Project Start Date:
Project Objectives and Scope
The main project goal is to develop an infrastructure that will collect information using agents in a fully trusted manner. The software agents will collect information from servers and end-points. The nature of the collected information will be determined with the help of design partners of STEE-Infosec.
The main research challenge is how to isolate the monitoring infrastructure from the potentially compromised system that is being monitored. The software agent will have to run in a system that may be compromised.
For implementing the agent we intend to use various virtualisation and trusted computing techniques that will help us to protect the agent from being compromised. We intend to activate the agents such that each agent will crosscheck the wellbeing of other agents running in other computers.
Simple and Effective Prevention of Mode Collapse in Deep One-Class Classification
Deep Semi-Supervised Anomaly Detection
Exploring the Back Alleys: Analysing The Robustness of Alternative Neural Network Architectures against Adversarial Attacks
A Neural Attention Model for Real-Time Network Intrusion Detection
Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study
Nonintrusive heart rate measurement using ballistocardiogram signals: a comparative study
Unmasking Clever Hans predictors and assessing what machines really learn
Deep One-Class Classification
Mouse Authentication without the Temporal Aspect – What does a 2D-CNN learn?
Insights from curve fitting models in mouse dynamics authentication systems
ImageCLEF 2017: ImageCLEF Tuberculosis Task-the SGEast Submission
CHENG, Tai Leong Jimmy
CHEUNG, Ngai-Man (Man)
- +65 6499 4542
- SUTD Profile
- Big Data Security Analytics (Principal Investigator)
- Predicting Adversarial Behaviours and the Motivation for Automated Network Defense (Co-Principal Investigator)
- Trusted and Resilient Monitoring Infrastructure (Co-Principal Investigator)