Workshops
AidTSP Technical Session I
RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in The Literature
Mohiuddin Ahmed; Clark Pagutaisidro; Apichart Alexander Pike; Yuting Yang; Al-Sakib Khan Pathan
Speaker Mohiuddin Ahmed (Edith Cowan University)
Dr. Mohiuddin Ahmed has been educating the next generation of cyber leaders and researching to disrupt the cybercrime ecosystem. His research is focused on ensuring national security and safeguarding critical infrastructures from cyber terrorists. Mohiuddin has edited several books and contributed articles to The Conversation. His research publications in reputed venues attracted more than 3200 citations and have been listed in the world's top 2% of scientists for the 2020-2022 citation impact. Mohiuddin secured several external and internal grants worth more than $1.5 Million and has been collaborating with academia and industry. He has been regularly invited to speak at international conferences and public organizations and interviewed by the media for expert opinion.
Scenario-Agnostic Zero-Trust Defense with Explainable Threshold Policy: A Meta-Learning Approach
Yunfei Ge; Tao Li; Quanyan Zhu
Speaker Yunfei Ge (New York University)
Yunfei Ge received B.S. degree in Honors in Optoelectronics from Sun Yat-Sen University, Guangzhou, China in 2017, and M.S degree in Electrical Engineering from Columbia University, New York, NY, USA, in 2019. She is currently pursuing Ph.D. degree in Electrical Engineering at New York University, New York, NY, USA. Her current research interests include game theory, multi-agent decision-making, cybersecurity, and cyber-physical systems.
Blockchain topology optimization based on node clustering
Peiyun Ran; Yipeng Ji; Mingsheng Liu; Peng Zhao; Shiyuan Yu; Yongjian Huang; Du Wang; Md Zakirul Alam Bhuiyan; Gang Li
Speaker Peiyun Ran
I'm a student study in School of Cyberspace Security of Beihang University.
Robust Federated Learning against Backdoor Attackers
Priyesh Ranjan; Ashish Gupta; Federico CorÚ; Sajal K. Das
Speaker Priyesh Ranjan (University of Science and Technology Missouri)
Session Chair
Junggab Son (University of Nevada, USA)
AidTSP Technical Session II
Intrusion Detection System for IoHT Devices using Federated Learning
Fatemeh Mosaiyebzadeh; Seyedamin Pouriyeh; Reza M. Parizi; Meng Han; Daniel M. Batista
Speaker Fatemeh Mosaiyebzadeh (São Paulo University)
Fatemeh Mosaiyebzadeh received a Master's degree in Computer Science from the University of São Paulo, Brazil, in 2020. She is currently a Ph.D. student in Computer Science at the University of São Paulo, Brazil. Her current Ph.D. research focuses on the improvement of Intrusion Detection Systems (IDSs) in the Internet of Healthcare Things (IoHT) devices with Deep Learning and Federated Learning techniques.
Towards Trust Driven On-Demand Client Deployment in Federated Learning
Mario Bassam Chahoud; Azzam Mourad; Hadi Otrok; Mohsen Guizani
The simulations utilize the mobile data challenge dataset. In each round, clients with high trustworthiness are selected. The simulations are compared with the default random selection method, and the centralized model. The suggested architecture is able to detect these clients while decreasing the number of normal and discarded rounds by assigning trust values to each client, updating this factor, and crediting malicious clients with a low trust factor.
Speaker mario chahoud (Mohamad Bin Zayed University of Artificial Intelligence, United Arab Emirates)
Mario Chahoud received his M.Sc. degree and B.S. degree in Computer Science from the Lebanese American University (LAU) in 2022 and 2020 respectively. He is currently a Research Fellow at the LAU Cyber Security Systems and Applied Artificial Intelligence Research Center and at Mohamad Bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, United Arab Emirates. He was a Research and Teaching Assistant at the Lebanese American University. His current research interests include fog and cloud computing, Artificial intelligence, Machine learning, Federated Learning, and Cyber Security.
Anonymous Authentication Scheme for Federated Learning
Tianqi Zhou; Jian Shen; P Vijayakumar; Md Zakirul Alam Bhuiyan; S Audithan
Speaker Tianqi Zhou (Zhejiang Sci-Tech University)
Tianqi Zhou received her B.S. and M.S. from the Nanjing University of Information Science and Technology, Nanjing, China in 2016 and 2019, respectively. She is currently working toward the Ph.D. degree in the School of Computer and Software, Nanjing University of Information Science and Technology. Also, she is currently a visiting Ph.D. student at Kyushu University, which is supported by the China Scholarship Council under Grant No. 202109040028. Her research interests include computer and network security, security systems, and cryptography.
Privacy Preservation in Kubernetes-based Federated Learning: A Networking Approach
Juan M. Parra; Luis Felix Gonzalez Blazquez; Anderson Bravalheri; Rasheed Hussain; Xenofon Vasilakos; Ivan Vidal; Francisco Valera; Reza Nejabati; Dimitra Simeonidou
Nonetheless, K8s can violate fundamental FL privacy principles, e.g., the inherent flat networking approach in K8s can potentially allow FL clients to access other client or domain resources. The latter poses an open research problem and gap in the literature because serious privacy risks can arise from attackers gaining access to any client in the FL setup.
To address this problem, this paper presents a \emph{networking} approach via \emph{network isolation} at the link layer level, and \emph{authentication} and \emph{data packet encryption} at the network layer level. The former allows the creation of secure resource sharing, and the latter is used to protect in-transit data. For this purpose, we use a K8s networking operator and a secure network protocol suite.
The above combination facilitates on-demand link-layer connectivity, per-link data source authentication, and confidentiality between FL actors. We tested our approach on a network testbed composed of different geo-located nodes where FL clients are deployed. Our promising results showcase the feasibility of the approach for privacy preservation at the network level in K8s-based FL.
Speaker Juan Marcelo Parra
Session Chair
Changqing Luo (Virginia Commonwealth University, USA)
AidTSP Technical Session III
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination
Muhammad Akbar Husnoo; Adnan Anwar; Haftu Tasew Reda; Nasser Hosseinzadeh; Shama N. Islam; Abdun Mahmood; Robin Doss
Speaker Muhammad Akbar Husnoo
Muhammad Akbar Husnoo is currently a Ph.D. scholar at Deakin University. He received his dual B.Sc. (Hons) in Software Engineering from both Staffordshire University, UK and Asia Pacific University of Technology & Innovation, Malaysia in 2019. He also recently completed a Master of Data Science at Deakin University, Burwood, VIC, Australia in 2021. He has participated in several hackathons and is the ’Champion Winner’ of the SAS Malaysia FinTech Competition 2017–2018. Furthermore, he has been awarded ’The University Prize for Best Project of the B.Sc. (Hons) in Software Engineering Award 2018/2019’ for his honors thesis. Moreover, he was awarded the Deakin International Meritorious Scholarship for his masters degree, the CSRI 2020 Summer Scholarship and a full Deakin University Postgraduate Research Scholarship to pursue his doctorate. His research interests include privacy preservation, adversarial learning, deep learning, machine learning and other related topics.
Trustworthy and Load-Balancing Routing Scheme for Satellite Services with Multi-Agent DRL
Jiaxin Song; Ying Ju; Lei Liu; Qingqi Pei; Celimuge Wu; Mian Ahmad Jan; Shahid Mumtaz
Speaker Jiaxin Song
Jiaxin Song received a B.S. degree in Electronic information engineering from Nanjing University of Science and Technology, Nanjing, China, in 2020. He is working toward an M.S. in Information and Communication Engineering at the School of Communication Engineering, Xidian University, Xi'an, China. His research interests include satellite communication, routing, and deep reinforcement learning.
Avoid attacks: A Federated Data Sanitization Defense in IoMT Systems
Chong Chen; Ying Gao; Siquan Huang; Xingfu Yan
To solve this unsupervised problem, this paper finds a robust data filtering method for various data poisoning attacks.
First, we adapt the federated learning framework to project all of the clients' data features into the public subspace domain, allowing unified feature mapping to be established while their data remains stored locally.
Then we adopt the federated clustering to re-group their features to clarify the poisoned data.
The federated clustering is based on the consistent association of data and its semantics.
Finally, we do the data sanitization with a simple yet efficient strategy.
Extensive experiments are conducted to evaluate the accuracy and efficacy of the proposed defense method against data poisoning attacks.
Speaker Chong Chen(South China University of Technology)
Achieving Certified Robustness for Brain-Inspired Low-Dimensional Computing Classifiers
Fangfang Yang; Shijin Duan; Xiaolin Xu; Shaolei Ren
but also gets rid of the ultra-high dimension in them. However, the security part of LDC model to adversarial perturbations has not been touched. In this paper, we adopt the bounding technique, interval bound propagation (IBP), to train a LDC classification model that is provably robust against L? normbounded adversarial attacks. Specifically, we propagate the L? norm-bounded bounding box around the original input through layers of LDC model using interval arithmetic. After propagation,
the worst case prediction logits can be computed based on the upper bound and the lower bound of the output bounding box. By minimizing the loss between the worst case prediction and the true label, the predicted label could be kept invariant over all possible adversarial perturbations within L? norm-bounded ball. We evaluate the algorithm on both MNIST and fashion MNIST datasets. The experiment results corroborate that our trained models with IBP exhibit immunity and robustness against strong project gradient descent (PGD) attacking scheme and memory errors.
Speaker Fangfang Yang (University of California, Riverside)
Session Chair
Md Arafatur Rahman (University of Wolverhampton, UK)
AidTSP Technical Session IV
GPS Spoofing on UAV: A Survey
Ryan D Restivo; Laurel C. Dodson; Jian Wang; Wenkai Tan; Yongxin Liu; Huihui H Wang; Houbing H Song
Speaker Houbing Song (University of Maryland, Baltimore County)
Houbing Song (M’12–SM’14-F’23) received the Ph.D. degree in electrical engineering from the University of Virginia, Charlottesville, VA, in August 2012.
He is currently a Tenured Associate Professor, the Director of the NSF Center for Aviation Big Data Analytics (Planning), the Associate Director for Leadership of the DOT Transportation Cybersecurity Center for Advanced Research and Education (Tier 1 Center), and the Director of the Security and Optimization for Networked Globe Laboratory (SONG Lab, www.SONGLab.us), University of Maryland, Baltimore County (UMBC), Baltimore, MD. Prior to joining UMBC, he was a Tenured Associate Professor of Electrical Engineering and Computer Science at Embry-Riddle Aeronautical University, Daytona Beach, FL. He serves as an Associate Editor for IEEE Transactions on Artificial Intelligence (TAI) (2023-present), IEEE Internet of Things Journal (2020-present), IEEE Transactions on Intelligent Transportation Systems (2021-present), and IEEE Journal on Miniaturization for Air and Space Systems (J-MASS) (2020-present). He was an Associate Technical Editor for IEEE Communications Magazine (2017-2020). He is the editor of eight books, the author of more than 100 articles and the inventor of 2 patents. His research interests include cyber-physical systems/internet of things, cybersecurity and privacy, and AI/machine learning/big data analytics. His research has been sponsored by federal agencies (including National Science Foundation, US Department of Transportation, and Federal Aviation Administration, among others) and industry. His research has been featured by popular news media outlets, including IEEE GlobalSpec's Engineering360, Association for Uncrewed Vehicle Systems International (AUVSI), Security Magazine, CXOTech Magazine, Fox News, U.S. News & World Report, The Washington Times, and New Atlas.
Dr. Song is an IEEE Fellow (for contributions to big data analytics and integration of AI with Internet of Things), and an ACM Distinguished Member (for outstanding scientific contributions to computing). He is an ACM Distinguished Speaker (2020-present) and an IEEE Vehicular Technology Society (VTS) Distinguished Lecturer (2023-present). Dr. Song has been a Highly Cited Researcher identified by Clarivate™ (2021, 2022) and a Top 1000 Computer Scientist identified by Research.com. He received Research.com Rising Star of Science Award in 2022 (World Ranking: 82; US Ranking: 16). In addition to 2021 Harry Rowe Mimno Award, Dr. Song was a recipient of 10+ Best Paper Awards from major international conferences, including IEEE CPSCom-2019, IEEE ICII 2019, IEEE/AIAA ICNS 2019, IEEE CBDCom 2020, WASA 2020, AIAA/ IEEE DASC 2021, IEEE GLOBECOM 2021 and IEEE INFOCOM 2022.
A Scalable Asynchronous Federated Learning for Privacy-Preserving Real-Time Surveillance Systems
Desta Haileselassie Hagos; Earl Tankard Jr.; Danda B. Rawat
Speaker Earl Tankard, Jr.
A Two-Tier Anomaly-based Intrusion Detection Approach for IoT-Enabled Smart Cities
Mosab Hamdan; Arwa Mohamed Eldhai; Samah Abdelsalam Abdalla; Kifayat Ullah; Ali Kashif Bashir; Muhammad Nadzir Bin Marsono; Fabio Kon; Daniel M. Batista
Speaker Mosab Hamdan (University of São Paulo)
Mosab Hamdan received a B.Sc. degree in Computer and Electronic System Engineering from the University of Science and Technology (UST), Sudan, in 2010, an M.Sc. degree in Computer Architecture and Networking from the University of Khartoum (UofK), Sudan, in 2014, and the Ph.D. degree in Electrical Engineering (Computer Networks) from the Faculty of Engineering, School of Electrical Engineering, Universiti Teknologi Malaysia (UTM), Malaysia, in 2021. From 2010 to 2015, he was a teaching assistant and lecturer with the Department of Computer and Electronics System Engineering, Faculty of Engineering, University of Science and Technology (UST). From July 2021 to January 2022, he was a Researcher with the Universiti Teknologi Malaysia under the Post-Doctoral Fellowship Scheme. He is currently working as a post-doctoral research fellow at the Institute of Mathematics and Statistics, University of São Paulo (USP). His current research interests are Computer Networks, Network Security, Software-Defined Networking (SDN), Internet-of-things (IoT), Smart Cities, and Future Networks.
Infrastructure Security Intrusion Detection with UAV and Wi-Fi Integrated IoT Networks
Fang Qi; Yingkai Zhao; Shaobo Zhang; Zhe Tang
Speaker Yingkai Zhao(Central South University)
He is a doctoral candidate at Central South University. His research interests include Internet of Things, network security, wireless sensing, etc.
Session Chair
Zakirul Alam Bhuiyan (Fordham University, USA)
Gold Sponsor
Gold Sponsor
Bronze Sponsor
Student Travel Grants
Student Travel Grants
Local Organizer
Gold Sponsor
Gold Sponsor
Bronze Sponsor
Student Travel Grants
Student Travel Grants
Local Organizer
Made with in Toronto · Privacy Policy · INFOCOM 2020 · INFOCOM 2021 · INFOCOM 2022 · © 2023 Duetone Corp.