Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Hossen, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.00718  [pdf, other

    cs.CL cs.AI

    Can't say cant? Measuring and Reasoning of Dark Jargons in Large Language Models

    Authors: Xu Ji, Jianyi Zhang, Ziyin Zhou, Zhangchi Zhao, Qianqian Qiao, Kaiying Han, Md Imran Hossen, Xiali Hei

    Abstract: Ensuring the resilience of Large Language Models (LLMs) against malicious exploitation is paramount, with recent focus on mitigating offensive responses. Yet, the understanding of cant or dark jargon remains unexplored. This paper introduces a domain-specific Cant dataset and CantCounter evaluation framework, employing Fine-Tuning, Co-Tuning, Data-Diffusion, and Data-Analysis stages. Experiments r… ▽ More

    Submitted 25 April, 2024; originally announced May 2024.

  2. arXiv:2405.00025  [pdf, other

    cs.CV cs.LG

    Leveraging Pre-trained CNNs for Efficient Feature Extraction in Rice Leaf Disease Classification

    Authors: Md. Shohanur Islam Sobuj, Md. Imran Hossen, Md. Foysal Mahmud, Mahbub Ul Islam Khan

    Abstract: Rice disease classification is a critical task in agricultural research, and in this study, we rigorously evaluate the impact of integrating feature extraction methodologies within pre-trained convolutional neural networks (CNNs). Initial investigations into baseline models, devoid of feature extraction, revealed commendable performance with ResNet-50 and ResNet-101 achieving accuracies of 91% and… ▽ More

    Submitted 26 February, 2024; originally announced May 2024.

  3. arXiv:2404.18567  [pdf, other

    cs.CR

    Assessing Cybersecurity Vulnerabilities in Code Large Language Models

    Authors: Md Imran Hossen, Jianyi Zhang, Yinzhi Cao, Xiali Hei

    Abstract: Instruction-tuned Code Large Language Models (Code LLMs) are increasingly utilized as AI coding assistants and integrated into various applications. However, the cybersecurity vulnerabilities and implications arising from the widespread integration of these models are not yet fully understood due to limited research in this domain. To bridge this gap, this paper presents EvilInstructCoder, a frame… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  4. arXiv:2401.00973  [pdf, other

    cs.LG cs.CR

    Facebook Report on Privacy of fNIRS data

    Authors: Md Imran Hossen, Sai Venkatesh Chilukoti, Liqun Shan, Vijay Srinivas Tida, Xiali Hei

    Abstract: The primary goal of this project is to develop privacy-preserving machine learning model training techniques for fNIRS data. This project will build a local model in a centralized setting with both differential privacy (DP) and certified robustness. It will also explore collaborative federated learning to train a shared model between multiple clients without sharing local fNIRS datasets. To preven… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

    Comments: 15 pages, 5 figures, 3 tables

    MSC Class: I.2.0

  5. arXiv:2312.02400  [pdf, other

    cs.LG cs.CR

    Auto DP-SGD: Dual Improvements of Privacy and Accuracy via Automatic Clipping Threshold and Noise Multiplier Estimation

    Authors: Sai Venkatesh Chilukoti, Md Imran Hossen, Liqun Shan, Vijay Srinivas Tida, Xiai Hei

    Abstract: DP-SGD has emerged as a popular method to protect personally identifiable information in deep learning applications. Unfortunately, DP-SGD's per-sample gradient clipping and uniform noise addition during training can significantly degrade model utility. To enhance the model's utility, researchers proposed various adaptive DP-SGD methods. However, we examine and discover that these techniques resul… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: 25 pages single column, 2 figures

    MSC Class: 26; 40

  6. Device Modeling Bias in ReRAM-based Neural Network Simulations

    Authors: Osama Yousuf, Imtiaz Hossen, Matthew W. Daniels, Martin Lueker-Boden, Andrew Dienstfrey, Gina C. Adam

    Abstract: Data-driven modeling approaches such as jump tables are promising techniques to model populations of resistive random-access memory (ReRAM) or other emerging memory devices for hardware neural network simulations. As these tables rely on data interpolation, this work explores the open questions about their fidelity in relation to the stochastic device behavior they model. We study how various jump… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

  7. arXiv:2203.02735  [pdf, other

    cs.CR cs.SD eess.AS

    aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA

    Authors: Md Imran Hossen, Xiali Hei

    Abstract: CAPTCHAs are designed to prevent malicious bot programs from abusing websites. Most online service providers deploy audio CAPTCHAs as an alternative to text and image CAPTCHAs for visually impaired users. However, prior research investigating the security of audio CAPTCHAs found them highly vulnerable to automated attacks using Automatic Speech Recognition (ASR) systems. To improve the robustness… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: Accepted at 7th IEEE European Symposium on Security and Privacy (EuroS&P 2022)

  8. arXiv:2108.06862  [pdf

    cs.LG cs.CR

    Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling

    Authors: Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed, Mohammad Masudur Rahman, Xiali, Hei

    Abstract: Due to the variety of cyber-attacks or threats, the cybersecurity community enhances the traditional security control mechanisms to an advanced level so that automated tools can encounter potential security threats. Very recently, Cyber Threat Intelligence (CTI) has been presented as one of the proactive and robust mechanisms because of its automated cybersecurity threat prediction. Generally, CTI… ▽ More

    Submitted 14 November, 2022; v1 submitted 15 August, 2021; originally announced August 2021.

  9. A Low-Cost Attack against the hCaptcha System

    Authors: Md Imran Hossen, Xiali Hei

    Abstract: CAPTCHAs are a defense mechanism to prevent malicious bot programs from abusing websites on the Internet. hCaptcha is a relatively new but emerging image CAPTCHA service. This paper presents an automated system that can break hCaptcha challenges with a high success rate. We evaluate our system against 270 hCaptcha challenges from live websites and demonstrate that it can solve them with 95.93% acc… ▽ More

    Submitted 10 April, 2021; originally announced April 2021.

    Comments: To appear in the 15th IEEE Workshop on Offensive Technologies (WOOT 2021)

  10. arXiv:2104.03366  [pdf, other

    cs.CR cs.CV

    An Object Detection based Solver for Google's Image reCAPTCHA v2

    Authors: Md Imran Hossen, Yazhou Tu, Md Fazle Rabby, Md Nazmul Islam, Hui Cao, Xiali Hei

    Abstract: Previous work showed that reCAPTCHA v2's image challenges could be solved by automated programs armed with Deep Neural Network (DNN) image classifiers and vision APIs provided by off-the-shelf image recognition services. In response to emerging threats, Google has made significant updates to its image reCAPTCHA v2 challenges that can render the prior approaches ineffective to a great extent. In th… ▽ More

    Submitted 7 April, 2021; originally announced April 2021.

    Comments: Accepted at the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)

  11. arXiv:2103.06400  [pdf, other

    cs.CR

    A Survey on Limitation, Security and Privacy Issues on Additive Manufacturing

    Authors: Md Nazmul Islam, Yazhou Tu, Md Imran Hossen, Shengmin Guo, Xiali Hei

    Abstract: Additive manufacturing (AM) is growing as fast as anyone can imagine, and it is now a multi-billion-dollar industry. AM becomes popular in a variety of sectors, such as automotive, aerospace, biomedical, and pharmaceutical, for producing parts/ components/ subsystems. However, current AM technologies can face vast risks of security issues and privacy loss. For the security of AM process, many rese… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 10 Pages

  12. arXiv:2101.06850  [pdf, other

    cs.LG cs.AI

    Stacked LSTM Based Deep Recurrent Neural Network with Kalman Smoothing for Blood Glucose Prediction

    Authors: Md Fazle Rabby, Yazhou Tu, Md Imran Hossen, Insup Le, Anthony S Maida, Xiali Hei

    Abstract: Blood glucose (BG) management is crucial for type-1 diabetes patients resulting in the necessity of reliable artificial pancreas or insulin infusion systems. In recent years, deep learning techniques have been utilized for a more accurate BG level prediction system. However, continuous glucose monitoring (CGM) readings are susceptible to sensor errors. As a result, inaccurate CGM readings would af… ▽ More

    Submitted 17 January, 2021; originally announced January 2021.