Share This Author
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
- C. Liao, Haoti Zhong, A. Squicciarini, Sencun Zhu, David J. Miller
- Computer ScienceCODASPY
- 30 August 2018
This paper proposes two approaches for generating a backdoor that is hardly perceptible yet effective in poisoning the model, and demonstrates that such attacks can be effective and achieve a high attack success rate at a small cost of model accuracy loss with a small injection rate.
A Brokerage-Based Approach for Cloud Service Selection
- S. Sundareswaran, A. Squicciarini, D. Lin
- Computer ScienceIEEE Fifth International Conference on Cloud…
- 24 June 2012
A novel brokerage-based architecture in the Cloud is proposed, where the Cloud brokers is responsible for the service selection and a unique indexing technique for managing the information of a large number of Cloud service providers is designed.
Collective privacy management in social networks
This paper proposes a solution that offers automated ways to share images based on an extended notion of content ownership that promotes truthfulness, and that rewards users who promote co-ownership, and shows that supporting these type of solutions is not feasible, but can be implemented through a minimal increase in overhead to end-users.
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs
- D. Lin, Jian Kang, A. Squicciarini, Yingjie Wu, S. Gurung, O. Tonguz
- Computer ScienceIEEE Transactions on Mobile Computing
- 1 May 2017
This work proposes a novel approach that introduces moving object modeling and indexing techniques from the theory of large moving object databases into the design of VANET routing protocols and demonstrates the superiority of this approach compared with both clustering and non-clustering based routing protocols.
Trust-X: A Peer-to-Peer Framework for Trust Establishment
A comprehensive XML-based framework for trust negotiations, specifically conceived for a peer-to-peer environment, and presents a number of innovative features, such as the support for protection of sensitive policies, the use of trust tickets to speed up the negotiation, and the support of different strategies to carry on a negotiation.
Content-Driven Detection of Cyberbullying on the Instagram Social Network
This work investigates use of posted images and captions for improved detection of bullying in response to shared content, and identifies the importance of these advanced features in assisting detection of cyberbullying in posted comments.
Security for Web Services and Service-Oriented Architectures
Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA, covering in detail all recent standards that address Web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation.
CoPE: Enabling collaborative privacy management in online social networks
The results demonstrate that regardless of whether Facebook users are worried about their privacy, they like the idea of collaborative privacy management and believe that a tool such as CoPE would be useful to manage their personal information shared within a social network.
Survey on Access Control for Community-Centered Collaborative Systems
This survey examines the growing literature on access control for collaborative systems centered on communities, and identifies the main challenges to be addressed in order to facilitate the adoption of collaborative access control solutions in real-life settings.
Trust Negotiation in Identity Management
The authors show how federated identity management systems can better protect users' information when integrated with trust negotiation and serve as the basic context for determining suitable solutions to this issue.