no code implementations • 1 Mar 2024 • Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino
The latter data may follow a distinct distribution.
no code implementations • 20 Dec 2023 • Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu
In this paper, we propose Graphene, an advanced system designed to provide a detailed analysis of the security posture of computing infrastructures.
1 code implementation • 15 Dec 2023 • Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
Despite the initial success of current audio backdoor attacks, they suffer from the following limitations: (i) Most of them require sufficient knowledge, which limits their widespread adoption.
no code implementations • 7 Nov 2023 • Sorin Adam Matei, Elisa Bertino
The present study explored managerial and instructor perceptions of their freshly employed cybersecurity workers' or students' preparedness to work effectively in a changing cybersecurity environment that includes AI tools.
no code implementations • 2 Nov 2023 • Diane Jackson, Sorin Adam Matei, Elisa Bertino
The emergence of AI tools in cybersecurity creates many opportunities and uncertainties.
1 code implementation • 23 Jun 2023 • Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz
Among them, the spatial aggregation layer adopts a defense mechanism to robustly aggregate local trust, and the temporal aggregation layer applies an attention mechanism for effective learning of temporal patterns.
no code implementations • 1 Jun 2023 • Adrian Shuai Li, Elisa Bertino, Xuan-Hong Dang, Ankush Singla, Yuhai Tu, Mark N Wegman
We show that information useful only in the source can be present in the DIRep, weakening the quality of the domain adaptation.
no code implementations • 31 May 2023 • Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, Ting-Yan Wu
Our approach works for scenarios where the source dataset and the dataset available for the target learning task have same or different feature spaces.
1 code implementation • 22 Jan 2023 • Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino
5G is the 5th generation cellular network protocol.
no code implementations • 23 Jan 2022 • Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino
Increasing use of machine learning (ML) technologies in privacy-sensitive domains such as medical diagnoses, lifestyle predictions, and business decisions highlights the need to better understand if these ML technologies are introducing leakage of sensitive and proprietary training data.
no code implementations • 13 Mar 2021 • Nicholas Malecki, Hye-Young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino
Federated learning enables a global machine learning model to be trained collaboratively by distributed, mutually non-trusting learning agents who desire to maintain the privacy of their training data and their hardware.
no code implementations • 17 Dec 2020 • Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang
Many proximity-based tracing (PCT) protocols have been proposed and deployed to combat the spreading of COVID-19.
Computers and Society C.3; H.4; J.3; J.7; K.4; K.6.5
no code implementations • 10 Dec 2020 • Elisa Bertino, Sujata Banerjee
The Internet of Things (IoT) and edge computing applications aim to support a variety of societal needs, including the global pandemic situation that the entire world is currently experiencing and responses to natural disasters.
no code implementations • 10 Dec 2020 • Elisa Bertino, Finale Doshi-Velez, Maria Gini, Daniel Lopresti, David Parkes
There is a vital need for research in "AI and Cooperation" that seeks to understand the ways in which systems of AIs and systems of AIs with people can engender cooperative behavior.
no code implementations • 7 Dec 2020 • Shagufta Mehnaz, Ninghui Li, Elisa Bertino
In this paper, we focus on one kind of model inversion attacks, where the adversary knows non-sensitive attributes about instances in the training data and aims to infer the value of a sensitive attribute unknown to the adversary, using oracle access to the target classification model.
no code implementations • 19 Oct 2020 • Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh Verma, Seraphin Calo, Alessandra Russo
The design of a policy transfer framework has challenges, including policy conflicts and privacy issues.
Cryptography and Security