(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–29 of 29 results for author: Thapa, C

.
  1. arXiv:2408.03758  [pdf, other

    cs.CR cs.NI

    MTDSense: AI-Based Fingerprinting of Moving Target Defense Techniques in Software-Defined Networking

    Authors: Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim

    Abstract: Moving target defenses (MTD) are proactive security techniques that enhance network security by confusing the attacker and limiting their attack window. MTDs have been shown to have significant benefits when evaluated against traditional network attacks, most of which are automated and untargeted. However, little has been done to address an attacker who is aware the network uses an MTD. In this wo… ▽ More

    Submitted 7 August, 2024; originally announced August 2024.

    Comments: 12 pages, 12 figures, 3 tables

  2. arXiv:2408.02876  [pdf, other

    cs.SE

    Elevating Software Trust: Unveiling and Quantifying the Risk Landscape

    Authors: Sarah Ali Siddiqui, Chandra Thapa, Rayne Holland, Wei Shao, Seyit Camtepe

    Abstract: Considering the ever-evolving threat landscape and rapid changes in software development, we propose a risk assessment framework SRiQT (Software Risk Quantification through Trust). This framework is based on the necessity of a dynamic, data-driven, and adaptable process to quantify risk in the software supply chain. Usually, when formulating such frameworks, static pre-defined weights are assigned… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

    Comments: 14 pages, 1 figure, 7 tables

  3. arXiv:2408.02266  [pdf, other

    cs.LG

    One-Shot Collaborative Data Distillation

    Authors: William Holland, Chandra Thapa, Sarah Ali Siddiqui, Wei Shao, Seyit Camtepe

    Abstract: Large machine-learning training datasets can be distilled into small collections of informative synthetic data samples. These synthetic sets support efficient model learning and reduce the communication cost of data sharing. Thus, high-fidelity distilled data can support the efficient deployment of machine learning applications in distributed network environments. A naive way to construct a synthe… ▽ More

    Submitted 12 August, 2024; v1 submitted 5 August, 2024; originally announced August 2024.

    ACM Class: I.2

  4. arXiv:2406.03404  [pdf, other

    cs.LG cs.AI cs.CR

    ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation

    Authors: Wei Shao, Rongyi Zhu, Cai Yang, Chandra Thapa, Muhammad Ejaz Ahmed, Seyit Camtepe, Rui Zhang, DuYong Kim, Hamid Menouar, Flora D. Salim

    Abstract: Spatiotemporal data is prevalent in a wide range of edge devices, such as those used in personal communication and financial transactions. Recent advancements have sparked a growing interest in integrating spatiotemporal analysis with large-scale language models. However, spatiotemporal data often contains sensitive information, making it unsuitable for open third-party access. To address this cha… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  5. Mitigation of Channel Tampering Attacks in Continuous-Variable Quantum Key Distribution

    Authors: Sebastian P. Kish, Chandra Thapa, Mikhael Sayat, Hajime Suzuki, Josef Pieprzyk, Seyit Camtepe

    Abstract: Despite significant advancements in continuous-variable quantum key distribution (CV-QKD), practical CV-QKD systems can be compromised by various attacks. Consequently, identifying new attack vectors and countermeasures for CV-QKD implementations is important for the continued robustness of CV-QKD. In particular, as CV-QKD relies on a public quantum channel, vulnerability to communication disrupti… ▽ More

    Submitted 12 June, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: 10 pages, 7 figures, closest to accepted version

    Journal ref: Phys. Rev. Research 6, 023301 (2024)

  6. arXiv:2312.09478  [pdf, other

    cs.LG cs.AI

    Entropy Causal Graphs for Multivariate Time Series Anomaly Detection

    Authors: Falih Gozi Febrinanto, Kristen Moore, Chandra Thapa, Mujie Liu, Vidya Saikrishna, Jiangang Ma, Feng Xia

    Abstract: Many multivariate time series anomaly detection frameworks have been proposed and widely applied. However, most of these frameworks do not consider intrinsic relationships between variables in multivariate time series data, thus ignoring the causal relationship among variables and degrading anomaly detection performance. This work proposes a novel framework called CGAD, an entropy Causal Graph for… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

  7. arXiv:2312.07821  [pdf, other

    quant-ph cs.LG

    Radio Signal Classification by Adversarially Robust Quantum Machine Learning

    Authors: Yanqiu Wu, Eromanga Adermann, Chandra Thapa, Seyit Camtepe, Hajime Suzuki, Muhammad Usman

    Abstract: Radio signal classification plays a pivotal role in identifying the modulation scheme used in received radio signals, which is essential for demodulation and proper interpretation of the transmitted information. Researchers have underscored the high susceptibility of ML algorithms for radio signal classification to adversarial attacks. Such vulnerability could result in severe consequences, includ… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: 12 pages, 6 figures

  8. arXiv:2307.13266  [pdf, other

    cs.LG cs.AI

    Federated Split Learning with Only Positive Labels for resource-constrained IoT environment

    Authors: Praveen Joshi, Chandra Thapa, Mohammed Hasanuzzaman, Ted Scully, Haithem Afli

    Abstract: Distributed collaborative machine learning (DCML) is a promising method in the Internet of Things (IoT) domain for training deep learning models, as data is distributed across multiple devices. A key advantage of this approach is that it improves data privacy by removing the necessity for the centralized aggregation of raw data but also empowers IoT devices with low computational power. Among vari… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: 11 pages, 3 figures

  9. arXiv:2307.12285  [pdf, other

    cs.CR

    ACE: A Consent-Embedded privacy-preserving search on genomic database

    Authors: Sara Jafarbeiki, Amin Sakzad, Ron Steinfeld, Shabnam Kasra Kermanshahi, Chandra Thapa, Yuki Kume

    Abstract: In this paper, we introduce ACE, a consent-embedded searchable encryption scheme. ACE enables dynamic consent management by supporting the physical deletion of associated data at the time of consent revocation. This ensures instant real deletion of data, aligning with privacy regulations and preserving individuals' rights. We evaluate ACE in the context of genomic databases, demonstrating its abil… ▽ More

    Submitted 23 July, 2023; originally announced July 2023.

  10. arXiv:2307.08955  [pdf

    cs.LG cs.CR

    Discretization-based ensemble model for robust learning in IoT

    Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere

    Abstract: IoT device identification is the process of recognizing and verifying connected IoT devices to the network. This is an essential process for ensuring that only authorized devices can access the network, and it is necessary for network management and maintenance. In recent years, machine learning models have been used widely for automating the process of identifying devices in the network. However,… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: 15 pages

  11. arXiv:2303.00307  [pdf, other

    cs.CR cs.NI eess.SP

    Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices

    Authors: Saud Khan, Chandra Thapa, Salman Durrani, Seyit Camtepe

    Abstract: Physical-layer authentication is a popular alternative to the conventional key-based authentication for internet of things (IoT) devices due to their limited computational capacity and battery power. However, this approach has limitations due to poor robustness under channel fluctuations, reconciliation overhead, and no clear safeguard distance to ensure the secrecy of the generated authentication… ▽ More

    Submitted 6 November, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: Accepted for publication in IEEE Internet of Things Journal

    Journal ref: IEEE Internet of Things Journal, vol. 11, no. 7, pp. 11312-11326, April, 2024

  12. arXiv:2302.01550  [pdf, other

    cs.LG

    Vertical Federated Learning: Taxonomies, Threats, and Prospects

    Authors: Qun Li, Chandra Thapa, Lawrence Ong, Yifeng Zheng, Hua Ma, Seyit A. Camtepe, Anmin Fu, Yansong Gao

    Abstract: Federated learning (FL) is the most popular distributed machine learning technique. FL allows machine-learning models to be trained without acquiring raw data to a single point for processing. Instead, local models are trained with local data; the models are then shared and combined. This approach preserves data privacy as locally trained models are shared instead of the raw data themselves. Broad… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

  13. arXiv:2204.03326  [pdf, other

    cs.LG cs.DC

    Enabling All In-Edge Deep Learning: A Literature Review

    Authors: Praveen Joshi, Mohammed Hasanuzzaman, Chandra Thapa, Haithem Afli, Ted Scully

    Abstract: In recent years, deep learning (DL) models have demonstrated remarkable achievements on non-trivial tasks such as speech recognition and natural language understanding. One of the significant contributors to its success is the proliferation of end devices that acted as a catalyst to provide data for data-hungry DL models. However, computing DL training and inference is the main challenge. Usually,… ▽ More

    Submitted 12 December, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: 21 pages

  14. arXiv:2204.03214  [pdf, other

    cs.CR cs.AI cs.LG

    Transformer-Based Language Models for Software Vulnerability Detection

    Authors: Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal

    Abstract: The large transformer-based language models demonstrate excellent performance in natural language processing. By considering the transferability of the knowledge gained by these models in one domain to other related domains, and the closeness of natural languages to high-level programming languages, such as C/C++, this work studies how to leverage (large) transformer-based language models in detec… ▽ More

    Submitted 5 September, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: 16 pages

  15. arXiv:2202.10688  [pdf, other

    cs.LG cs.AI

    Graph Lifelong Learning: A Survey

    Authors: Falih Gozi Febrinanto, Feng Xia, Kristen Moore, Chandra Thapa, Charu Aggarwal

    Abstract: Graph learning is a popular approach for performing machine learning on graph-structured data. It has revolutionized the machine learning ability to model graph data to address downstream tasks. Its application is wide due to the availability of graph data ranging from all types of networks to information systems. Most graph learning methods assume that the graph is static and its complete structu… ▽ More

    Submitted 3 November, 2022; v1 submitted 22 February, 2022; originally announced February 2022.

    Comments: 19 pages, 4 figures

    MSC Class: 68T07; 68T05 ACM Class: I.2.6

    Journal ref: IEEE Computational Intelligence Magazine 2022

  16. arXiv:2109.09246  [pdf, other

    cs.LG cs.AI

    Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance

    Authors: Praveen Joshi, Chandra Thapa, Seyit Camtepe, Mohammed Hasanuzzamana, Ted Scully, Haithem Afli

    Abstract: Federated Learning (FL), Split Learning (SL), and SplitFed Learning (SFL) are three recent developments in distributed machine learning that are gaining attention due to their ability to preserve the privacy of raw data. Thus, they are widely applicable in various domains where data is sensitive, such as large-scale medical image classification, internet-of-medical-things, and cross-organization p… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: CERC 2021

  17. FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation

    Authors: Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdran, Seyit Camtepe, Vijay Varadharajan, Surya Nepal

    Abstract: An integrated clinical environment (ICE) enables the connection and coordination of the internet of medical things around the care of patients in hospitals. However, ransomware attacks and their spread on hospital infrastructures, including ICE, are rising. Often the adversaries are targeting multiple hospitals with the same ransomware attacks. These attacks are detected by using machine learning… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    Journal ref: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 402), 2021

  18. arXiv:2103.02762  [pdf, other

    cs.LG cs.CR cs.NI

    Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

    Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

    Abstract: Federated learning (FL) and split learning (SL) are state-of-the-art distributed machine learning techniques to enable machine learning training without accessing raw data on clients or end devices. However, their \emph{comparative training performance} under real-world resource-restricted Internet of Things (IoT) device settings, e.g., Raspberry Pi, remains barely studied, which, to our knowledge… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: 14 pages. arXiv admin note: text overlap with arXiv:2003.13376

  19. arXiv:2011.14818  [pdf, other

    cs.LG cs.AI cs.CR

    Advancements of federated learning towards privacy preservation: from federated learning to split learning

    Authors: Chandra Thapa, M. A. P. Chamikara, Seyit A. Camtepe

    Abstract: In the distributed collaborative machine learning (DCML) paradigm, federated learning (FL) recently attracted much attention due to its applications in health, finance, and the latest innovations such as industry 4.0 and smart vehicles. FL provides privacy-by-design. It trains a machine learning model collaboratively over several distributed clients (ranging from two to millions) such as mobile ph… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.

    Comments: Authors' preprint version (before any peer-review) of a book chapter to appear in the Book series "Studies in Computational Intelligence", Book title "Federated Learning Systems: Towards Next-generation AI", Book eds. Muhammad Habib ur Rehman and Mohamed Medhat Gaber, Publisher "Springer Nature Switzerland AG Gewerbestrasse 11, 6330 Cham, Switzerland."

  20. Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

    Authors: Chandra Thapa, Seyit Camtepe

    Abstract: Precision health leverages information from various sources, including omics, lifestyle, environment, social media, medical records, and medical insurance claims to enable personalized care, prevent and predict illness, and precise treatments. It extensively uses sensing technologies (e.g., electronic health monitoring devices), computations (e.g., machine learning), and communication (e.g., inter… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.

    Comments: 35 pages, 3 figures, 7 tables

    Journal ref: Computers in Biology and Medicine 129 (2021) 104130

  21. arXiv:2007.13300  [pdf, other

    cs.LG cs.CR

    Evaluation of Federated Learning in Phishing Email Detection

    Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng

    Abstract: The use of Artificial Intelligence (AI) to detect phishing emails is primarily dependent on large-scale centralized datasets, which opens it up to a myriad of privacy, trust, and legal issues. Moreover, organizations are loathed to share emails, given the risk of leakage of commercially sensitive information. So, it is uncommon to obtain sufficient emails to train a global AI model efficiently. Ac… ▽ More

    Submitted 21 May, 2021; v1 submitted 26 July, 2020; originally announced July 2020.

    Comments: Submitted for journal publication

  22. arXiv:2004.12088  [pdf, other

    cs.LG

    SplitFed: When Federated Learning Meets Split Learning

    Authors: Chandra Thapa, M. A. P. Chamikara, Seyit Camtepe, Lichao Sun

    Abstract: Federated learning (FL) and split learning (SL) are two popular distributed machine learning approaches. Both follow a model-to-data scenario; clients train and test machine learning models without sharing raw data. SL provides better model privacy than FL due to the machine learning model architecture split between clients and the server. Moreover, the split model makes SL a better option for res… ▽ More

    Submitted 16 February, 2022; v1 submitted 25 April, 2020; originally announced April 2020.

    Comments: Accepted at AAAI 2022, Authors preprint version, 14 pages

  23. arXiv:2003.13376  [pdf, other

    cs.CR cs.DC cs.LG

    End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things

    Authors: Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

    Abstract: This work is the first attempt to evaluate and compare felderated learning (FL) and split neural networks (SplitNN) in real-world IoT settings in terms of learning performance and device implementation overhead. We consider a variety of datasets, different model architectures, multiple clients, and various performance metrics. For learning performance, which is specified by the model accuracy and… ▽ More

    Submitted 2 August, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    Comments: 10 pages, 12 figures

    Journal ref: The 39th International Symposium on Reliable Distributed Systems (SRDS) 2020

  24. arXiv:2003.12365  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?

    Authors: Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit A. Camtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal

    Abstract: A new collaborative learning, called split learning, was recently introduced, aiming to protect user data privacy without revealing raw input data to a server. It collaboratively runs a deep neural network model where the model is split into two parts, one for the client and the other for the server. Therefore, the server has no direct access to raw data processed at the client. Until now, the spl… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

    Comments: 13 pages, Accepted at ACM ASIACCS 2020

  25. arXiv:1711.08150  [pdf, other

    cs.IT

    Structural Characteristics of Two-Sender Index Coding

    Authors: Chandra Thapa, Lawrence Ong, Sarah J. Johnson, Min Li

    Abstract: This paper studies index coding with two senders. In this setup, source messages are distributed among the senders possibly with common messages. In addition, there are multiple receivers, with each receiver having some messages a priori, known as side-information, and requesting one unique message such that each message is requested by only one receiver. Index coding in this setup is called two-s… ▽ More

    Submitted 19 June, 2019; v1 submitted 22 November, 2017; originally announced November 2017.

    Comments: Submitted for journal publication

  26. Graph-Theoretic Approaches to Two-Sender Index Coding

    Authors: Chandra Thapa, Lawrence Ong, Sarah J. Johnson

    Abstract: Consider a communication scenario over a noiseless channel where a sender is required to broadcast messages to multiple receivers, each having side information about some messages. In this scenario, the sender can leverage the receivers' side information during the encoding of messages in order to reduce the required transmissions. This type of encoding is called index coding. In this paper, we st… ▽ More

    Submitted 28 September, 2016; originally announced September 2016.

    Comments: To be presented at 2016 IEEE Global Communications Conference (GLOBECOM 2016) Workshop on Network Coding and Applications (NetCod), Washington, USA, 2016

  27. Interlinked Cycles for Index Coding: Generalizing Cycles and Cliques

    Authors: Chandra Thapa, Lawrence Ong, Sarah J. Johnson

    Abstract: We consider a graphical approach to index coding. While cycles have been shown to provide coding gain, only disjoint cycles and cliques (a specific type of overlapping cycles) have been exploited in existing literature. In this paper, we define a more general form of overlapping cycles, called the interlinked-cycle (IC) structure, that generalizes cycles and cliques. We propose a scheme, called th… ▽ More

    Submitted 24 February, 2018; v1 submitted 29 February, 2016; originally announced March 2016.

    Comments: The original paper and a correction to it

    Journal ref: IEEE Transactions on Information Theory ( Volume: 63, Issue: 6, June 2017 )

  28. Generalized Interlinked Cycle Cover for Index Coding

    Authors: Chandra Thapa, Lawrence Ong, Sarah J. Johnson

    Abstract: A source coding problem over a noiseless broadcast channel where the source is pre-informed about the contents of the cache of all receivers, is an index coding problem. Furthermore, if each message is requested by one receiver, then we call this an index coding problem with a unicast message setting. This problem can be represented by a directed graph. In this paper, we first define a structure (… ▽ More

    Submitted 20 July, 2015; v1 submitted 19 April, 2015; originally announced April 2015.

    Comments: Extended version of the paper which is to be presented at the IEEE Information Theory Workshop (ITW), 2015 Jeju

  29. A New Index Coding Scheme Exploiting Interlinked Cycles

    Authors: Chandra Thapa, Lawrence Ong, Sarah J. Johnson

    Abstract: We study the index coding problem in the unicast message setting, i.e., where each message is requested by one unique receiver. This problem can be modeled by a directed graph. We propose a new scheme called interlinked cycle cover, which exploits interlinked cycles in the directed graph, for designing index codes. This new scheme generalizes the existing clique cover and cycle cover schemes. We p… ▽ More

    Submitted 8 April, 2015; originally announced April 2015.

    Comments: To be presented at the 2015 IEEE International Symposium on Information Theory (ISIT 2015), Hong Kong