Cybersecurity

Privacy & Security in Learning Systems

Privacy & Security in Learning Systems

The ever-growing deployment of machine learning models in industrial and health contexts raises critical privacy and security concerns. These models are built on personal data (e.g. clinical records, images, and user profiles). Our work on this subject focuses on extending ideas in differential privacy to deep neural networks to secure…... Read More

Blockchain Security & Scalability

Blockchain Security & Scalability

Although the blockchain technology has the potential to transform every industry, the performance level of existing blockchain platforms is too low to realize that vision. From an architectural viewpoint, this unsolved problem is a bottleneck to blockchain adoption in many applications. Our work aims to improve the scalability of blockchain to achieve Visa-like transaction…... Read More

Sybil attack and limiting the spread of misinformation

Sybil attack and limiting the spread of misinformation

The wide spread of misinformation in online social networks has become a main threat to our society. Generally, people tend to believe what their friends are saying. Leveraging the social relationships to contain or block the misinformation appears to be a promising strategy. Objectives: Detect misinformation in online social networks…... Read More

Socialbot Behavior & Detection

Socialbot Behavior & Detection

The socialbot attack model is a spiritual successor to the Sybil attack model that addresses several of its flaws. Where the Sybil model makes strong assumptions about the number and organization of the attackers, the socialbot model relaxes those. A socialbot is simply a bot that pretends to be a human on…... Read More

Vulnerabilities in Socially-Enabled Smart Grid

Vulnerabilities in Socially-Enabled Smart Grid

The social computing will integrate and enhance many digital systems over the next decade and the smart grid is no exception. Smart grid efficiency depends on utility customers having knowledge about demand response programs and being actively engaged in energy management. And this is exactly where social network comes into…... Read More

Price Modification and Load Distribution Attacks

Price Modification and Load Distribution Attacks

Smart Grid addresses the problem of existing powergrid\'s increasing complexity, growing demand and requirement for greater reliability, through two-way communication and automated residential load control among others. These features also makes the Smart Grid a target for a number of cyber attacks. The load profiles of consumers could be changed…... Read More

Complex Network Vulnerability Assessment

Complex Network Vulnerability Assessment

The study of network vulnerability seeks to identify the critical elements with respect to a variety of measures. Generally speaking, a network is robust if external pertubations do not significantly impair its functionality. In this area, we seek to design methods to identify the critical elements. One measure we study…... Read More

Vulnerability in Interdependent Networks

Vulnerability in Interdependent Networks

The study of interdependent networks from the perspective of vulnerability seeks to identify the critical elements with respect to a variety of measures. An interdependent system is robust if external perturbations do not significantly impair the functionality of the system. In this area, we seek to design methods to identify…... Read More

SCADA and DPI

SCADA and DPI

Supervisory Control And Data Acquisition (SCADA) system remotely monitors and controls remote stations from a central SCADA center through coded signals over communication (or control) network. The addition of control network to better manage and gather system data comes with its own set of vulnerabilities including false data injection and…... Read More

Information Leakage in Online Social Networks

Information Leakage in Online Social Networks

As an imperative channel for rapid information propagation, OSNs also have their disruptive effects. One of them is the leakage of information, i.e., information could be spread via OSNs to the users whom we may not willing to share with. Thus the problem of constructing a circle of trust to…... Read More