Search Results for author: Elisa Bertino

Found 16 papers, 3 papers with code

Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs

no code implementations20 Dec 2023 Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu

In this paper, we propose Graphene, an advanced system designed to provide a detailed analysis of the security posture of computing infrastructures.

FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge

1 code implementation15 Dec 2023 Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino

Despite the initial success of current audio backdoor attacks, they suffer from the following limitations: (i) Most of them require sufficient knowledge, which limits their widespread adoption.

Backdoor Attack Data Poisoning +2

Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements

no code implementations7 Nov 2023 Sorin Adam Matei, Elisa Bertino

The present study explored managerial and instructor perceptions of their freshly employed cybersecurity workers' or students' preparedness to work effectively in a changing cybersecurity environment that includes AI tools.

Ethics

TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support

1 code implementation23 Jun 2023 Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz

Among them, the spatial aggregation layer adopts a defense mechanism to robustly aggregate local trust, and the temporal aggregation layer applies an attention mechanism for effective learning of temporal patterns.

Decision Making

Maximal Domain Independent Representations Improve Transfer Learning

no code implementations1 Jun 2023 Adrian Shuai Li, Elisa Bertino, Xuan-Hong Dang, Ankush Singla, Yuhai Tu, Mark N Wegman

We show that information useful only in the source can be present in the DIRep, weakening the quality of the domain adaptation.

Domain Adaptation Transfer Learning

Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation

no code implementations31 May 2023 Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, Ting-Yan Wu

Our approach works for scenarios where the source dataset and the dataset available for the target learning task have same or different feature spaces.

Data Augmentation Defect Detection +1

Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models

no code implementations23 Jan 2022 Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino

Increasing use of machine learning (ML) technologies in privacy-sensitive domains such as medical diagnoses, lifestyle predictions, and business decisions highlights the need to better understand if these ML technologies are introducing leakage of sensitive and proprietary training data.

Attribute Inference Attack

Simeon -- Secure Federated Machine Learning Through Iterative Filtering

no code implementations13 Mar 2021 Nicholas Malecki, Hye-Young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino

Federated learning enables a global machine learning model to be trained collaboratively by distributed, mutually non-trusting learning agents who desire to maintain the privacy of their training data and their hardware.

BIG-bench Machine Learning Federated Learning

PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols

no code implementations17 Dec 2020 Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang

Many proximity-based tracing (PCT) protocols have been proposed and deployed to combat the spreading of COVID-19.

Computers and Society C.3; H.4; J.3; J.7; K.4; K.6.5

Artificial Intelligence at the Edge

no code implementations10 Dec 2020 Elisa Bertino, Sujata Banerjee

The Internet of Things (IoT) and edge computing applications aim to support a variety of societal needs, including the global pandemic situation that the entire world is currently experiencing and responses to natural disasters.

Autonomous Vehicles Edge-computing +1

Artificial Intelligence & Cooperation

no code implementations10 Dec 2020 Elisa Bertino, Finale Doshi-Velez, Maria Gini, Daniel Lopresti, David Parkes

There is a vital need for research in "AI and Cooperation" that seeks to understand the ways in which systems of AIs and systems of AIs with people can engender cooperative behavior.

Decision Making

Black-box Model Inversion Attribute Inference Attacks on Classification Models

no code implementations7 Dec 2020 Shagufta Mehnaz, Ninghui Li, Elisa Bertino

In this paper, we focus on one kind of model inversion attacks, where the adversary knows non-sensitive attributes about instances in the training data and aims to infer the value of a sensitive attribute unknown to the adversary, using oracle access to the target classification model.

Attribute Classification +1

FLAP -- A Federated Learning Framework for Attribute-based Access Control Policies

no code implementations19 Oct 2020 Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh Verma, Seraphin Calo, Alessandra Russo

The design of a policy transfer framework has challenges, including policy conflicts and privacy issues.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.