Skip to main content

Showing 1–7 of 7 results for author: Hossain, K M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.18592  [pdf, other

    cs.CV cs.LG

    DeBUGCN -- Detecting Backdoors in CNNs Using Graph Convolutional Networks

    Authors: Akash Vartak, Khondoker Murad Hossain, Tim Oates

    Abstract: Deep neural networks (DNNs) are becoming commonplace in critical applications, making their susceptibility to backdoor (trojan) attacks a significant problem. In this paper, we introduce a novel backdoor attack detection pipeline, detecting attacked models using graph convolution networks (DeBUGCN). To the best of our knowledge, ours is the first use of GCNs for trojan detection. We use the static… ▽ More

    Submitted 25 February, 2025; originally announced February 2025.

    Comments: 18 pages, 11 tables, 8 figures

  2. arXiv:2412.10860  [pdf, other

    quant-ph cs.LG q-fin.ST

    Classification of Financial Data Using Quantum Support Vector Machine

    Authors: Seemanta Bhattacharjee, MD. Muhtasim Fuad, A. K. M. Fakhrul Hossain

    Abstract: Quantum Support Vector Machine is a kernel-based approach to classification problems. We study the applicability of quantum kernels to financial data, specifically our self-curated Dhaka Stock Exchange (DSEx) Broad Index dataset. To the best of our knowledge, this is the very first systematic research work on this dataset on the application of quantum kernel. We report empirical quantum advantage… ▽ More

    Submitted 14 December, 2024; originally announced December 2024.

    Comments: 5 pages, 6 figures

  3. arXiv:2403.08208  [pdf, other

    cs.CR cs.CV

    Advancing Security in AI Systems: A Novel Approach to Detecting Backdoors in Deep Neural Networks

    Authors: Khondoker Murad Hossain, Tim Oates

    Abstract: In the rapidly evolving landscape of communication and network security, the increasing reliance on deep neural networks (DNNs) and cloud services for data processing presents a significant vulnerability: the potential for backdoors that can be exploited by malicious actors. Our approach leverages advanced tensor decomposition algorithms Independent Vector Analysis (IVA), Multiset Canonical Correl… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: 6 pages, Accepted at the International Conference on Communications 2024. arXiv admin note: text overlap with arXiv:2212.08121

  4. arXiv:2401.05432  [pdf, other

    cs.LG cs.AI cs.CR

    TEN-GUARD: Tensor Decomposition for Backdoor Attack Detection in Deep Neural Networks

    Authors: Khondoker Murad Hossain, Tim Oates

    Abstract: As deep neural networks and the datasets used to train them get larger, the default approach to integrating them into research and commercial projects is to download a pre-trained model and fine tune it. But these models can have uncertain provenance, opening up the possibility that they embed hidden malicious behavior such as trojans or backdoors, where small changes to an input (triggers) can ca… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

  5. arXiv:2212.08121  [pdf, other

    cs.CV cs.AI

    Backdoor Attack Detection in Computer Vision by Applying Matrix Factorization on the Weights of Deep Networks

    Authors: Khondoker Murad Hossain, Tim Oates

    Abstract: The increasing importance of both deep neural networks (DNNs) and cloud services for training them means that bad actors have more incentive and opportunity to insert backdoors to alter the behavior of trained models. In this paper, we introduce a novel method for backdoor detection that extracts features from pre-trained DNN's weights using independent vector analysis (IVA) followed by a machine… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Comments: 7 pages, 4 figures, 5 tables, AAAI Workshop on Safe AI 2023

  6. Modelling Attacks in Blockchain Systems using Petri Nets

    Authors: Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md Sadek Ferdous, Mohammad Jabed M. Chowdhury, Md Zakirul Alam Bhuiyan

    Abstract: Blockchain technology has evolved through many changes and modifications, such as smart-contracts since its inception in 2008. The popularity of a blockchain system is due to the fact that it offers a significant security advantage over other traditional systems. However, there have been many attacks in various blockchain systems, exploiting different vulnerabilities and bugs, which caused a signi… ▽ More

    Submitted 14 November, 2020; originally announced November 2020.

    Comments: Accepted for publication at the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020)

  7. arXiv:1304.2538  [pdf

    cs.AI cs.IR

    On Appropriate Selection of Fuzzy Aggregation Operators in Medical Decision Support System

    Authors: K. M. Motahar Hossain, Zahir Raihan, M. M. A. Hashem

    Abstract: The Decision Support System (DSS) contains more than one antecedent and the degrees of strength of the antecedents need to be combined to determine the overall strength of the rule consequent. The membership values of the linguistic variables in Fuzzy have to be combined using an aggregation operator. But it is not feasible to predefine the form of aggregation operators in decision making. Instead… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 8th International Conference on Computer & Information Technology (ICCIT 2005), pp. 563-568, Dhaka, Bangladesh, December 28-30, (2005)