Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–5 of 5 results for author: Ahn, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.00826  [pdf, other

    cs.CV

    DEVIAS: Learning Disentangled Video Representations of Action and Scene for Holistic Video Understanding

    Authors: Kyungho Bae, Geo Ahn, Youngrae Kim, Jinwoo Choi

    Abstract: When watching a video, humans can naturally extract human actions from the surrounding scene context, even when action-scene combinations are unusual. However, unlike humans, video action recognition models often learn scene-biased action representations from the spurious correlation in training data, leading to poor performance in out-of-context scenarios. While scene-debiased models achieve impr… ▽ More

    Submitted 11 July, 2024; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: Accepted by ECCV 2024

  2. arXiv:2310.04896  [pdf, other

    cs.CR

    Guaranteeing Anonymity in Attribute-Based Authorization

    Authors: Erin Lanus, Charles J. Colbourn, Gail-Joon Ahn

    Abstract: Attribute-based methods, such as attribute-based access control and attribute-based encryption, make decisions based on attributes possessed by a subject rather than the subject's identity. While this allows for anonymous authorization -- determining that a subject is authorized without knowing the identity of the subject -- it does not guarantee anonymity. If a policy can be composed such that fe… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

  3. arXiv:2103.12843  [pdf, other

    cs.CR

    Scam Pandemic: How Attackers Exploit Public Fear through Phishing

    Authors: Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn

    Abstract: As the COVID-19 pandemic started triggering widespread lockdowns across the globe, cybercriminals did not hesitate to take advantage of users' increased usage of the Internet and their reliance on it. In this paper, we carry out a comprehensive measurement study of online social engineering attacks in the early months of the pandemic. By collecting, synthesizing, and analyzing DNS records, TLS cer… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 10 pages, Accepted to eCrime 2020

  4. arXiv:1811.12627  [pdf

    cs.AI cs.LG

    Clear the Fog: Combat Value Assessment in Incomplete Information Games with Convolutional Encoder-Decoders

    Authors: Hyungu Kahng, Yonghyun Jeong, Yoon Sang Cho, Gonie Ahn, Young Joon Park, Uk Jo, Hankyu Lee, Hyungrok Do, Junseung Lee, Hyunjin Choi, Iljoo Yoon, Hyunjae Lee, Daehun Jun, Changhyeon Bae, Seoung Bum Kim

    Abstract: StarCraft, one of the most popular real-time strategy games, is a compelling environment for artificial intelligence research for both micro-level unit control and macro-level strategic decision making. In this study, we address an eminent problem concerning macro-level decision making, known as the 'fog-of-war', which rises naturally from the fact that information regarding the opponent's state i… ▽ More

    Submitted 11 February, 2019; v1 submitted 30 November, 2018; originally announced November 2018.

    Comments: 7 pages, 4 figures, 2 tables

  5. arXiv:1602.07024  [pdf, other

    cs.CR cs.AI cs.GT cs.MA

    Moving Target Defense for Web Applications using Bayesian Stackelberg Games

    Authors: Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn

    Abstract: The present complexity in designing web applications makes software security a difficult goal to achieve. An attacker can explore a deployed service on the web and attack at his/her own leisure. Moving Target Defense (MTD) in web applications is an effective mechanism to nullify this advantage of their reconnaissance but the framework demands a good switching strategy when switching between multip… ▽ More

    Submitted 16 November, 2016; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: 9 pages, 4 figures