no code implementations • 11 Mar 2024 • Md. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Walid Saad, Zhu Han, Sachin Shetty
Understanding the potential of generative AI (GenAI)-based attacks on the power grid is a fundamental challenge that must be addressed in order to protect the power grid by realizing and validating risk in new attack vectors.
1 code implementation • 28 Nov 2023 • Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty
In this paper, we propose an enhanced Membership Inference Attack with the Batch-wise generated Attack Dataset (MIA-BAD), a modification to the MIA approach.
1 code implementation • 28 Nov 2023 • Soumya Banerjee, Sarada Prasad Gochhayat, Sachin Shetty
This work investigates transmission data from fixed broadband wireless access in the mmWave band in 5G.
no code implementations • 28 Nov 2023 • Ying Wang, Shashank Jere, Soumya Banerjee, Lingjia Liu, Sachin Shetty, Shehadi Dayekh
To address this, an unsupervised auto-encoder-based anomaly detection is presented with an AUC of 0. 987.
no code implementations • 12 Jun 2023 • Md. Shirajum Munir, Sachin Shetty, Danda B. Rawat
The rapid growth of distributed energy resources (DERs), such as renewable energy sources, generators, consumers, and prosumers in the smart grid infrastructure, poses significant cybersecurity and trust challenges to the grid controller.
no code implementations • 13 Oct 2022 • Md. Shirajum Munir, Ki Tae Kim, Apurba Adhikary, Walid Saad, Sachin Shetty, Seong-Bae Park, Choong Seon Hong
Explainable artificial intelligence (XAI) twin systems will be a fundamental enabler of zero-touch network and service management (ZSM) for sixth-generation (6G) wireless networks.
Explainable artificial intelligence Explainable Artificial Intelligence (XAI) +2
1 code implementation • 6 Apr 2019 • Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.
Cryptography and Security
1 code implementation • MILCOM 2017 • Juan Zhao, Sachin Shetty, Jan Wei Pan
We evaluated the technique on publicly available datasets, and the results demonstrate the effectiveness of transfer learning to detect new network attacks.