Search Results for author: Sachin Shetty

Found 8 papers, 4 papers with code

A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid

no code implementations11 Mar 2024 Md. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Walid Saad, Zhu Han, Sachin Shetty

Understanding the potential of generative AI (GenAI)-based attacks on the power grid is a fundamental challenge that must be addressed in order to protect the power grid by realizing and validating risk in new attack vectors.

Ensemble Learning

Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G

1 code implementation28 Nov 2023 Soumya Banerjee, Sarada Prasad Gochhayat, Sachin Shetty

This work investigates transmission data from fixed broadband wireless access in the mmWave band in 5G.

Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid

no code implementations12 Jun 2023 Md. Shirajum Munir, Sachin Shetty, Danda B. Rawat

The rapid growth of distributed energy resources (DERs), such as renewable energy sources, generators, consumers, and prosumers in the smart grid infrastructure, poses significant cybersecurity and trust challenges to the grid controller.

Fairness

Neuro-symbolic Explainable Artificial Intelligence Twin for Zero-touch IoE in Wireless Network

no code implementations13 Oct 2022 Md. Shirajum Munir, Ki Tae Kim, Apurba Adhikary, Walid Saad, Sachin Shetty, Seong-Bae Park, Choong Seon Hong

Explainable artificial intelligence (XAI) twin systems will be a fundamental enabler of zero-touch network and service management (ZSM) for sixth-generation (6G) wireless networks.

Explainable artificial intelligence Explainable Artificial Intelligence (XAI) +2

Exploring the Attack Surface of Blockchain: A Systematic Overview

1 code implementation6 Apr 2019 Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen

In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains.

Cryptography and Security

Feature-Based Transfer Learning for Network Security

1 code implementation MILCOM 2017 Juan Zhao, Sachin Shetty, Jan Wei Pan

We evaluated the technique on publicly available datasets, and the results demonstrate the effectiveness of transfer learning to detect new network attacks.

Transfer Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.