Skip to main content

Showing 1–7 of 7 results for author: Boztas, S

  1. arXiv:2405.07180  [pdf, other

    cs.IT

    Repairing Reed-Solomon Codes with Side Information

    Authors: Thi Xinh Dinh, Ba Thong Le, Son Hoang Dau, Serdar Boztas, Stanislav Kruglik, Han Mao Kiah, Emanuele Viterbo, Tuvi Etzion, Yeow Meng Chee

    Abstract: We generalize the problem of recovering a lost/erased symbol in a Reed-Solomon code to the scenario in which some side information about the lost symbol is known. The side information is represented as a set $S$ of linearly independent combinations of the sub-symbols of the lost symbol. When $S = \varnothing$, this reduces to the standard problem of repairing a single codeword symbol. When $S$ is… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    MSC Class: 94B05; 94B60 ACM Class: E.4

  2. arXiv:2305.06600  [pdf, other

    cs.IT cs.DM

    Designing Compact Repair Groups for Reed-Solomon Codes

    Authors: Thi Xinh Dinh, Serdar Boztas, Son Hoang Dau, Emanuele Viterbo

    Abstract: Motivated by the application of Reed-Solomon codes to recently emerging decentralized storage systems such as Storj and Filebase/Sia, we study the problem of designing compact repair groups for recovering multiple failures in a decentralized manner. Here, compactness means that the corresponding trace repair schemes of these groups of helpers can be generated from a single or a few seed repair sch… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  3. arXiv:2207.03046  [pdf, other

    cs.NI cs.AI cs.CV cs.LG eess.SP

    Self-Supervised RF Signal Representation Learning for NextG Signal Classification with Deep Learning

    Authors: Kemal Davaslioglu, Serdar Boztas, Mehmet Can Ertem, Yalin E. Sagduyu, Ender Ayanoglu

    Abstract: Deep learning (DL) finds rich applications in the wireless domain to improve spectrum awareness. Typically, DL models are either randomly initialized following a statistical distribution or pretrained on tasks from other domains in the form of transfer learning without accounting for the unique characteristics of wireless signals. Self-supervised learning (SSL) enables the learning of useful repre… ▽ More

    Submitted 1 November, 2022; v1 submitted 6 July, 2022; originally announced July 2022.

    Comments: 5 pages, 3 figures, 3 tables

    Journal ref: IEEE Wireless Communications Letters, 2022

  4. arXiv:2205.11015  [pdf, other

    cs.IT

    Practical Considerations in Repairing Reed-Solomon Codes

    Authors: Thi Xinh Dinh, Luu Y Nhi Nguyen, Lakshmi J. Mohan, Serdar Boztas, Tran Thi Luong, Son Hoang Dau

    Abstract: The issue of repairing Reed-Solomon codes currently employed in industry has been sporadically discussed in the literature. In this work we carry out a systematic study of these codes and investigate important aspects of repairing them under the trace repair framework, including which evaluation points to select and how to implement a trace repair scheme efficiently. In particular, we employ diffe… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: 6 pages, accepted to the IEEE International Symposium on Information Theory

    MSC Class: 94B05; 94B60 ACM Class: E.4

  5. arXiv:1809.00231  [pdf, other

    cs.CR cs.SI

    Insider Threat Detection Through Attributed Graph Clustering

    Authors: Anagi Gamachchi, Serdar Boztas

    Abstract: While most organizations continue to invest in traditional network defences, a formidable security challenge has been brewing within their own boundaries. Malicious insiders with privileged access in the guise of a trusted source have carried out many attacks causing far-reaching damage to financial stability, national security and brand reputation for both public and private sector organizations.… ▽ More

    Submitted 1 September, 2018; originally announced September 2018.

  6. arXiv:1809.00141  [pdf, other

    cs.CR

    A Graph Based Framework for Malicious Insider Threat Detection

    Authors: Anagi Gamachchi, Li Sun, Serdar Boztas

    Abstract: While most security projects have focused on fending off attacks coming from outside the organizational boundaries, a real threat has arisen from the people who are inside those perimeter protections. Insider threats have shown their power by hugely affecting national security, financial stability, and the privacy of many thousands of people. What is in the news is the tip of the iceberg, with muc… ▽ More

    Submitted 1 September, 2018; originally announced September 2018.

  7. arXiv:1609.06676  [pdf, other

    cs.CR

    Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study

    Authors: Li Sun, Steven Versteeg, Serdar Boztas, Asha Rao

    Abstract: Anomalous user behavior detection is the core component of many information security systems, such as intrusion detection, insider threat detection and authentication systems. Anomalous behavior will raise an alarm to the system administrator and can be further combined with other information to determine whether it constitutes an unauthorised or malicious use of a resource. This paper presents an… ▽ More

    Submitted 21 September, 2016; originally announced September 2016.