International Conference on Cyber Security Cryptography and Machine Learning最新文献

筛选
英文 中文
Generating One-Hot Maps under Encryption 在加密下生成单热映射
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2023-06-11 DOI: 10.48550/arXiv.2306.06739
E. Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Hayim Shaul
{"title":"Generating One-Hot Maps under Encryption","authors":"E. Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Hayim Shaul","doi":"10.48550/arXiv.2306.06739","DOIUrl":"https://doi.org/10.48550/arXiv.2306.06739","url":null,"abstract":"One-hot maps are commonly used in the AI domain. Unsurprisingly, they can also bring great benefits to ML-based algorithms such as decision trees that run under Homomorphic Encryption (HE), specifically CKKS. Prior studies in this domain used these maps but assumed that the client encrypts them. Here, we consider different tradeoffs that may affect the client's decision on how to pack and store these maps. We suggest several conversion algorithms when working with encrypted data and report their costs. Our goal is to equip the ML over HE designer with the data it needs for implementing encrypted one-hot maps.","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132132658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Skip Connections Realization for Secure Inference on Encrypted Data 加密数据安全推断的高效跳过连接实现
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2023-06-11 DOI: 10.48550/arXiv.2306.06736
Nir Drucker, Itamar Zimerman
{"title":"Efficient Skip Connections Realization for Secure Inference on Encrypted Data","authors":"Nir Drucker, Itamar Zimerman","doi":"10.48550/arXiv.2306.06736","DOIUrl":"https://doi.org/10.48550/arXiv.2306.06736","url":null,"abstract":"Homomorphic Encryption (HE) is a cryptographic tool that allows performing computation under encryption, which is used by many privacy-preserving machine learning solutions, for example, to perform secure classification. Modern deep learning applications yield good performance for example in image processing tasks benchmarks by including many skip connections. The latter appears to be very costly when attempting to execute model inference under HE. In this paper, we show that by replacing (mid-term) skip connections with (short-term) Dirac parameterization and (long-term) shared-source skip connection we were able to reduce the skip connections burden for HE-based solutions, achieving x1.3 computing power improvement for the same accuracy.","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127330794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the existence of highly organized communities in networks of locally interacting agents 关于在局部相互作用的代理网络中存在高度组织的社区
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2023-04-10 DOI: 10.48550/arXiv.2304.04480
V. Liagkou, P. Nastou, P. Spirakis, Y. Stamatiou
{"title":"On the existence of highly organized communities in networks of locally interacting agents","authors":"V. Liagkou, P. Nastou, P. Spirakis, Y. Stamatiou","doi":"10.48550/arXiv.2304.04480","DOIUrl":"https://doi.org/10.48550/arXiv.2304.04480","url":null,"abstract":"In this paper we investigate phenomena of spontaneous emergence or purposeful formation of highly organized structures in networks of related agents. We show that the formation of large organized structures requires exponentially large, in the size of the structures, networks. Our approach is based on Kolmogorov, or descriptional, complexity of networks viewed as finite size strings. We apply this approach to the study of the emergence or formation of simple organized, hierarchical, structures based on Sierpinski Graphs and we prove a Ramsey type theorem that bounds the number of vertices in Kolmogorov random graphs that contain Sierpinski Graphs as subgraphs. Moreover, we show that Sierpinski Graphs encompass close-knit relationships among their vertices that facilitate fast spread and learning of information when agents in their vertices are engaged in pairwise interactions modelled as two person games. Finally, we generalize our findings for any organized structure with succinct representations. Our work can be deployed, in particular, to study problems related to the security of networks by identifying conditions which enable or forbid the formation of sufficiently large insider subnetworks with malicious common goal to overtake the network or cause disruption of its operation.","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks 基于非同步的神经网络侧信道分析对策
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2023-03-25 DOI: 10.48550/arXiv.2303.18132
J. Breier, Dirmanto Jap, Xiaolu Hou, S. Bhasin
{"title":"A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks","authors":"J. Breier, Dirmanto Jap, Xiaolu Hou, S. Bhasin","doi":"10.48550/arXiv.2303.18132","DOIUrl":"https://doi.org/10.48550/arXiv.2303.18132","url":null,"abstract":"Model extraction attacks have been widely applied, which can normally be used to recover confidential parameters of neural networks for multiple layers. Recently, side-channel analysis of neural networks allows parameter extraction even for networks with several multiple deep layers with high effectiveness. It is therefore of interest to implement a certain level of protection against these attacks. In this paper, we propose a desynchronization-based countermeasure that makes the timing analysis of activation functions harder. We analyze the timing properties of several activation functions and design the desynchronization in a way that the dependency on the input and the activation type is hidden. We experimentally verify the effectiveness of the countermeasure on a 32-bit ARM Cortex-M4 microcontroller and employ a t-test to show the side-channel information leakage. The overhead ultimately depends on the number of neurons in the fully-connected layer, for example, in the case of 4096 neurons in VGG-19, the overheads are between 2.8% and 11%.","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122883487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks 改进基于有效负载的控制器局域网攻击检测
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2022-08-13 DOI: 10.48550/arXiv.2208.06628
Stefano Longari, Alessandro Nichelini, Carlo Alberto Pozzoli, Michele Carminati, S. Zanero
{"title":"CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks","authors":"Stefano Longari, Alessandro Nichelini, Carlo Alberto Pozzoli, Michele Carminati, S. Zanero","doi":"10.48550/arXiv.2208.06628","DOIUrl":"https://doi.org/10.48550/arXiv.2208.06628","url":null,"abstract":"Over the years, the increasingly complex and interconnected vehicles raised the need for effective and efficient Intrusion Detection Systems against on-board networks. In light of the stringent domain requirements and the heterogeneity of information transmitted on Controller Area Network, multiple approaches have been proposed, which work at different abstraction levels and granularities. Among these, RNN-based solutions received the attention of the research community for their performances and promising results. In this paper, we improve CANnolo, an RNN-based state-of-the-art IDS for CAN, by proposing CANdito, an unsupervised IDS that exploits Long Short-Term Memory autoencoders to detect anomalies through a signal reconstruction process. We evaluate CANdito by measuring its effectiveness against a comprehensive set of synthetic attacks injected in a real-world CAN dataset. We demonstrate the improvement of CANdito with respect to CANnolo on a real-world dataset injected with a comprehensive set of attacks, both in terms of detection and temporal performances.","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130580858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine-Learning Based Objective Function Selection for Community Detection 基于机器学习的社区检测目标函数选择
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2022-03-25 DOI: 10.48550/arXiv.2203.13495
Asa Bornstein, Amir Rubin, Danny Hendler
{"title":"Machine-Learning Based Objective Function Selection for Community Detection","authors":"Asa Bornstein, Amir Rubin, Danny Hendler","doi":"10.48550/arXiv.2203.13495","DOIUrl":"https://doi.org/10.48550/arXiv.2203.13495","url":null,"abstract":". NECTAR, a Node-centric ovErlapping Community deTection AlgoRithm, presented in 2016 by Cohen et. al, chooses dynamically between two objective functions which function to optimize, based on the network on which it is invoked. This approach, as shown by Cohen et al., outperforms six state-of-the-art algorithms for overlapping community detection. In this work, we present NECTAR-ML, an extension of the NECTAR algorithm that uses a machine-learning based model for automating the selection of the objective function, trained and evaluated on a dataset of 15,755 synthetic and 7 real-world networks. Our analysis shows that in approximately 90% of the cases our model was able to successfully select the correct objective function. We conducted a competitive analysis of NECTAR and NECTAR-ML. NECTAR-ML was shown to significantly outperform NECTAR’s ability to select the best objective function. We also conducted a competitive analysis of NECTAR-ML and two additional state-of-the-art multi-objective community detection algorithms. NECTAR-ML outperformed both algorithms in terms of average detection quality. Multiobjective EAs (MOEAs) are considered to be the most popular approach to solve MOP and the fact that NECTAR-ML significantly outperforms them demonstrates the effectiveness of ML-based objective function selection.","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring Time Series With Missing Values: a Deep Probabilistic Approach 具有缺失值的时间序列监测:一种深度概率方法
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2022-03-09 DOI: 10.48550/arXiv.2203.04916
Oshri Barazani, David Tolpin
{"title":"Monitoring Time Series With Missing Values: a Deep Probabilistic Approach","authors":"Oshri Barazani, David Tolpin","doi":"10.48550/arXiv.2203.04916","DOIUrl":"https://doi.org/10.48550/arXiv.2203.04916","url":null,"abstract":"Systems are commonly monitored for health and security through collection and streaming of multivariate time series. Advances in time series forecasting due to adoption of multilayer recurrent neural network architectures make it possible to forecast in high-dimensional time series, and identify and classify novelties early, based on subtle changes in the trends. However, mainstream approaches to multi-variate time series predictions do not handle well cases when the ongoing forecast must include uncertainty, nor they are robust to missing data. We introduce a new architecture for time series monitoring based on combination of state-of-the-art methods of forecasting in high-dimensional time series with full probabilistic handling of uncertainty. We demonstrate advantage of the architecture for time series forecasting and novelty detection, in particular with partially missing data, and empirically evaluate and compare the architecture to state-of-the-art approaches on a real-world data set.","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114287798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the undecidability of the Panopticon detection problem 关于圆形监狱检测问题的不可判定性
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2021-07-12 DOI: 10.1007/978-3-031-07689-3_6
V. Liagkou, P. Nastou, P. Spirakis, Y. Stamatiou
{"title":"On the undecidability of the Panopticon detection problem","authors":"V. Liagkou, P. Nastou, P. Spirakis, Y. Stamatiou","doi":"10.1007/978-3-031-07689-3_6","DOIUrl":"https://doi.org/10.1007/978-3-031-07689-3_6","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Integrity and Validation Using Cryptographic Composability and Computer Vision 使用密码组合性和计算机视觉的软件完整性和验证
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2021-07-08 DOI: 10.1007/978-3-030-78086-9_30
Donald Beaver
{"title":"Software Integrity and Validation Using Cryptographic Composability and Computer Vision","authors":"Donald Beaver","doi":"10.1007/978-3-030-78086-9_30","DOIUrl":"https://doi.org/10.1007/978-3-030-78086-9_30","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using a Neural Network to Detect Anomalies given an N-gram Profile 利用神经网络检测给定n图剖面的异常
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2021-04-12 DOI: 10.1007/978-3-030-78086-9_33
Byunggu Yu, Junwhan Kim
{"title":"Using a Neural Network to Detect Anomalies given an N-gram Profile","authors":"Byunggu Yu, Junwhan Kim","doi":"10.1007/978-3-030-78086-9_33","DOIUrl":"https://doi.org/10.1007/978-3-030-78086-9_33","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"13 77","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120970303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信