2AbstractIoT devices are ubiquitous and widely adopted by end-users to gather personal and environmental data that often need to be put into context in order to gain insights. In particular, location is often a critical context information that is required ...
- research-articleApril 2020
Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls
WWW '20: Proceedings of The Web Conference 2020Pages 1433–1444https://doi.org/10.1145/3366423.3380217Funding the production of quality online content is a pressing problem for content producers. The most common funding method, online advertising, is rife with well-known performance and privacy harms, and an intractable subject-agent conflict: many ...
- ArticleFebruary 2020
An Airdrop that Preserves Recipient Privacy
AbstractA common approach to bootstrapping a new cryptocurrency is an airdrop, an arrangement in which existing users give away currency to entice new users to join. But current airdrops offer no recipient privacy: they leak which recipients have claimed ...
- research-articleMay 2020
Research on Innovation Model of Sharing Economy based on Blockchain Technology
ICITEE '19: Proceedings of the 2nd International Conference on Information Technologies and Electrical EngineeringArticle No.: 3, Pages 1–6https://doi.org/10.1145/3386415.3386950Sharing economy has innovated the economic development model and created new employment opportunities, which has attracted widespread attention. But it has also been accompanied by problems in identity authentication, credit system and supervision and ...