2,216 research outputs found
The Flow Fingerprinting Game
Linking two network flows that have the same source is essential in intrusion
detection or in tracing anonymous connections. To improve the performance of
this process, the flow can be modified (fingerprinted) to make it more
distinguishable. However, an adversary located in the middle can modify the
flow to impair the correlation by delaying the packets or introducing dummy
traffic.
We introduce a game-theoretic framework for this problem, that is used to
derive the Nash Equilibrium. As obtaining the optimal adversary delays
distribution is intractable, some approximations are done. We study the
concrete example where these delays follow a truncated Gaussian distribution.
We also compare the optimal strategies with other fingerprinting schemes. The
results are useful for understanding the limits of flow correlation based on
packet timings under an active attacker.Comment: Workshop on Information Forensics and Securit
Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes
The growing popularity of Deep Neural Networks, which often require
computationally expensive training and access to a vast amount of data, calls
for accurate authorship verification methods to deter unlawful dissemination of
the models and identify the source of the leak. In DNN watermarking the owner
may have access to the full network (white-box) or only be able to extract
information from its output to queries (black-box), but a watermarked model may
include both approaches in order to gather sufficient evidence to then gain
access to the network. Although there has been limited research in white-box
watermarking that considers traitor tracing, this problem is yet to be explored
in the black-box scenario. In this paper, we propose a black-and-white-box
watermarking method that opens the door to collusion-resistant traitor tracing
in black-box, exploiting the properties of Tardos codes, and making it possible
to identify the source of the leak before access to the model is granted. While
experimental results show that the method can successfully identify traitors,
even when further attacks have been performed, we also discuss its limitations
and open problems for traitor tracing in black-box.Comment: This work has been submitted to the IEEE International Workshop on
Information Forensics and Security (WIFS) 2023 for possible publication.
Copyright may be transferred without notice, after which this version may no
longer be accessibl
H? robust memory controllers for networked control systems: uncertain sampling rates and time delays in polytopic domains
In this paper, the problem of controller design for networked control systems with time-varying sampling rates and time delays is investigated. By using a memory at the feedback loop, a digital robust controller that minimizes an upper bound to the Hinfin performance of the closed loop system is determined. The design conditions are obtained from the Finsler\u27s Lemma combined with the Lyapunov theory and expressed in terms of bilinear matrix inequalities. Extra variables introduced by the Finsler\u27s Lemma are explored in order to provide a better system behavior. The time-varying uncertainties are modelled using polytopic domains. The controller is obtained by the solution of an optimization problem formulated only in terms of the vertices of the polytope, avoiding grids in the parametric space. Numerical examples illustrate the efficiency of the proposed approach
BENFORD’S LAW IN IMAGE PROCESSING
We present a generalization of Benford’s law for the first significant digit. This generalization is based on keeping two terms of the Fourier expansion of the probability density function of the data in the modular logarithmic domain. We prove that images in the Discrete Cosine Transform domain closely follow this generalization. We use this property to propose an application in image steganalysis, namely, detecting that a given image carries a hidden message
Redistributive fiscal problems in Colombia
From a general perspective, one could argue that large State transformations are reflect-ed in income, expenditure and employment. The information that the National Bureau of Statistics (Dane) have on income (tax and nontax) is accessible and more orderly than spending and employment. This difference is explained, in part because the collection of taxes is more centralized (national, municipal and departmental), and while expenditure on transfers is diversified.Tax Power, Colombia, State, Latin American, Fairness.
A Two-Stage Real-Time Path Planning: Application to the Overtaking Manuever
This paper proposes a two-stage local path planning approach to deal with all kinds of scenarios (i.e. intersections, turns, roundabouts). The first stage carries out an off-line optimization, considering vehicle kinematics and road constraints. The second stage includes all dynamic obstacles in the scene, generating a continuous path in real-time. Human-like driving style is provided by evaluating the sharpness of the road bends and the available space among them, optimizing the drivable area. The proposed approach is validated on overtaking scenarios where real-time path planning generation plays a key role. Simulation and real results on an experimental automated platform provide encouraging results, generating real-time collision-free paths while maintaining the defined smoothness criteria.INRIA and VEDECOM Institutes under the Ph.D. Grant; 10.13039/501100011688-Electronic Components and Systems for European Leadership (ECSEL) Project AutoDriv
- …