Privacy Leakage in Wireless Charging
Wireless charging is becoming an essential power supply pattern for electronic devices. Currently, mainstream smartphones are almost compatible with wireless charging. However, when the charging efficiency is continuously improved, its security challenge ...
xFuzz: Machine Learning Guided Cross-Contract Fuzzing
Smart contract transactions are increasingly interleaved by cross-contract calls. While many tools have been developed to identify a common set of vulnerabilities, the cross-contract vulnerability is overlooked by existing tools. Cross-contract ...
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness
In recent works, robust networks have consistently exhibited more discriminative saliency map that proves to indicate sufficient adversarial robustness. In existed safe training paradigms e.g., adversarial training, however, the progressive saliency ...
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors
Machine learning and its promising branch deep learning have proven to be effective in a wide range of application domains. Recently, several efforts have shown success in applying deep learning techniques for automatic vulnerability discovery, as ...
Incremental Learning, Incremental Backdoor Threats
Class incremental learning from a pre-trained DNN model is gaining lots of popularity. Unfortunately, the pre-trained model also introduces a new attack vector, which enables an adversary to inject a backdoor into it and further compromise the downstream ...
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors
- Pedro Miguel Sánchez Sánchez,
- Alberto Huertas Celdrán,
- Timo Schenk,
- Adrian Lars Benjamin Iten,
- Gérôme Bovet,
- Gregorio Martínez Pérez,
- Burkhard Stiller
Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting spectrum sensing data falsification (SSDF) attacks. However, the amount of data needed to train models and the scenario privacy concerns ...
On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment
Voltage stability assessment is essential for maintaining reliable power grid operations. Stability assessment approaches using deep learning address the shortfalls of the traditional time-domain simulation-based approaches caused by increased system ...
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services
Artificial intelligence (AI)-based cybersecurity services offer significant promise in many scenarios, including malware detection, content supervision, and so on. Meanwhile, many commercial and government applications have raised the need for ...
Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure
Falsified data from compromised Phasor Measurement Units (PMUs) in a smart grid induce Energy Management Systems (EMS) to have an inaccurate estimation of the state of the grid, disrupting various operations of the power grid. Moreover, the PMUs deployed ...
DP<sup>2</sup>Dataset Protection by Data Poisoning
Data poisoning can be served as an effective way to protect the dataset from surrogate training, whereby the performance of the surrogate model could be greatly influenced if trained with poisoned dataset. This paper focuses on an advanced scenario where ...
Improving the Security of Audio CAPTCHAs With Adversarial Examples
CAPTCHAs (completely automated public Turing tests to tell computers and humans apart) have been the main protection against malicious attacks on public systems for many years. Audio CAPTCHAs, as one of the most important CAPTCHA forms, provide an ...
Gringotts: An Encrypted Version Control System With Less Trust on Servers
Version Control System (VCS) plays an essential role in software supply chain, as it manages code projects and enables efficient collaboration. For a private repository, where source code is a high-profile asset and needs to be protected, VCS’ ...
A Comprehensive Defense Framework Against Model Extraction Attacks
As a promising service, Machine Learning as a Service (MLaaS) provides personalized inference functions for clients through paid APIs. Nevertheless, it is vulnerable to model extraction attacks, in which an attacker can extract a functionally-equivalent ...
A Compositional Semantics of Boolean-Logic Driven Markov Processes
Boolean-logic driven Markov processes (BDMPs) is a prominent dynamic extension of static fault trees to model repairable and complex dynamic systems. While BDMPs are intensively used in an industrial context for dependability analysis of energy systems, ...
Secure Redactable Blockchain With Dynamic Support
Blockchain is extensively applied to many fields as an immutable distributed ledger. However, the immutability contradicts regulations such as the GDPR ruling “the right to be forgotten” of data. Besides, numerous emerging blockchain-based ...
UniQGAN: Towards Improved Modulation Classification <styled-content style="color:#000000">With Adversarial Robustness</styled-content> Using Scalable Generator Design
Automatic modulation classification (AMC) has been envisioned as a significant element for security issues at the physical layer due to its indispensable role in accurate communications. Recent attention to deep learning has impacted the AMC, which ...
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query
Dynamic searchable symmetric encryption (DSSE) allows efficient searches over encrypted databases and also supports clients in their updating of the data, such as those stored in a remote cloud server. However, recent attacks suggest the risk of leakage ...
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks
Cooperative jamming (CJ) is a promising technique for enhancing the physical-layer security in wireless powered sensor networks. The secrecy performance of CJ-aided wireless powered sensor networks is affected by three issues including disguised ...
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting
In the context of consortium blockchain, consensus protocols set permission mechanisms to maintain a relatively fixed group of participants. They can easily use distributed consistent algorithms for achieving deterministic and efficient consensus and ...
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing
Mobile crowdsensing (MCS) has rapidly emerged as a popular paradigm for sensory data collection and benefited various location-based services and applications like road monitoring, smart transportation, and environmental monitoring. In practice, there ...
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks
Multi-access Edge Computing (MEC) is an emerging computing model that provides the necessary on-demand resources and services to the edge of the network, ensuring powerful computing, storage capacity, mobility, location, and context awareness support to ...
Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event
The objective of this article is real-time detection of a change-point in the baseline distribution of the frequency signal generated by Phasor Measurement Units (PMUs) that could indicate potential for voltage collapse, false data injection, or other ...
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy
Authentication and blacklisting mechanisms have a key role for service providers to deliver the service to correct users through digital channels. Nevertheless, there always have been concerns about privacy of the users against such mechanisms. The <...
Privacy-Preserving Network Embedding Against Private Link Inference Attacks
Network embedding represents network nodes by a low-dimensional informative vector. While it is generally effective for various downstream tasks, it may leak some private information of networks, such as hidden private links. In this work, we address a ...
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation
The emergence of cloud computing enables various healthcare institutions to outsource pre-diagnostic models and provide timely and convenient services for patients. However, healthcare institutions and patients have serious concerns about potential ...
Certified Distributional Robustness on Smoothed Classifiers
The robustness of deep neural networks (DNNs) against adversarial example attacks has raised wide attention. For smoothed classifiers, we propose the worst-case adversarial loss over input distributions as a robustness certificate. Compared with previous ...
Privacy-Preserving and Byzantine-Robust Federated Learning
Federated learning (FL) trains a model over multiple datasets by collecting the local models rather than raw data, which can help facilitate distributed data analysis in many real-world applications. Since the model parameters can leak information about ...
Automatically Identifying CVE Affected Versions With Patches and Developer Logs
While vulnerability databases are important sources of information for software security, it is known that information in these databases is inconsistent. How to rectify these incorrect data is a challenging issue. In this article, we employ developer ...
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Machine Learning (ML) techniques can facilitate the automation of <underline>mal</underline>icious soft<underline>ware</underline> (malware for short) detection, but suffer from evasion attacks. Many studies counter such attacks in heuristic manners, ...
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract
Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme. However, the current attribute based encryption with outsourced ...