Skip to main content

Showing 1–50 of 52 results for author: Fu, A

  1. arXiv:2407.00501  [pdf, other

    cs.LG cs.AI cs.CE

    Aeroengine performance prediction using a physical-embedded data-driven method

    Authors: Tong Mo, Shiran Dai, An Fu, Xiaomeng Zhu, Shuxiao Li

    Abstract: Accurate and efficient prediction of aeroengine performance is of paramount importance for engine design, maintenance, and optimization endeavours. However, existing methodologies often struggle to strike an optimal balance among predictive accuracy, computational efficiency, modelling complexity, and data dependency. To address these challenges, we propose a strategy that synergistically combines… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  2. arXiv:2405.15316  [pdf, other

    cs.LG cs.CR

    Decaf: Data Distribution Decompose Attack against Federated Learning

    Authors: Zhiyang Dai, Chunyi Zhou, Anmin Fu

    Abstract: In contrast to prevalent Federated Learning (FL) privacy inference techniques such as generative adversarial networks attacks, membership inference attacks, property inference attacks, and model inversion attacks, we devise an innovative privacy threat: the Data Distribution Decompose Attack on FL, termed Decaf. This attack enables an honest-but-curious FL server to meticulously profile the propor… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  3. arXiv:2405.03880  [pdf, other

    physics.med-ph cs.LG eess.IV

    Efficient Radiation Treatment Planning based on Voxel Importance

    Authors: Sebastian Mair, Anqi Fu, Jens Sjölund

    Abstract: Optimization is a time-consuming part of radiation treatment planning. We propose to reduce the optimization problem by only using a representative subset of informative voxels. This way, we improve planning efficiency while maintaining or enhancing the plan quality. To reduce the computational complexity of the optimization problem, we propose to subsample the set of voxels via importance samplin… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 20 pages, 11 figures

  4. arXiv:2403.08254  [pdf, other

    cs.LG cs.CR cs.CY

    Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects

    Authors: Na Li, Chunyi Zhou, Yansong Gao, Hui Chen, Anmin Fu, Zhi Zhang, Yu Shui

    Abstract: Personal digital data is a critical asset, and governments worldwide have enforced laws and regulations to protect data privacy. Data users have been endowed with the right to be forgotten of their data. In the course of machine learning (ML), the forgotten right requires a model provider to delete user data and its subsequent impact on ML models upon user requests. Machine unlearning emerges to a… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  5. arXiv:2311.08086  [pdf

    cs.AI

    CPSOR-GCN: A Vehicle Trajectory Prediction Method Powered by Emotion and Cognitive Theory

    Authors: L. Tang, Y. Li, J. Yuan, A. Fu, J. Sun

    Abstract: Active safety systems on vehicles often face problems with false alarms. Most active safety systems predict the driver's trajectory with the assumption that the driver is always in a normal emotion, and then infer risks. However, the driver's trajectory uncertainty increases under abnormal emotions. This paper proposes a new trajectory prediction model: CPSOR-GCN, which predicts vehicle trajectori… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: 15 pages, 31 figures, submitted to IEEE Transactions on Intelligent Vehicles

  6. arXiv:2310.08403  [pdf, other

    cs.DC

    Vault: Decentralized Storage Made Durable

    Authors: Guangda Sun, Michael Hu Yiqing, Arun Fu, Akasha Zhu, Jialin Li

    Abstract: The lack of centralized control, combined with highly dynamic adversarial behaviors, makes data durability a challenge in decentralized storage systems. In this work, we introduce a new storage system, Vault, that offers strong data durability guarantees in a fully decentralized, permission-less setting. Vault leverages the rateless property of erasure code to encode each data object into an infin… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  7. arXiv:2310.08373  [pdf, other

    cs.DC

    Chrono: A Peer-to-Peer Network with Verifiable Causality

    Authors: Michael Hu Yiqing, Guangda Sun, Arun Fu, Akasha Zhu, Jialin Li

    Abstract: Logical clocks are a fundamental tool to establish causal ordering of events in a distributed system. They have been used as the building block in weakly consistent storage systems, causally ordered broadcast, distributed snapshots, deadlock detection, and distributed system debugging. However, prior logical clock constructs fail to work in a permissionless setting with Byzantine participants. In… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  8. arXiv:2310.00542  [pdf, other

    cs.CR cs.LG

    Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense

    Authors: Hua Ma, Shang Wang, Yansong Gao, Zhi Zhang, Huming Qiu, Minhui Xue, Alsharif Abuadbba, Anmin Fu, Surya Nepal, Derek Abbott

    Abstract: All current backdoor attacks on deep learning (DL) models fall under the category of a vertical class backdoor (VCB) -- class-dependent. In VCB attacks, any sample from a class activates the implanted backdoor when the secret trigger is present. Existing defense strategies overwhelmingly focus on countering VCB attacks, especially those that are source-class-agnostic. This narrow focus neglects th… ▽ More

    Submitted 18 June, 2024; v1 submitted 30 September, 2023; originally announced October 2023.

    Comments: To Appear in the 31st ACM Conference on Computer and Communications Security, October 14-18, 2024

  9. arXiv:2309.11894  [pdf, other

    cs.CR

    DeepTheft: Stealing DNN Model Architectures through Power Side Channel

    Authors: Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal

    Abstract: Deep Neural Network (DNN) models are often deployed in resource-sharing clouds as Machine Learning as a Service (MLaaS) to provide inference services.To steal model architectures that are of valuable intellectual properties, a class of attacks has been proposed via different side-channel leakage, posing a serious security challenge to MLaaS. Also targeting MLaaS, we propose a new end-to-end atta… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: To Appear in the 45th IEEE Symposium on Security and Privacy, May 20-23, 2024

  10. arXiv:2309.00257  [pdf, other

    cs.LG cs.AI

    Leveraging Learning Metrics for Improved Federated Learning

    Authors: Andre Fu

    Abstract: Currently in the federated setting, no learning schemes leverage the emerging research of explainable artificial intelligence (XAI) in particular the novel learning metrics that help determine how well a model is learning. One of these novel learning metrics is termed `Effective Rank' (ER) which measures the Shannon Entropy of the singular values of a matrix, thus enabling a metric determining how… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

    Comments: Bachelor's thesis

  11. arXiv:2307.14936  [pdf, other

    cs.CL cs.AI cs.LG cs.PL cs.SE

    PanGu-Coder2: Boosting Large Language Models for Code with Ranking Feedback

    Authors: Bo Shen, Jiaxin Zhang, Taihong Chen, Daoguang Zan, Bing Geng, An Fu, Muhan Zeng, Ailun Yu, Jichuan Ji, Jingyang Zhao, Yuenan Guo, Qianxiang Wang

    Abstract: Large Language Models for Code (Code LLM) are flourishing. New and powerful models are released on a weekly basis, demonstrating remarkable performance on the code generation task. Various approaches have been proposed to boost the code generation performance of pre-trained Code LLMs, such as supervised fine-tuning, instruction tuning, reinforcement learning, etc. In this paper, we propose a novel… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

    Comments: Preprint

  12. arXiv:2304.14568  [pdf, other

    physics.med-ph cs.DC math.OC

    Distributed and Scalable Optimization for Robust Proton Treatment Planning

    Authors: Anqi Fu, Vicki T. Taasti, Masoud Zarepisheh

    Abstract: Purpose: The importance of robust proton treatment planning to mitigate the impact of uncertainty is well understood. However, its computational cost grows with the number of uncertainty scenarios, prolonging the treatment planning process. We developed a fast and scalable distributed optimization platform that parallelizes this computation over the scenarios. Methods: We modeled the robust proton… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: 20 pages, 6 figures

    Journal ref: Medical Physics, 50(1): 633-642, 2023

  13. arXiv:2303.12050  [pdf, other

    cs.CV

    CurveCloudNet: Processing Point Clouds with 1D Structure

    Authors: Colton Stearns, Davis Rempe, Jiateng Liu, Alex Fu, Sebastien Mascha, Jeong Joon Park, Despoina Paschalidou, Leonidas J. Guibas

    Abstract: Modern depth sensors such as LiDAR operate by sweeping laser-beams across the scene, resulting in a point cloud with notable 1D curve-like structures. In this work, we introduce a new point cloud processing scheme and backbone, called CurveCloudNet, which takes advantage of the curve-like structure inherent to these sensors. While existing backbones discard the rich 1D traversal patterns and rely… ▽ More

    Submitted 1 February, 2024; v1 submitted 21 March, 2023; originally announced March 2023.

  14. arXiv:2303.02272  [pdf

    cs.RO cs.AI cs.LG

    Real-time SLAM Pipeline in Dynamics Environment

    Authors: Alex Fu, Lingjie Kong

    Abstract: Inspired by the recent success of application of dense data approach by using ORB-SLAM and RGB-D SLAM, we propose a better pipeline of real-time SLAM in dynamics environment. Different from previous SLAM which can only handle static scenes, we are presenting a solution which use RGB-D SLAM as well as YOLO real-time object detection to segment and remove dynamic scene and then construct static scen… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  15. arXiv:2302.01550  [pdf, other

    cs.LG

    Vertical Federated Learning: Taxonomies, Threats, and Prospects

    Authors: Qun Li, Chandra Thapa, Lawrence Ong, Yifeng Zheng, Hua Ma, Seyit A. Camtepe, Anmin Fu, Yansong Gao

    Abstract: Federated learning (FL) is the most popular distributed machine learning technique. FL allows machine-learning models to be trained without acquiring raw data to a single point for processing. Instead, local models are trained with local data; the models are then shared and combined. This approach preserves data privacy as locally trained models are shared instead of the raw data themselves. Broad… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

  16. arXiv:2209.02339  [pdf, other

    cs.CV cs.CR

    TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

    Authors: Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

    Abstract: Object detection is the foundation of various critical computer-vision tasks such as segmentation, object tracking, and event detection. To train an object detector with satisfactory accuracy, a large amount of data is required. However, due to the intensive workforce involved with annotating large datasets, such a data curation task is often outsourced to a third party or relied on volunteers. Th… ▽ More

    Submitted 2 September, 2023; v1 submitted 6 September, 2022; originally announced September 2022.

  17. arXiv:2207.09744  [pdf, other

    cs.CR

    MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants

    Authors: Yansong Gao, Jianrong Yao, Lihui Pang, Wei Yang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott

    Abstract: To improve the modeling resilience of silicon strong physical unclonable functions (PUFs), in particular, the APUFs, that yield a very large number of challenge response pairs (CRPs), a number of composited APUF variants such as XOR-APUF, interpose-PUF (iPUF), feed-forward APUF (FF-APUF),and OAX-APUF have been devised. When examining their security in terms of modeling resilience, utilizing multip… ▽ More

    Submitted 10 January, 2023; v1 submitted 20 July, 2022; originally announced July 2022.

  18. arXiv:2206.00145  [pdf, other

    cs.CR cs.LG

    CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences

    Authors: Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu

    Abstract: As a critical threat to deep neural networks (DNNs), backdoor attacks can be categorized into two types, i.e., source-agnostic backdoor attacks (SABAs) and source-specific backdoor attacks (SSBAs). Compared to traditional SABAs, SSBAs are more advanced in that they have superior stealthier in bypassing mainstream countermeasures that are effective against SABAs. Nonetheless, existing SSBAs suffer… ▽ More

    Submitted 18 December, 2022; v1 submitted 31 May, 2022; originally announced June 2022.

    Comments: 13 pages,14 figures

  19. arXiv:2204.06273  [pdf, other

    cs.CR cs.AI

    Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

    Authors: Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao

    Abstract: Since Deep Learning (DL) backdoor attacks have been revealed as one of the most insidious adversarial attacks, a number of countermeasures have been developed with certain assumptions defined in their respective threat models. However, the robustness of these countermeasures is inadvertently ignored, which can introduce severe consequences, e.g., a countermeasure can be misused and result in a fal… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

  20. Towards Explainable Meta-Learning for DDoS Detection

    Authors: Qianru Zhou, Rongzhen Li, Lei Xu, Arumugam Nallanathan, Jian Yang, Anmin Fu

    Abstract: The Internet is the most complex machine humankind has ever built, and how to defense it from intrusions is even more complex. With the ever increasing of new intrusions, intrusion detection task rely on Artificial Intelligence more and more. Interpretability and transparency of the machine learning model is the foundation of trust in AI-driven intrusion detection results. Current interpretation A… ▽ More

    Submitted 16 August, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

    Journal ref: SN COMPUT. SCI. 5, 115 (2024)

  21. arXiv:2204.01601  [pdf, other

    cs.CR

    Towards Privacy-Preserving and Verifiable Federated Matrix Factorization

    Authors: Xicheng Wan, Yifeng Zheng, Qun Li, Anmin Fu, Mang Su, Yansong Gao

    Abstract: Recent years have witnessed the rapid growth of federated learning (FL), an emerging privacy-aware machine learning paradigm that allows collaborative learning over isolated datasets distributed across multiple participants. The salient feature of FL is that the participants can keep their private datasets local and only share model updates. Very recently, some research efforts have been initiated… ▽ More

    Submitted 11 June, 2022; v1 submitted 4 April, 2022; originally announced April 2022.

    Comments: Accepted by Knowledge-Based Systems

  22. arXiv:2203.15316  [pdf, other

    cs.CR

    Systematically Evaluation of Challenge Obfuscated APUFs

    Authors: Yansong Gao, Jianrong Yao, Lihui Pang, Zhi Zhang, Anmin Fu, Naixue Xiong, Hyoungshick Kim

    Abstract: As a well-known physical unclonable function that can provide huge number of challenge response pairs (CRP) with a compact design and fully compatibility with current electronic fabrication process, the arbiter PUF (APUF) has attracted great attention. To improve its resilience against modeling attacks, many APUF variants have been proposed so far. Though the modeling resilience of response obfusc… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

  23. arXiv:2202.04856  [pdf, other

    cs.LG

    PPA: Preference Profiling Attack Against Federated Learning

    Authors: Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang

    Abstract: Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and thus aims to mitigate data privacy concerns. However, data privacy leakage in FL still exists due to inference attacks, including membership inference, property inference, and data inve… ▽ More

    Submitted 8 August, 2022; v1 submitted 10 February, 2022; originally announced February 2022.

  24. arXiv:2201.08619  [pdf, other

    cs.CV cs.AI cs.CR

    Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

    Authors: Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

    Abstract: Deep learning models have been shown to be vulnerable to recent backdoor attacks. A backdoored model behaves normally for inputs containing no attacker-secretly-chosen trigger and maliciously for inputs with the trigger. To date, backdoor attacks and countermeasures mainly focus on image classification tasks. And most of them are implemented in the digital world with digital triggers. Besides the… ▽ More

    Submitted 29 May, 2022; v1 submitted 21 January, 2022; originally announced January 2022.

  25. arXiv:2111.14062  [pdf, other

    cs.LG cs.CY

    P4AI: Approaching AI Ethics through Principlism

    Authors: Andre Fu, Elisa Ding, Mahdi S. Hosseini, Konstantinos N. Plataniotis

    Abstract: The field of computer vision is rapidly evolving, particularly in the context of new methods of neural architecture design. These models contribute to (1) the Climate Crisis - increased CO2 emissions and (2) the Privacy Crisis - data leakage concerns. To address the often overlooked impact the Computer Vision (CV) community has on these crises, we outline a novel ethical framework, \textit{P4AI}:… ▽ More

    Submitted 28 November, 2021; originally announced November 2021.

    Comments: Human-Centered AI workshop at NeurIPS 2021

  26. arXiv:2111.14059  [pdf, other

    cs.CV cs.CY cs.LG

    NoFADE: Analyzing Diminishing Returns on CO2 Investment

    Authors: Andre Fu, Justin Tran, Andy Xie, Jonathan Spraggett, Elisa Ding, Chang-Won Lee, Kanav Singla, Mahdi S. Hosseini, Konstantinos N. Plataniotis

    Abstract: Climate change continues to be a pressing issue that currently affects society at-large. It is important that we as a society, including the Computer Vision (CV) community take steps to limit our impact on the environment. In this paper, we (a) analyze the effect of diminishing returns on CV methods, and (b) propose a \textit{``NoFADE''}: a novel entropy-based metric to quantify model--dataset--co… ▽ More

    Submitted 28 November, 2021; originally announced November 2021.

    Comments: Climate Change with Machine Learning workshop at 35th Conference on Neural Information Processing Systems (NeurIPS2021-CCAI)

  27. arXiv:2111.11157  [pdf, other

    cs.CR cs.AI cs.LG

    NTD: Non-Transferability Enabled Backdoor Detection

    Authors: Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott

    Abstract: A backdoor deep learning (DL) model behaves normally upon clean inputs but misbehaves upon trigger inputs as the backdoor attacker desires, posing severe consequences to DL model deployments. State-of-the-art defenses are either limited to specific backdoor attacks (source-agnostic attacks) or non-user-friendly in that machine learning (ML) expertise or expensive computing resources are required.… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

  28. arXiv:2110.00909  [pdf, other

    cs.CR

    Design and Evaluate Recomposited OR-AND-XOR-PUF

    Authors: Jianrong Yao, Lihui Pang, Zhi Zhang, Wei Yang, Anmin Fu, Yansong Gao

    Abstract: Physical Unclonable Function (PUF) is a hardware security primitive with a desirable feature of low-cost. Based on the space of challenge-response pairs (CRPs), it has two categories:weak PUF and strong PUF. Though designing a reliable and secure lightweight strong PUF is challenging, there is continuing efforts to fulfill this gap due to wide range of applications enabled by strong PUF. It was pr… ▽ More

    Submitted 25 April, 2022; v1 submitted 2 October, 2021; originally announced October 2021.

  29. arXiv:2108.09187  [pdf, other

    cs.CR cs.AI cs.LG

    Quantization Backdoors to Deep Learning Commercial Frameworks

    Authors: Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Zhang Jiliang, Said Al-Sarawi, Derek Abbott

    Abstract: Currently, there is a burgeoning demand for deploying deep learning (DL) models on ubiquitous edge Internet of Things (IoT) devices attributed to their low latency and high privacy preservation. However, DL models are often large in size and require large-scale computation, which prevents them from being placed directly onto IoT devices, where resources are constrained and 32-bit floating-point (f… ▽ More

    Submitted 27 April, 2023; v1 submitted 20 August, 2021; originally announced August 2021.

  30. arXiv:2108.06822  [pdf, other

    cs.CV cs.LG cs.NE

    CONet: Channel Optimization for Convolutional Neural Networks

    Authors: Mahdi S. Hosseini, Jia Shu Zhang, Zhe Liu, Andre Fu, Jingxuan Su, Mathieu Tuli, Sepehr Hosseini, Arsh Kadakia, Haoran Wang, Konstantinos N. Plataniotis

    Abstract: Neural Architecture Search (NAS) has shifted network design from using human intuition to leveraging search algorithms guided by evaluation metrics. We study channel size optimization in convolutional neural networks (CNN) and identify the role it plays in model accuracy and complexity. Current channel size selection methods are generally limited by discrete sample spaces while suffering from manu… ▽ More

    Submitted 7 April, 2022; v1 submitted 15 August, 2021; originally announced August 2021.

  31. arXiv:2105.03822  [pdf, other

    cs.CR cs.LG

    RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

    Authors: Huming Qiu, Hua Ma, Zhi Zhang, Yifeng Zheng, Anmin Fu, Pan Zhou, Yansong Gao, Derek Abbott, Said F. Al-Sarawi

    Abstract: Though deep neural network models exhibit outstanding performance for various applications, their large model size and extensive floating-point operations render deployment on mobile computing platforms a major challenge, and, in particular, on Internet of Things devices. One appealing solution is model quantization that reduces the model size and uses integer operations commonly supported by micr… ▽ More

    Submitted 2 August, 2022; v1 submitted 8 May, 2021; originally announced May 2021.

  32. arXiv:2105.01286  [pdf, other

    physics.med-ph cs.CE math.OC

    Operator Splitting for Adaptive Radiation Therapy with Nonlinear Health Dynamics

    Authors: Anqi Fu, Lei Xing, Stephen Boyd

    Abstract: We present an optimization-based approach to radiation treatment planning over time. Our approach formulates treatment planning as an optimal control problem with nonlinear patient health dynamics derived from the standard linear-quadratic cell survival model. As the formulation is nonconvex, we propose a method for obtaining an approximate solution by solving a sequence of convex optimization pro… ▽ More

    Submitted 13 May, 2022; v1 submitted 4 May, 2021; originally announced May 2021.

    Comments: 30 pages, 8 figures, 2 tables

    MSC Class: 90C26 (Primary); 90C06; 90C90 (Secondary) ACM Class: G.4; J.2; J.3

  33. arXiv:2104.08702  [pdf, other

    cs.CV

    Reconsidering CO2 emissions from Computer Vision

    Authors: Andre Fu, Mahdi S. Hosseini, Konstantinos N. Plataniotis

    Abstract: Climate change is a pressing issue that is currently affecting and will affect every part of our lives. It's becoming incredibly vital we, as a society, address the climate crisis as a universal effort, including those in the Computer Vision (CV) community. In this work, we analyze the total cost of CO2 emissions by breaking it into (1) the architecture creation cost and (2) the life-time evaluati… ▽ More

    Submitted 18 April, 2021; originally announced April 2021.

    Comments: Accepted for publication in CVPR 2021 Workshop

  34. arXiv:2008.07492  [pdf, other

    eess.SY cs.NI

    Control Communication Co-Design for Wide Area Cyber-Physical Systems

    Authors: Laksh Bhatia, Ivana Tomić, Anqi Fu, Michael Breza, Julie A. McCann

    Abstract: Wide Area Cyber-Physical Systems (WA-CPSs) are a class of control systems that integrate low-powered sensors, heterogeneous actuators and computer controllers into large infrastructure that span multi-kilometre distances. Current wireless communication technologies are incapable of meeting the communication requirements of range and bounded delays needed for the control of WA-CPSs. To solve this p… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: Accepted for publication at ACM Transactions on Cyber-Physical Systems

  35. arXiv:2007.13585  [pdf, other

    cs.CR

    VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT

    Authors: Anmin Fu, Xianglong Zhang, Naixue Xiong, Yansong Gao, Huaqun Wang

    Abstract: Due to the strong analytical ability of big data, deep learning has been widely applied to train the collected data in industrial IoT. However, for privacy issues, traditional data-gathering centralized learning is not applicable to industrial scenarios sensitive to training sets. Recently, federated learning has received widespread attention, since it trains a model by only relying on gradient ag… ▽ More

    Submitted 30 July, 2020; v1 submitted 27 July, 2020; originally announced July 2020.

    Comments: 12 pages, 10 figures

    ACM Class: E.3; I.2.11

  36. arXiv:2007.10760  [pdf, other

    cs.CR cs.CV cs.LG

    Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

    Authors: Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim

    Abstract: This work provides the community with a timely comprehensive review of backdoor attacks and countermeasures on deep learning. According to the attacker's capability and affected stage of the machine learning pipeline, the attack surfaces are recognized to be wide and then formalized into six categorizations: code poisoning, outsourcing, pretrained, data collection, collaborative learning and post-… ▽ More

    Submitted 2 August, 2020; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: 29 pages, 9 figures, 2 tables

  37. arXiv:2003.00395  [pdf, other

    cs.CR cs.DC

    Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review

    Authors: Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian

    Abstract: Fog computing is an emerging computing paradigm that has come into consideration for the deployment of IoT applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the… ▽ More

    Submitted 29 February, 2020; originally announced March 2020.

    Comments: 34 pages, 9 figures

  38. arXiv:2002.00945  [pdf, other

    cs.OH eess.SP eess.SY

    The Separator, a Two-Phase Oil and Water Gravity CPS Separator Testbed

    Authors: Michael Breza, Laksh Bhatia, Ivana Tomic, Anqi Fu, Waqas Ikram, Valentinos Kongezos, Julie A. McCann

    Abstract: Industrial Control Systems (ICS) are evolving with advances in new technology. The addition of wireless sensors and actuators and new control techniques means that engineering practices from communication systems are being integrated into those used for control systems. The two are engineered in very different ways. Neither engineering approach is capable of accounting for the subtle interactions… ▽ More

    Submitted 1 February, 2020; originally announced February 2020.

    Comments: 6 pages, 4 figures

  39. arXiv:1806.01899  [pdf, other

    stat.ML cs.LG

    MRPC: An R package for accurate inference of causal graphs

    Authors: Md. Bahadur Badsha, Evan A Martin, Audrey Qiuyan Fu

    Abstract: We present MRPC, an R package that learns causal graphs with improved accuracy over existing packages, such as pcalg and bnlearn. Our algorithm builds on the powerful PC algorithm, the canonical algorithm in computer science for learning directed acyclic graphs. The improvement in accuracy results from online control of the false discovery rate (FDR) that reduces false positive edges, a more accur… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

  40. arXiv:1606.01340  [pdf, ps, other

    cs.DB cs.DS

    Finding Multiple New Optimal Locations in a Road Network

    Authors: Ruifeng Liu, Ada WaiChee Fu, Zitong Chen, Silu Huang, Yubao Liu

    Abstract: We study the problem of optimal location querying for location based services in road networks, which aims to find locations for new servers or facilities. The existing optimal solutions on this problem consider only the cases with one new server. When two or more new servers are to be set up, the problem with minmax cost criteria, MinMax, becomes NP-hard. In this work we identify some useful prop… ▽ More

    Submitted 13 June, 2016; v1 submitted 4 June, 2016; originally announced June 2016.

  41. arXiv:1403.5381  [pdf, ps, other

    cs.DB

    (α, k)-Minimal Sorting and Skew Join in MPI and MapReduce

    Authors: Silu Huang, Ada Wai-Chee Fu

    Abstract: As computer clusters are found to be highly effective for handling massive datasets, the design of efficient parallel algorithms for such a computing model is of great interest. We consider (α, k)-minimal algorithms for such a purpose, where α is the number of rounds in the algorithm, and k is a bound on the deviation from perfect workload balance. We focus on new (α, k)-minimal algorithms for sor… ▽ More

    Submitted 21 March, 2014; originally announced March 2014.

    Comments: 18 pages

  42. arXiv:1403.0779  [pdf, ps, other

    cs.DB

    Hop Doubling Label Indexing for Point-to-Point Distance Querying on Scale-Free Networks

    Authors: Minhao Jiang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Yanyan Xu

    Abstract: We study the problem of point-to-point distance querying for massive scale-free graphs, which is important for numerous applications. Given a directed or undirected graph, we propose to build an index for answering such queries based on a hop-doubling labeling technique. We derive bounds on the index size, the computation costs and I/O costs based on the properties of unweighted scale-free graphs.… ▽ More

    Submitted 2 May, 2014; v1 submitted 4 March, 2014; originally announced March 2014.

    Comments: 13 pages. More experiments and discussions are added

  43. arXiv:1401.0543  [pdf, other

    cs.IT

    Beyond the Min-Cut Bound: Deterministic Network Coding for Asynchronous Multirate Broadcast

    Authors: Amy Fu, Parastoo Sadeghi, Muriel Medard

    Abstract: In a single hop broadcast packet erasure network, we demonstrate that it is possible to provide multirate packet delivery outside of what is given by the network min-cut. This is achieved by using a deterministic non-block-based network coding scheme, which allows us to sidestep some of the limitations put in place by the block coding model used to determine the network capacity. Under the netwo… ▽ More

    Submitted 2 January, 2014; originally announced January 2014.

  44. arXiv:1211.2367  [pdf, ps, other

    cs.DB

    IS-LABEL: an Independent-Set based Labeling Scheme for Point-to-Point Distance Querying on Large Graphs

    Authors: Ada Wai-Chee Fu, Huanhuan Wu, James Cheng, Shumo Chu, Raymond Chi-Wing Wong

    Abstract: We study the problem of computing shortest path or distance between two query vertices in a graph, which has numerous important applications. Quite a number of indexes have been proposed to answer such distance queries. However, all of these indexes can only process graphs of size barely up to 1 million vertices, which is rather small in view of many of the fast-growing real-world graphs today suc… ▽ More

    Submitted 10 November, 2012; originally announced November 2012.

    Comments: 12 pages

  45. arXiv:1208.3806  [pdf, other

    cs.IT

    Dynamic Rate Adaptation for Improved Throughput and Delay in Wireless Network Coded Broadcast

    Authors: Amy Fu, Parastoo Sadeghi, Muriel Medard

    Abstract: In this paper we provide theoretical and simulation-based study of the delivery delay performance of a number of existing throughput optimal coding schemes and use the results to design a new dynamic rate adaptation scheme that achieves improved overall throughput-delay performance. Under a baseline rate control scheme, the receivers' delay performance is examined. Based on their Markov states,… ▽ More

    Submitted 28 September, 2013; v1 submitted 19 August, 2012; originally announced August 2012.

    Comments: 14 pages, 15 figures

  46. arXiv:1202.3686  [pdf, other

    cs.DB

    Inferential or Differential: Privacy Laws Dictate

    Authors: Ke Wang, Peng Wang, Ada Waichee Fu, Raywong Chi-Wing Wong

    Abstract: So far, privacy models follow two paradigms. The first paradigm, termed inferential privacy in this paper, focuses on the risk due to statistical inference of sensitive information about a target record from other records in the database. The second paradigm, known as differential privacy, focuses on the risk to an individual when included in, versus when not included in, the database. The contrib… ▽ More

    Submitted 16 February, 2012; originally announced February 2012.

    Comments: 13 pages and 7 figures

  47. arXiv:1202.3253  [pdf, ps, other

    cs.DB

    Small Count Privacy and Large Count Utility in Data Publishing

    Authors: Ada Wai-Chee Fu, Jia Wang, Ke Wang, Raymond Chi-Wing Wong

    Abstract: While the introduction of differential privacy has been a major breakthrough in the study of privacy preserving data publication, some recent work has pointed out a number of cases where it is not possible to limit inference about individuals. The dilemma that is intrinsic in the problem is the simultaneous requirement of data utility in the published data. Differential privacy does not aim to pro… ▽ More

    Submitted 15 February, 2012; originally announced February 2012.

    Comments: 12 pages, 12 figures

  48. arXiv:1202.3179  [pdf, ps, other

    cs.DB

    Randomization Resilient To Sensitive Reconstruction

    Authors: Ke Wang, Chao Han, Ada Waichee Fu

    Abstract: With the randomization approach, sensitive data items of records are randomized to protect privacy of individuals while allowing the distribution information to be reconstructed for data analysis. In this paper, we distinguish between reconstruction that has potential privacy risk, called micro reconstruction, and reconstruction that does not, called aggregate reconstruction. We show that the form… ▽ More

    Submitted 14 February, 2012; originally announced February 2012.

    Comments: 12 pages, 5 figures

    ACM Class: H.2.8

  49. arXiv:0909.1127  [pdf, ps, other

    cs.DB cs.CR

    Anonymization with Worst-Case Distribution-Based Background Knowledge

    Authors: Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu

    Abstract: Background knowledge is an important factor in privacy preserving data publishing. Distribution-based background knowledge is one of the well studied background knowledge. However, to the best of our knowledge, there is no existing work considering the distribution-based background knowledge in the worst case scenario, by which we mean that the adversary has accurate knowledge about the distribu… ▽ More

    Submitted 6 September, 2009; originally announced September 2009.

  50. arXiv:0905.1755  [pdf, ps, other

    cs.DB

    Can the Utility of Anonymized Data be used for Privacy Breaches?

    Authors: Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu

    Abstract: Group based anonymization is the most widely studied approach for privacy preserving data publishing. This includes k-anonymity, l-diversity, and t-closeness, to name a few. The goal of this paper is to raise a fundamental issue on the privacy exposure of the current group based approach. This has been overlooked in the past. The group based anonymization approach basically hides each individual… ▽ More

    Submitted 11 May, 2009; originally announced May 2009.

    Comments: 11 pages