2018 International Conference on Computer Communication and Informatics (ICCCI) 2018
DOI: 10.1109/iccci.2018.8441202
|View full text |Cite
|
Sign up to set email alerts
|

Man-In-Middle Attack/for a Free Scale Topology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…a) If the cloud platform provider is untrusted, it can manipulate the training dataset and baseline neural networks or ML algorithms. b) Even if the cloud platform provider is trusted, a man-in-middle [18] attack can be performed by another client to steal the IP, i.e., the trained network or even to manipulate the IP or affect the training process. 2) IP Providers: The other actor in the manufacturing cycle is the IP provider which can also be untrusted because it can poison the training datasets and can also manipulate baseline ML models/architectures or other hyper-parameters, which are not accessible to 3P cloud providers.…”
Section: ) 3 Rd Party (3p) Cloud Platformsmentioning
confidence: 99%
See 1 more Smart Citation
“…a) If the cloud platform provider is untrusted, it can manipulate the training dataset and baseline neural networks or ML algorithms. b) Even if the cloud platform provider is trusted, a man-in-middle [18] attack can be performed by another client to steal the IP, i.e., the trained network or even to manipulate the IP or affect the training process. 2) IP Providers: The other actor in the manufacturing cycle is the IP provider which can also be untrusted because it can poison the training datasets and can also manipulate baseline ML models/architectures or other hyper-parameters, which are not accessible to 3P cloud providers.…”
Section: ) 3 Rd Party (3p) Cloud Platformsmentioning
confidence: 99%
“…a) If the cloud platform provider is untrusted, it can manipulate the training dataset and baseline neural networks or ML algorithms. b) Even if the cloud platform provider is trusted, a man-in-middle [18] attack can be performed by another client to steal the IP, i.e., the trained network or even to manipulate the IP or affect the training process. Thus, based on the trustworthiness of all actors involved in the design/manufacturing cycle, there can be 15 possible threat models for ML-based systems.…”
Section: A Threat Modelsmentioning
confidence: 99%
“…The small-world feature refers to the short characteristic path length as well as the high clustering coefficient in the network. It is noteworthy that the complex artificial neural networks such as associative memory systems [18] using the small-world phenomenon, and the scalefree property [19,20] have better efficiency in time and memory capacity than the randomly connected networks with similar connections. Also, the chaotic time series prediction problem by the small-world trait and the scale-free property can be solved more efficiently [21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%