no code implementations • 10 May 2023 • Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta
One effective approach to improving IoT security is to deploy IoT honeypot systems, which can collect attack information and reveal the methods and strategies used by attackers.
1 code implementation • 6 Mar 2023 • Henger Li, Chen Wu, Sencun Zhu, Zizhan Zheng
In particular, we propose a general reinforcement learning-based backdoor attack framework where the attacker first trains a (non-myopic) attack policy using a simulator built upon its local data and common knowledge on the FL system, which is then applied during actual FL training.
no code implementations • 24 Jan 2022 • Chen Wu, Sencun Zhu, Prasenjit Mitra
Federated Learning (FL) is designed to protect the data privacy of each client during the training process by transmitting only models instead of the original data.
no code implementations • 8 Sep 2021 • Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang
In this work, we propose AppQ, a novel app quality grading and recommendation system that extracts inborn features of apps based on app source code.
1 code implementation • 27 Dec 2020 • Lun-Pin Yuan, Peng Liu, Sencun Zhu
One of the most challenging problems in the field of intrusion detection is anomaly detection for discrete event logs.
1 code implementation • 27 Dec 2020 • Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu
Autoencoder-based anomaly detection methods have been used in identifying anomalous users from large-scale enterprise logs with the assumption that adversarial activities do not follow past habitual patterns.
no code implementations • 28 Oct 2020 • Chen Wu, Xian Yang, Sencun Zhu, Prasenjit Mitra
To minimize the pruning influence on test accuracy, we can fine-tune after pruning, and the attack success rate drops to 6. 4%, with only a 1. 7% loss of test accuracy.
no code implementations • 26 Aug 2019 • Alem Fitwi, Yu Chen, Sencun Zhu
Hence, this mechanism detects window objects in every image or frame of a real-time video and masks them chaotically to protect the privacy of people.
no code implementations • 30 Aug 2018 • Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller
Such popularity, however, may attract attackers to exploit the vulnerabilities of the deployed deep learning models and launch attacks against security-sensitive applications.