Skip to main content

Showing 1–27 of 27 results for author: Mi, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10610  [pdf, other

    cs.CR

    Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies

    Authors: Ronghong Huang, Dongfang Zhao, Xianghang Mi, Xiaofeng Wang

    Abstract: Emerging in recent years, residential proxies (RESIPs) feature multiple unique characteristics when compared with traditional network proxies (e.g., commercial VPNs), particularly, the deployment in residential networks rather than data center networks, the worldwide distribution in tens of thousands of cities and ISPs, and the large scale of millions of exit nodes. All these factors allow RESIP u… ▽ More

    Submitted 30 April, 2024; v1 submitted 16 April, 2024; originally announced April 2024.

  2. arXiv:2404.09681  [pdf, other

    cs.CR

    An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks

    Authors: Yu Bi, Mingshuo Yang, Yong Fang, Xianghang Mi, Shanqing Guo, Shujun Tang, Haixin Duan

    Abstract: Emerging in recent years, open edge computing platforms (OECPs) claim large-scale edge nodes, the extensive usage and adoption, as well as the openness to any third parties to join as edge nodes. For instance, OneThingCloud, a major OECP operated in China, advertises 5 million edge nodes, 70TB bandwidth, and 1,500PB storage. However, little information is publicly available for such OECPs with reg… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  3. arXiv:2404.09481  [pdf, other

    cs.CR cs.LG

    SpamDam: Towards Privacy-Preserving and Adversary-Resistant SMS Spam Detection

    Authors: Yekai Li, Rufan Zhang, Wenxin Rong, Xianghang Mi

    Abstract: In this study, we introduce SpamDam, a SMS spam detection framework designed to overcome key challenges in detecting and understanding SMS spam, such as the lack of public SMS spam datasets, increasing privacy concerns of collecting SMS data, and the need for adversary-resistant detection models. SpamDam comprises four innovative modules: an SMS spam radar that identifies spam messages from online… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  4. arXiv:2404.07797  [pdf, other

    cs.CR cs.SI

    Illicit Promotion on Twitter

    Authors: Hongyu Wang, Ying Li, Ronghong Huang, Xianghang Mi

    Abstract: In this paper, we present an extensive study of the promotion of illicit goods and services on Twitter, a popular online social network(OSN). This study is made possible through the design and implementation of multiple novel tools for detecting and analyzing illicit promotion activities as well as their underlying campaigns. As the results, we observe that illicit promotion is prevalent on Twitte… ▽ More

    Submitted 3 June, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

  5. arXiv:2404.05320  [pdf, other

    cs.CR

    Reflected Search Poisoning for Illicit Promotion

    Authors: Sangyi Wu, Jialong Xue, Shaoxuan Zhou, Xianghang Mi

    Abstract: As an emerging black hat search engine optimization (SEO) technique, reflected search poisoning (RSP) allows a miscreant to free-ride the reputation of high-ranking websites, poisoning search engines with illicit promotion texts (IPTs) in an efficient and stealthy manner, while avoiding the burden of continuous website compromise as required by traditional promotion infections. However, little is… ▽ More

    Submitted 11 April, 2024; v1 submitted 8 April, 2024; originally announced April 2024.

  6. arXiv:2404.05130  [pdf, other

    cs.CR

    Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning

    Authors: Yu Bi, Yekai Li, Xuan Feng, Xianghang Mi

    Abstract: Despite achieving good performance and wide adoption, machine learning based security detection models (e.g., malware classifiers) are subject to concept drift and evasive evolution of attackers, which renders up-to-date threat data as a necessity. However, due to enforcement of various privacy protection regulations (e.g., GDPR), it is becoming increasingly challenging or even prohibitive for sec… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

  7. arXiv:2403.20231  [pdf, other

    cs.CV

    U-VAP: User-specified Visual Appearance Personalization via Decoupled Self Augmentation

    Authors: You Wu, Kean Liu, Xiaoyue Mi, Fan Tang, Juan Cao, Jintao Li

    Abstract: Concept personalization methods enable large text-to-image models to learn specific subjects (e.g., objects/poses/3D models) and synthesize renditions in new contexts. Given that the image references are highly biased towards visual attributes, state-of-the-art personalization models tend to overfit the whole subject and cannot disentangle visual characteristics in pixel space. In this study, we p… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Comments: 14 pages, 13 figures, 2 tables

  8. arXiv:2403.16060  [pdf

    cs.CR

    Port Forwarding Services Are Forwarding Security Risks

    Authors: Haoyuan Wang, Yue Xue, Xuan Feng, Chao Zhou, Xianghang Mi

    Abstract: We conduct the first comprehensive security study on representative port forwarding services (PFS), which emerge in recent years and make the web services deployed in internal networks available on the Internet along with better usability but less complexity compared to traditional techniques (e.g., NAT traversal techniques). Our study is made possible through a set of novel methodologies, which a… ▽ More

    Submitted 9 April, 2024; v1 submitted 24 March, 2024; originally announced March 2024.

  9. arXiv:2402.13607  [pdf, other

    cs.CV cs.CL

    CODIS: Benchmarking Context-Dependent Visual Comprehension for Multimodal Large Language Models

    Authors: Fuwen Luo, Chi Chen, Zihao Wan, Zhaolu Kang, Qidong Yan, Yingjie Li, Xiaolong Wang, Siyu Wang, Ziyue Wang, Xiaoyue Mi, Peng Li, Ning Ma, Maosong Sun, Yang Liu

    Abstract: Multimodal large language models (MLLMs) have demonstrated promising results in a variety of tasks that combine vision and language. As these models become more integral to research and applications, conducting comprehensive evaluations of their capabilities has grown increasingly important. However, most existing benchmarks fail to consider that, in certain situations, images need to be interpret… ▽ More

    Submitted 4 June, 2024; v1 submitted 21 February, 2024; originally announced February 2024.

  10. arXiv:2311.17608  [pdf, other

    cs.CV cs.LG

    Adversarial Robust Memory-Based Continual Learner

    Authors: Xiaoyue Mi, Fan Tang, Zonghan Yang, Danding Wang, Juan Cao, Peng Li, Yang Liu

    Abstract: Despite the remarkable advances that have been made in continual learning, the adversarial vulnerability of such methods has not been fully discussed. We delve into the adversarial robustness of memory-based continual learning algorithms and observe limited robustness improvement by directly applying adversarial training techniques. Preliminary studies reveal the twin challenges for building adver… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  11. arXiv:2311.17607  [pdf, other

    cs.CV cs.LG

    Topology-Preserving Adversarial Training

    Authors: Xiaoyue Mi, Fan Tang, Yepeng Weng, Danding Wang, Juan Cao, Sheng Tang, Peng Li, Yang Liu

    Abstract: Despite the effectiveness in improving the robustness of neural networks, adversarial training has suffered from the natural accuracy degradation problem, i.e., accuracy on natural samples has reduced significantly. In this study, we reveal that natural accuracy degradation is highly related to the disruption of the natural sample topology in the representation space by quantitative and qualitativ… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  12. arXiv:2308.13437  [pdf, other

    cs.CV

    Position-Enhanced Visual Instruction Tuning for Multimodal Large Language Models

    Authors: Chi Chen, Ruoyu Qin, Fuwen Luo, Xiaoyue Mi, Peng Li, Maosong Sun, Yang Liu

    Abstract: Recently, Multimodal Large Language Models (MLLMs) that enable Large Language Models (LLMs) to interpret images through visual instruction tuning have achieved significant success. However, existing visual instruction tuning methods only utilize image-language instruction data to align the language and image modalities, lacking a more fine-grained cross-modal alignment. In this paper, we propose P… ▽ More

    Submitted 14 September, 2023; v1 submitted 25 August, 2023; originally announced August 2023.

  13. IS2N: Intent-Driven Security Software-Defined Network with Blockchain

    Authors: Yanbo Song, Tao Feng, Chungang Yang, Xinru Mi, Shanqing Jiang, Mohsen Guizani

    Abstract: Software-defined network (SDN) is characterized by its programmability, flexibility, and the separation of control and data planes. However, SDN still have many challenges, particularly concerning the security of network information synchronization and network element registration. Blockchain and intent-driven networks are recent technologies to establish secure and intelligent SDN. This article i… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: Published in: IEEE Network ( Early Access )

  14. Full-Life Cycle Intent-Driven Network Verification: Challenges and Approaches

    Authors: Yanbo Song, Chungang Yang, Jiaming Zhang, Xinru Mi, Dusit Niyato

    Abstract: With the human friendly declarative intent policy expression, intent-driven network can make network management and configuration autonomous without human intervention. However, the availability and dependability of these refined policies from the expressed intents should be well ensured by full-life cycle verification. Moreover, intent-driven network verification is still in its initial stage, an… ▽ More

    Submitted 19 December, 2022; originally announced December 2022.

    Comments: 8 pages, 3 figures, magazine

  15. arXiv:2212.02740  [pdf

    cs.CR

    Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming

    Authors: Siyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, XiaoFeng Wang, Yanzhi Dou

    Abstract: As an emerging service for in-browser content delivery, peer-assisted delivery network (PDN) is reported to offload up to 95\% of bandwidth consumption for video streaming, significantly reducing the cost incurred by traditional CDN services. With such benefits, PDN services significantly impact today's video streaming and content delivery model. However, their security implications have never bee… ▽ More

    Submitted 7 December, 2022; v1 submitted 5 December, 2022; originally announced December 2022.

  16. An Extensive Study of Residential Proxies in China

    Authors: Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan

    Abstract: We carry out the first in-depth characterization of residential proxies (RESIPs) in China, for which little is studied in previous works. Our study is made possible through a semantic-based classifier to automatically capture RESIP services. In addition to the classifier, new techniques have also been identified to capture RESIPs without interacting with and relaying traffic through RESIP services… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

    Comments: To appear in ACM CCS 2022

  17. arXiv:2204.01233  [pdf

    cs.CR

    Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam

    Authors: Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen

    Abstract: With its critical role in business and service delivery through mobile devices, SMS (Short Message Service) has long been abused for spamming, which is still on the rise today possibly due to the emergence of A2P bulk messaging. The effort to control SMS spam has been hampered by the lack of up-to-date information about illicit activities. In our research, we proposed a novel solution to collect r… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: CCS 2022

  18. Improving Fake News Detection by Using an Entity-enhanced Framework to Fuse Diverse Multimodal Clues

    Authors: Peng Qi, Juan Cao, Xirong Li, Huan Liu, Qiang Sheng, Xiaoyue Mi, Qin He, Yongbiao Lv, Chenyang Guo, Yingchao Yu

    Abstract: Recently, fake news with text and images have achieved more effective diffusion than text-only fake news, raising a severe issue of multimodal fake news detection. Current studies on this issue have made significant contributions to developing multimodal models, but they are defective in modeling the multimodal content sufficiently. Most of them only preliminarily model the basic semantics of the… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: To appear in MM 2021 industrial track (long paper)

  19. arXiv:2107.03143  [pdf, ps, other

    cs.CV

    Action Units Recognition Using Improved Pairwise Deep Architecture

    Authors: Junya Saito, Xiaoyu Mi, Akiyoshi Uchida, Sachihiro Youoku, Takahisa Yamamoto, Kentaro Murase, Osafumi Nakayama

    Abstract: Facial Action Units (AUs) represent a set of facial muscular activities and various combinations of AUs can represent a wide range of emotions. AU recognition is often used in many applications, including marketing, healthcare, education, and so forth. Although a lot of studies have developed various methods to improve recognition accuracy, it still remains a major challenge for AU recognition. In… ▽ More

    Submitted 8 July, 2021; v1 submitted 7 July, 2021; originally announced July 2021.

  20. arXiv:2107.03009  [pdf, other

    cs.CV

    Multi-modal Affect Analysis using standardized data within subjects in the Wild

    Authors: Sachihiro Youoku, Takahisa Yamamoto, Junya Saito, Akiyoshi Uchida, Xiaoyu Mi, Ziqiang Shi, Liu Liu, Zhongling Liu, Osafumi Nakayama, Kentaro Murase

    Abstract: Human affective recognition is an important factor in human-computer interaction. However, the method development with in-the-wild data is not yet accurate enough for practical usage. In this paper, we introduce the affective recognition method focusing on facial expression (EXP) and valence-arousal calculation that was submitted to the Affective Behavior Analysis in-the-wild (ABAW) 2021 Contest.… ▽ More

    Submitted 10 July, 2021; v1 submitted 7 July, 2021; originally announced July 2021.

    Comments: 6 pages, 5 figures

  21. arXiv:2103.16050  [pdf, other

    cs.CV

    Progressive Domain Expansion Network for Single Domain Generalization

    Authors: Lei Li, Ke Gao, Juan Cao, Ziyao Huang, Yepeng Weng, Xiaoyue Mi, Zhengze Yu, Xiaoya Li, Boyang xia

    Abstract: Single domain generalization is a challenging case of model generalization, where the models are trained on a single domain and tested on other unseen domains. A promising solution is to learn cross-domain invariant representations by expanding the coverage of the training domain. These methods have limited generalization performance gains in practical applications due to the lack of appropriate s… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

    Comments: Accepted to CVPR2021

  22. arXiv:2010.00288  [pdf, ps, other

    cs.CV

    Action Units Recognition by Pairwise Deep Architecture

    Authors: Junya Saito, Ryosuke Kawamura, Akiyoshi Uchida, Sachihiro Youoku, Yuushi Toyoda, Takahisa Yamamoto, Xiaoyu Mi, Kentaro Murase

    Abstract: In this paper, we propose a new automatic Action Units (AUs) recognition method used in a competition, Affective Behavior Analysis in-the-wild (ABAW). Our method tackles a problem of AUs label inconsistency among subjects by using pairwise deep architecture. While the baseline score is 0.31, our method achieved 0.67 in validation dataset of the competition.

    Submitted 2 October, 2020; v1 submitted 1 October, 2020; originally announced October 2020.

    Comments: We changed expression of text and data

  23. arXiv:2009.13885  [pdf, other

    cs.CV

    A Multi-term and Multi-task Analyzing Framework for Affective Analysis in-the-wild

    Authors: Sachihiro Youoku, Yuushi Toyoda, Takahisa Yamamoto, Junya Saito, Ryosuke Kawamura, Xiaoyu Mi, Kentaro Murase

    Abstract: Human affective recognition is an important factor in human-computer interaction. However, the method development with in-the-wild data is not yet accurate enough for practical usage. In this paper, we introduce the affective recognition method focusing on valence-arousal (VA) and expression (EXP) that was submitted to the Affective Behavior Analysis in-the-wild (ABAW) 2020 Contest. Since we consi… ▽ More

    Submitted 2 October, 2020; v1 submitted 29 September, 2020; originally announced September 2020.

    Comments: 5 pages with 6 figures

  24. arXiv:2009.10892  [pdf, other

    cs.CV

    HiCOMEX: Facial Action Unit Recognition Based on Hierarchy Intensity Distribution and COMEX Relation Learning

    Authors: Ziqiang Shi, Liu Liu, Zhongling Liu, Rujie Liu, Xiaoyu Mi, and Kentaro Murase

    Abstract: The detection of facial action units (AUs) has been studied as it has the competition due to the wide-ranging applications thereof. In this paper, we propose a novel framework for the AU detection from a single input image by grasping the \textbf{c}o-\textbf{o}ccurrence and \textbf{m}utual \textbf{ex}clusion (COMEX) as well as the intensity distribution among AUs. Our algorithm uses facial landmar… ▽ More

    Submitted 28 April, 2021; v1 submitted 22 September, 2020; originally announced September 2020.

  25. arXiv:1912.04368  [pdf, other

    quant-ph cs.LG

    Learning Non-Markovian Quantum Noise from Moiré-Enhanced Swap Spectroscopy with Deep Evolutionary Algorithm

    Authors: Murphy Yuezhen Niu, Vadim Smelyanskyi, Paul Klimov, Sergio Boixo, Rami Barends, Julian Kelly, Yu Chen, Kunal Arya, Brian Burkett, Dave Bacon, Zijun Chen, Ben Chiaro, Roberto Collins, Andrew Dunsworth, Brooks Foxen, Austin Fowler, Craig Gidney, Marissa Giustina, Rob Graff, Trent Huang, Evan Jeffrey, David Landhuis, Erik Lucero, Anthony Megrant, Josh Mutus , et al. (8 additional authors not shown)

    Abstract: Two-level-system (TLS) defects in amorphous dielectrics are a major source of noise and decoherence in solid-state qubits. Gate-dependent non-Markovian errors caused by TLS-qubit coupling are detrimental to fault-tolerant quantum computation and have not been rigorously treated in the existing literature. In this work, we derive the non-Markovian dynamics between TLS and qubits during a SWAP-like… ▽ More

    Submitted 9 December, 2019; originally announced December 2019.

  26. arXiv:1805.01525  [pdf, other

    cs.CR

    Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home

    Authors: Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, Feng Qian

    Abstract: Virtual personal assistants (VPA) (e.g., Amazon Alexa and Google Assistant) today mostly rely on the voice channel to communicate with their users, which however is known to be vulnerable, lacking proper authentication. The rapid growth of VPA skill markets opens a new attack avenue, potentially allowing a remote adversary to publish attack skills to attack a large number of VPA users through popu… ▽ More

    Submitted 29 June, 2018; v1 submitted 3 May, 2018; originally announced May 2018.

  27. arXiv:1703.09809  [pdf, other

    cs.CR

    Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be

    Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin

    Abstract: Inspired by the boom of the consumer IoT market, many device manufacturers, start-up companies and technology giants have jumped into the space. Unfortunately, the exciting utility and rapid marketization of IoT, come at the expense of privacy and security. Industry reports and academic work have revealed many attacks on IoT systems, resulting in privacy leakage, property loss and large-scale avai… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.