Skip to main content

Showing 1–6 of 6 results for author: Shariatnasab, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.00605  [pdf, other

    cs.IT cs.LG eess.SP

    The Query/Hit Model for Sequential Hypothesis Testing

    Authors: Mahshad Shariatnasab, Stefano Rini, Farhad Shirani, S. Sitharama Iyengar

    Abstract: This work introduces the Query/Hit (Q/H) learning model. The setup consists of two agents. One agent, Alice, has access to a streaming source, while the other, Bob, does not have direct access to the source. Communication occurs through sequential Q/H pairs: Bob sends a sequence of source symbols (queries), and Alice responds with the waiting time until each query appears in the source stream (hit… ▽ More

    Submitted 1 February, 2025; originally announced February 2025.

  2. arXiv:2412.07005  [pdf, other

    cs.LG cs.CR cs.IT

    In-Application Defense Against Evasive Web Scans through Behavioral Analysis

    Authors: Behzad Ousat, Mahshad Shariatnasab, Esteban Schafir, Farhad Shirani Chaharsooghi, Amin Kharraz

    Abstract: Web traffic has evolved to include both human users and automated agents, ranging from benign web crawlers to adversarial scanners such as those capable of credential stuffing, command injection, and account hijacking at the web scale. The estimated financial costs of these adversarial activities are estimated to exceed tens of billions of dollars in 2023. In this work, we introduce WebGuard, a lo… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

  3. arXiv:2305.07079  [pdf, other

    cs.IT cs.CR cs.DB

    The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation

    Authors: Mahshad Shariatnasab, Farhad Shirani, S. Sitharma Iyengar

    Abstract: Dataset obfuscation refers to techniques in which random noise is added to the entries of a given dataset, prior to its public release, to protect against leakage of private information. In this work, dataset obfuscation under two objectives is considered: i) rank-preservation: to preserve the row ordering in the obfuscated dataset induced by a given rank function, and ii) anonymity: to protect us… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  4. arXiv:2202.05895  [pdf, other

    cs.SI cs.DB cs.IT

    Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks

    Authors: M. Shariatnasab, F. Shirani, Z. Anwar

    Abstract: This work considers the fundamental privacy limits under active fingerprinting attacks in power-law bipartite networks. The scenario arises naturally in social network analysis, tracking user mobility in wireless networks, and forensics applications, among others. A stochastic growing network generation model -- called the popularity-based model -- is investigated, where the bipartite network is g… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  5. arXiv:2106.04766  [pdf, other

    cs.SI cs.IT

    Fundamental Privacy Limits in Bipartite Networks under Active Attacks

    Authors: Mahshad Shariatnasab, Farhad Shirani, Elza Erkip

    Abstract: This work considers active deanonymization of bipartite networks. The scenario arises naturally in evaluating privacy in various applications such as social networks, mobility networks, and medical databases. For instance, in active deanonymization of social networks, an anonymous victim is targeted by an attacker (e.g. the victim visits the attacker's website), and the attacker queries her group… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

  6. arXiv:2102.06267  [pdf, other

    cs.IT cs.SI

    On Graph Matching Using Generalized Seed Side-Information

    Authors: Mahshad Shariatnasab, Farhad Shirani, Siddharth Garg, Elza Erkip

    Abstract: In this paper, matching pairs of stocahstically generated graphs in the presence of generalized seed side-information is considered. The graph matching problem emerges naturally in various applications such as social network de-anonymization, image processing, DNA sequencing, and natural language processing. A pair of randomly generated labeled Erdos-Renyi graphs with pairwise correlated edges are… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

    Comments: arXiv admin note: text overlap with arXiv:2009.00467