Skip to main content

Showing 1–29 of 29 results for author: Namin, A S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.09465  [pdf, other

    cs.SE

    Evolutionary Defense: Advancing Moving Target Strategies with Bio-Inspired Reinforcement Learning to Secure Misconfigured Software Applications

    Authors: Niloofar Heidarikohol, Shuvalaxmi Dass, Akbar Siami Namin

    Abstract: Improper configurations in software systems often create vulnerabilities, leaving them open to exploitation. Static architectures exacerbate this issue by allowing misconfigurations to persist, providing adversaries with opportunities to exploit them during attacks. To address this challenge, a dynamic proactive defense strategy known as Moving Target Defense (MTD) can be applied. MTD continually… ▽ More

    Submitted 13 April, 2025; originally announced April 2025.

  2. arXiv:2411.18731  [pdf, other

    cs.AI cs.SE

    The Performance of the LSTM-based Code Generated by Large Language Models (LLMs) in Forecasting Time Series Data

    Authors: Saroj Gopali, Sima Siami-Namini, Faranak Abri, Akbar Siami Namin

    Abstract: As an intriguing case is the goodness of the machine and deep learning models generated by these LLMs in conducting automated scientific data analysis, where a data analyst may not have enough expertise in manually coding and optimizing complex deep learning models and codes and thus may opt to leverage LLMs to generate the required models. This paper investigates and compares the performance of t… ▽ More

    Submitted 27 November, 2024; originally announced November 2024.

  3. arXiv:2405.19578  [pdf, other

    cs.CE econ.GN

    The Accuracy of Domain Specific and Descriptive Analysis Generated by Large Language Models

    Authors: Denish Omondi Otieno, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin

    Abstract: Large language models (LLMs) have attracted considerable attention as they are capable of showcasing impressive capabilities generating comparable high-quality responses to human inputs. LLMs, can not only compose textual scripts such as emails and essays but also executable programming code. Contrary, the automated reasoning capability of these LLMs in performing statistically-driven descriptive… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 12 pages

  4. arXiv:2404.09802  [pdf, other

    cs.CR cs.LG

    The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

    Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones

    Abstract: Cyber attacks continue to pose significant threats to individuals and organizations, stealing sensitive data such as personally identifiable information, financial information, and login credentials. Hence, detecting malicious websites before they cause any harm is critical to preventing fraud and monetary loss. To address the increasing number of phishing attacks, protective mechanisms must be hi… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  5. arXiv:2311.14876  [pdf, other

    cs.HC cs.CR

    Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles

    Authors: Sonali Singh, Faranak Abri, Akbar Siami Namin

    Abstract: With the recent advent of Large Language Models (LLMs), such as ChatGPT from OpenAI, BARD from Google, Llama2 from Meta, and Claude from Anthropic AI, gain widespread use, ensuring their security and robustness is critical. The widespread use of these language models heavily relies on their reliability and proper usage of this fascinating technology. It is crucial to thoroughly test these models t… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

    Comments: 10 pages, 16 tables, 5 figures, IEEE BigData 2023 (Workshops)

  6. arXiv:2306.17338  [pdf, ps, other

    cs.LG

    A Survey on Blockchain-Based Federated Learning and Data Privacy

    Authors: Bipin Chhetri, Saroj Gopali, Rukayat Olapojoye, Samin Dehbash, Akbar Siami Namin

    Abstract: Federated learning is a decentralized machine learning paradigm that allows multiple clients to collaborate by leveraging local computational power and the models transmission. This method reduces the costs and privacy concerns associated with centralized machine learning methods while ensuring data privacy by distributing training data across heterogeneous devices. On the other hand, federated le… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

    Comments: Accepted in COMPSAC 2023IEEE 47th Annual Computers, Software, and Applications Conference Total 10 pages 9 pages and 1 page citation

  7. arXiv:2112.09296  [pdf, other

    cs.CR

    A Survey on the Applications of Blockchains in Security of IoT Systems

    Authors: Zulfiqar Ali Khan, Akbar Siami Namin

    Abstract: The Internet of Things (IoT) has already changed our daily lives by integrating smart devices together towards delivering high quality services to its clients. These devices when integrated together form a network through which massive amount of data can be produced, transferred, and shared. A critical concern is the security and integrity of such a complex platform to ensure the sustainability an… ▽ More

    Submitted 16 December, 2021; originally announced December 2021.

    Comments: 15 pages, IEEE Bigdata 2021

  8. arXiv:2112.09293  [pdf, other

    cs.LG cs.PF

    A Comparative Study of Detecting Anomalies in Time Series Data Using LSTM and TCN Models

    Authors: Saroj Gopali, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin

    Abstract: There exist several data-driven approaches that enable us model time series data including traditional regression-based modeling approaches (i.e., ARIMA). Recently, deep learning techniques have been introduced and explored in the context of time series analysis and prediction. A major research question to ask is the performance of these many variations of deep learning techniques in predicting ti… ▽ More

    Submitted 16 December, 2021; originally announced December 2021.

    Comments: 15 pages, 3 figures, IEEE BigData 2021

  9. arXiv:2106.02012  [pdf, other

    cs.CR cs.AI

    Attack Prediction using Hidden Markov Model

    Authors: Shuvalaxmi Dass, Prerit Datta, Akbar Siami Namin

    Abstract: It is important to predict any adversarial attacks and their types to enable effective defense systems. Often it is hard to label such activities as malicious ones without adequate analytical reasoning. We propose the use of Hidden Markov Model (HMM) to predict the family of related attacks. Our proposed model is based on the observations often agglomerated in the form of log files and from the ta… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: 20 pages, 4 figures, COMPSAC'21

  10. arXiv:2106.01998  [pdf, other

    cs.HC cs.AI cs.CR

    Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks

    Authors: Faranak Abri, Luis Felipe Gutierrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones

    Abstract: To understand how end-users conceptualize consequences of cyber security attacks, we performed a card sorting study, a well-known technique in Cognitive Sciences, where participants were free to group the given consequences of chosen cyber attacks into as many categories as they wished using rationales they see fit. The results of the open card sorting study showed a large amount of inter-particip… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: 20 pages, 3 figures, COMPSAC'21

  11. arXiv:2012.14488  [pdf, other

    cs.CR cs.LG

    Phishing Detection through Email Embeddings

    Authors: Luis Felipe GutiƩrrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones

    Abstract: The problem of detecting phishing emails through machine learning techniques has been discussed extensively in the literature. Conventional and state-of-the-art machine learning algorithms have demonstrated the possibility of building classifiers with high accuracy. The existing research studies treat phishing and genuine emails through general indicators and thus it is not exactly clear what phis… ▽ More

    Submitted 28 December, 2020; originally announced December 2020.

  12. arXiv:2012.14481  [pdf, other

    cs.CR

    A Survey on Vulnerabilities of Ethereum Smart Contracts

    Authors: Zulfiqar Ali Khan, Akbar Siami Namin

    Abstract: Smart contract (SC) is an extension of BlockChain technology. Ethereum BlockChain was the first to incorporate SC and thus started a new era of crypto-currencies and electronic transactions. Solidity helps to program the SCs. Still, soon after Solidity's emergence in 2014, Solidity-based SCs suffered many attacks that deprived the SC account holders of their precious funds. The main reason for the… ▽ More

    Submitted 28 December, 2020; originally announced December 2020.

  13. arXiv:2012.02643  [pdf, other

    cs.SD cs.CV eess.AS

    Predicting Emotions Perceived from Sounds

    Authors: Faranak Abri, Luis Felipe GutiƩrrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones

    Abstract: Sonification is the science of communication of data and events to users through sounds. Auditory icons, earcons, and speech are the common auditory display schemes utilized in sonification, or more specifically in the use of audio to convey information. Once the captured data are perceived, their meanings, and more importantly, intentions can be interpreted more easily and thus can be employed as… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Comments: 10 pages

  14. arXiv:2012.00648  [pdf, other

    cs.CR cs.HC

    Cyber-Attack Consequence Prediction

    Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones

    Abstract: Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces. Cyber-security researchers are often overloaded with a variety… ▽ More

    Submitted 2 December, 2020; v1 submitted 1 December, 2020; originally announced December 2020.

    Comments: 9 pages. The pre-print of a paper to appear in the proceedings of the 3rd Workshop on Big Data Engineering and Analytics in Cyber-Physical Systems (BigEACPS'20), IEEE BigData Conference 2020

  15. arXiv:2010.04260  [pdf, other

    cs.CL cs.IR

    Fake Reviews Detection through Analysis of Linguistic Features

    Authors: Faranak Abri, Luis Felipe Gutierrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears

    Abstract: Online reviews play an integral part for success or failure of businesses. Prior to purchasing services or goods, customers first review the online comments submitted by previous customers. However, it is possible to superficially boost or hinder some businesses through posting counterfeit and fake reviews. This paper explores a natural language processing approach to identify fake reviews. We pre… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: The pre-print of a paper to appear in the proceedings of the IEEE International Conference on Machine Learning Applications (ICMLA 2020), 11 pages, 3 figures, 5 tables

  16. arXiv:2010.04257  [pdf, other

    cs.CV cs.LG eess.IV

    Fast Fourier Transformation for Optimizing Convolutional Neural Networks in Object Recognition

    Authors: Varsha Nair, Moitrayee Chatterjee, Neda Tavakoli, Akbar Siami Namin, Craig Snoeyink

    Abstract: This paper proposes to use Fast Fourier Transformation-based U-Net (a refined fully convolutional networks) and perform image convolution in neural networks. Leveraging the Fast Fourier Transformation, it reduces the image convolution costs involved in the Convolutional Neural Networks (CNNs) and thus reduces the overall computational costs. The proposed model identifies the object information fro… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: Pre-print of a paper to appear in the proceedings of the IEEE International Conference on Machine Learning Applications (ICMLA 2020), 10 pages, 9 figures, 1 table

  17. arXiv:2006.08606  [pdf, other

    cs.SE

    Vulnerability Coverage as an Adequacy Testing Criterion

    Authors: Shuvalaxmi Dass, Akbar Siami Namin

    Abstract: Mainstream software applications and tools are the configurable platforms with an enormous number of parameters along with their values. Certain settings and possible interactions between these parameters may harden (or soften) the security and robustness of these applications against some known vulnerabilities. However, the large number of vulnerabilities reported and associated with these tools… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  18. arXiv:2006.08605  [pdf, other

    cs.SE cs.AI cs.LG

    Detection of Coincidentally Correct Test Cases through Random Forests

    Authors: Shuvalaxmi Dass, Xiaozhen Xue, Akbar Siami Namin

    Abstract: The performance of coverage-based fault localization greatly depends on the quality of test cases being executed. These test cases execute some lines of the given program and determine whether the underlying tests are passed or failed. In particular, some test cases may be well-behaved (i.e., passed) while executing faulty statements. These test cases, also known as coincidentally correct test cas… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  19. arXiv:2006.08604  [pdf, other

    cs.CR cs.SE

    Vulnerability Coverage for Secure Configuration

    Authors: Shuvalaxmi Dass, Akbar Siami Namin

    Abstract: We present a novel idea on adequacy testing called ``{vulnerability coverage}.'' The introduced coverage measure examines the underlying software for the presence of certain classes of vulnerabilities often found in the National Vulnerability Database (NVD) website. The thoroughness of the test input generation procedure is performed through the adaptation of evolutionary algorithms namely Genetic… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  20. arXiv:2006.07914  [pdf, other

    cs.CR cs.NI

    Cloud as an Attack Platform

    Authors: Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones

    Abstract: We present an exploratory study of responses from $75$ security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. We presented the participants' with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  21. arXiv:2006.07912  [pdf, other

    cs.LG cs.SI

    Fake Reviews Detection through Ensemble Learning

    Authors: Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears

    Abstract: Customers represent their satisfactions of consuming products by sharing their experiences through the utilization of online reviews. Several machine learning-based approaches can automatically detect deceptive and fake reviews. Recently, there have been studies reporting the performance of ensemble learning-based approaches in comparison to conventional machine learning techniques. Motivated by t… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  22. arXiv:2006.07908  [pdf, other

    cs.CR cs.NI

    Launching Stealth Attacks using Cloud

    Authors: Moitrayee Chatterjee, Prerit Datta, Faranak Abri, Akbar Siami Namin, Keith S. Jones

    Abstract: Cloud computing offers users scalable platforms and low resource cost. At the same time, the off-site location of the resources of this service model makes it more vulnerable to certain types of adversarial actions. Cloud computing has not only gained major user base, but also, it has the features that attackers can leverage to remain anonymous and stealth. With convenient access to data and techn… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  23. arXiv:2004.07296  [pdf, other

    cs.LG stat.ML

    Clustering Time Series Data through Autoencoder-based Deep Learning Models

    Authors: Neda Tavakoli, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin

    Abstract: Machine learning and in particular deep learning algorithms are the emerging approaches to data analysis. These techniques have transformed traditional data mining-based analysis radically into a learning-based model in which existing data sets along with their cluster labels (i.e., train set) are learned to build a supervised learning model and predict the cluster labels of unseen data (i.e., tes… ▽ More

    Submitted 11 April, 2020; originally announced April 2020.

  24. arXiv:1911.09586  [pdf, other

    cs.CR cs.LG

    The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities

    Authors: Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin

    Abstract: The detection of zero-day attacks and vulnerabilities is a challenging problem. It is of utmost importance for network administrators to identify them with high accuracy. The higher the accuracy is, the more robust the defense mechanism will be. In an ideal scenario (i.e., 100% accuracy) the system can detect zero-day malware without being concerned about mistakenly tagging benign files as malware… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

    Comments: 8 pages, 2 figures, 3 tables, IEEE BigData 2019

  25. arXiv:1911.09512  [pdf, other

    cs.LG cs.CE cs.PF stat.ML

    A Comparative Analysis of Forecasting Financial Time Series Using ARIMA, LSTM, and BiLSTM

    Authors: Sima Siami-Namini, Neda Tavakoli, Akbar Siami Namin

    Abstract: Machine and deep learning-based algorithms are the emerging approaches in addressing prediction problems in time series. These techniques have been shown to produce more accurate results than conventional regression-based modeling. It has been reported that artificial Recurrent Neural Networks (RNN) with memory, such as Long Short-Term Memory (LSTM), are superior compared to Autoregressive Integra… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

    Comments: 8 pages, 3 figures, 3 tables, 1 listing, IEEE BigData 2019

  26. arXiv:1905.09222  [pdf, other

    eess.SY cs.CR

    Markov Decision Process to Enforce Moving Target Defence Policies

    Authors: Jianjun Zheng, Akbar Siami Namin

    Abstract: Moving Target Defense (MTD) is an emerging game-changing defense strategy in cybersecurity with the goal of strengthening defenders and conversely puzzling adversaries in a network environment. The successful deployment of an MTD system can be affected by several factors including 1) the effectiveness of the employed technique, 2) the deployment strategy, 3) the cost of the MTD implementation, and… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

    Comments: 10 pages, 7 figures, COMPSAC 2019

  27. arXiv:1905.09207  [pdf, other

    cs.LG cs.CR stat.ML

    Deep Reinforcement Learning for Detecting Malicious Websites

    Authors: Moitrayee Chatterjee, Akbar Siami Namin

    Abstract: Phishing is the simplest form of cybercrime with the objective of baiting people into giving away delicate information such as individually recognizable data, banking and credit card details, or even credentials and passwords. This type of simple yet most effective cyber-attack is usually launched through emails, phone calls, or instant messages. The credential or private data stolen are then used… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

    Comments: 8 pages, 2 figures, COMPSAC 2019

  28. arXiv:1805.08272  [pdf

    cs.CR cs.CY

    The Sounds of Cyber Threats

    Authors: Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, Rona Pogrund

    Abstract: The Internet enables users to access vast resources, but it can also expose users to harmful cyber-attacks. This paper investigates human factors issues concerning the use of sounds in a cyber-security domain. It describes a methodology, referred to as sonification, to effectively design and develop auditory cyber-security threat indicators to warn users about cyber-attacks. A case study is presen… ▽ More

    Submitted 21 May, 2018; originally announced May 2018.

    Comments: 5 pages, 3 figures, 1 table, A poster paper presented at the 12th Symposium on Usable Privacy and Security (SOUPS 2016)

    ACM Class: H.5.2

  29. arXiv:1803.06386  [pdf

    cs.LG q-fin.ST stat.ML

    Forecasting Economics and Financial Time Series: ARIMA vs. LSTM

    Authors: Sima Siami-Namini, Akbar Siami Namin

    Abstract: Forecasting time series data is an important subject in economics, business, and finance. Traditionally, there are several techniques to effectively forecast the next lag of time series data such as univariate Autoregressive (AR), univariate Moving Average (MA), Simple Exponential Smoothing (SES), and more notably Autoregressive Integrated Moving Average (ARIMA) with its many variations. In partic… ▽ More

    Submitted 16 March, 2018; originally announced March 2018.

    Comments: 19 pages, 2 figures, 1 diagram, 2 listings