Skip to main content

Showing 1–8 of 8 results for author: Tourani, R

Searching in archive cs. Search in all archives.
.
  1. A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference

    Authors: Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra

    Abstract: The growing popularity of Machine Learning (ML) has led to its deployment in various sensitive domains, which has resulted in significant research focused on ML security and privacy. However, in some applications, such as Augmented/Virtual Reality, integrity verification of the outsourced ML tasks is more critical--a facet that has not received much attention. Existing solutions, such as multi-par… ▽ More

    Submitted 24 April, 2024; v1 submitted 31 March, 2023; originally announced April 2023.

    Comments: 15 pages, 12 figures

  2. arXiv:2201.06050  [pdf, other

    cs.NI

    Harpocrates: Anonymous Data Publication in Named Data Networking

    Authors: Md Washik Al Azad, Reza Tourani, Abderrahmen Mtibaa, Spyridon Mastorakis

    Abstract: Named-Data Networking (NDN), a prominent realization of the Information-Centric Networking (ICN) vision, offers a request-response communication model where data is identified based on application-defined names at the network layer. This amplifies the ability of censoring authorities to restrict user access to certain data/websites/applications and monitor user requests. The majority of existing N… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

    Comments: This paper has been accepted by the ACM Symposium on Access Control Models and Technologies (SACMAT) 2022. The definite version of this work will be published by ACM as part of the SACMAT conference proceedings

  3. arXiv:2010.10334  [pdf, other

    cs.CR cs.LG cs.NI

    DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding

    Authors: Spyridon Mastorakis, Xin Zhong, Pei-Chi Huang, Reza Tourani

    Abstract: The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physical… ▽ More

    Submitted 17 October, 2020; originally announced October 2020.

    Comments: 7 pages. This paper has been accepted for publication by the 18th IEEE Annual Consumer Communications & Networking Conference (CCNC). The copyright is with the IEEE. arXiv admin note: text overlap with arXiv:2007.02460

  4. arXiv:2008.05052  [pdf, ps, other

    cs.LG math.ST stat.ML

    Predictive and Causal Implications of using Shapley Value for Model Interpretation

    Authors: Sisi Ma, Roshan Tourani

    Abstract: Shapley value is a concept from game theory. Recently, it has been used for explaining complex models produced by machine learning techniques. Although the mathematical definition of Shapley value is straight-forward, the implication of using it as a model interpretation tool is yet to be described. In the current paper, we analyzed Shapley value in the Bayesian network framework. We established t… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Comments: Accepted by KDD CD workshop 2020

    MSC Class: 62H22; 62H30 ACM Class: I.2.6; G.3

  5. arXiv:2007.00641  [pdf, other

    cs.NI

    Democratizing the Edge: A Pervasive Edge Computing Framework

    Authors: Reza Tourani, Srikathyayani Srikanteswara, Satyajayant Misra, Richard Chow, Lily Yang, Xiruo Liu, Yi Zhang

    Abstract: The needs of emerging applications, such as augmented and virtual reality, federated machine learning, and autonomous driving, have motivated edge computing--the push of computation capabilities to the edge. Various edge computing architectures have emerged, including multi-access edge computing and edge-cloud, all with the premise of reducing communication latency and augmenting privacy. However,… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

    Comments: 7 pages, 4 figures

  6. arXiv:1703.08453  [pdf, other

    cs.NI

    LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities

    Authors: Travis Mick, Reza Tourani, Satyajayant Misra

    Abstract: Recent literature suggests that the Internet of Things (IoT) scales much better in an Information-Centric Networking (ICN) model instead of the current host-centric Internet Protocol (IP) model. In particular, the Named Data Networking (NDN) project (one of the ICN architecture flavors) offers features exploitable by IoT applications, such as stateful forwarding, in- network caching, and built-in… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

    Comments: 9 pages, 8 figures, journal paper

  7. arXiv:1603.03501  [pdf, other

    cs.NI cs.CR

    AccConF: An Access Control Framework for Leveraging In-Network Cached Data in ICNs

    Authors: S. Misra, R. Tourani, F. Natividad, T. Mick, N. Majd, H. Huang

    Abstract: The fast-growing Internet traffic is increasingly becoming content-based and driven by mobile users, with users more interested in data rather than its source. This has precipitated the need for an information-centric Internet architecture. Research in information-centric networks (ICNs) have resulted in novel architectures, e.g., CCN/NDN, DONA, and PSIRP/PURSUIT; all agree on named data based add… ▽ More

    Submitted 10 March, 2016; originally announced March 2016.

    Comments: 13 pages, 6 figures

  8. arXiv:1603.03409  [pdf, other

    cs.NI cs.CR

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    Authors: Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar

    Abstract: Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents origin. Content and client security are more intrinsic in the ICN paradigm versus the cur… ▽ More

    Submitted 1 June, 2017; v1 submitted 10 March, 2016; originally announced March 2016.

    Comments: 36 pages, 17 figures