Securing blockchain-based timed data release against adversarial attacks1
Timed data release refers to protecting sensitive data that can be accessed only after a pre-determined amount of time has passed. While blockchain-based solutions for timed data release provide a promising approach for decentralizing the process, ...
The intrinsic dimensionality of network datasets and its applications1
Modern network infrastructures are in a constant state of transformation, in large part due to the exponential growth of Internet of Things (IoT) devices. The unique properties of IoT-connected networks, such as heterogeneity and non-standardized protocol,...
Con2Mix: A semi-supervised method for imbalanced tabular security data1
- Xiaodi Li,
- Latifur Khan,
- Mahmoud Zamani,
- Shamila Wickramasuriya,
- Kevin Hamlen,
- Bhavani Thuraisingham,
- Shamik Sural,
- Haibing Lu
Con2Mix (Contrastive Double Mixup) is a new semi-supervised learning methodology that innovates a triplet mixup data augmentation approach for finding code vulnerabilities in imbalanced, tabular security data sets. Tabular data sets in cybersecurity ...
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption1
Attribute based encryption (ABE) is a cryptographic technique allowing fine-grained access control by enabling one-to-many encryption. Existing ABE constructions suffer from at least one of the following limitations. First, single point of failure on ...