Cyber Security
We leverage model pruning and knowledge distillation for resource-efficient and privacy-preserving federated learning. Our research also includes multisource anomaly detection for advanced persistent threat and insider threat detection.
Funded Projects
- Size-Segregated Particle Odor Chromatographic Kernel – IARPA 2024
- Deep Resilience for Multifaceted Federated Learning in Internet-of-Everything – Commonwealth Cyber Initiative (CCI) 2021
- Determination of Safety Limits against Cyber Threats in Neuromodulation Devices using Machine Learning, Brain Phantoms, and Neural Pathways – Commonwealth Cyber Initiative (CCI) 2021
- Content Analytics for Smart Search – Xerox Workplace Innovation Research 2018
- Advanced Persistent Threat Detection – Defense Advanced Research Projects Agency (DARPA) 2015
Publications
2024
[c1] Resource-Efficient Federated Training Framework for Heterogeneous and Resource-Constrained Environments
H. Desai, A. Hilal, and H. Eldardiry
International Conference on Parallel & Distributed Processing Techniques & Applications 2024
2023
[t1] Resource-Efficient Federated Training Framework for Heterogeneous and Resource-Constrained Environments
H. Desai
MS Thesis
2019
[i1] Secure Two-Party Feature Selection
V. Rao, Y. Long, H. Eldardiry, S. Rane, R. Rossi, and F. Torres
2019
2018
[p1] Computer-Implemented System and Method for Detecting Anomalies using Sample-based Rule Identification
H. Eldardiry, K. Sricharan, D. Greene, and R. Price
PATENT 10140576 GRANTED 2018
2016
[p2] Detecting Anomalies in Work Practice Data by Combining Multiple Domains of Information
E. Bart, J. Liu, H. Eldardiry, and R. Price
PATENT 9264442 GRANTED 2016
[c2] Provenance Segmentation
R. Abreu, D. Archer, J. Cheney, E. Chapman, H. Eldardiry, and A. Gascon
Workshop on Theory and Practice of Provenance (TaPP), Provenance Week 2016
2015
[p3] System and Method for Modeling Behavior Change and Consistency to Detect Malicious Insiders
H. Eldardiry, E. Bart, J. Liu, J. Hanley, R. Price, and O. Brdiczka
PATENT 2908495 PUBLISHED 2015
[c3] Diagnosing Advanced Persistent Threats
R. Abreu, D. Bobrow, H. Eldardiry, A. Feldman, J. Hanley, T. Honda, J. de Kleer, A. Perez, D. Archer, and D. Burke
International Workshop on Principles of Diagnosis (DX) 2015
2014
[p4] Method and Apparatus for Combining Multidimensional Fraud Measurements for Anomaly Detection
Y. Zhang, J. Liu, and H. Eldardiry
PATENT 0244528 PUBLISHED 2014
[j1] Multisource Fusion for Anomaly Detection: using Across-Domain and Across-Time Peer-Group Consistency Checks
H. Eldardiry, K. Sricharan, J. Liu, J. Hanley, O. Brdiczka, R. Price, and E. Bart
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Special Edition on Insider Threat Detection 2014
Impact Factor 3.1
[c4] Ganging Up on Big Data: Computer-Intermediated Collaborative Analysis
M. Stefik and H. Eldardiry
IEEE International Conference on Collaboration Technologies and Systems (CTS) IARPA International Symposium on Collaborative Analysis and Reasoning Systems (CARS) 2014
2013
[c5] Fraud Detection for Healthcare
H. Eldardiry, J. Liu, Y. Zhang, and M. Fromherz
ACM Special Interest Group on Knowledge Discovery and Data Mining 1st Data Mining for Healthcare Workshop (SIGKDD-DMH) 2013
Acceptance Rate 17%
[c6] Multidomain Information Fusion for Insider Threat Detection
H. Eldardiry, E. Bart, J. Liu, J. Hanley, R. Price, and O. Brdiczka
IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT) 2013
Acceptance Rate 37.5%
Best Paper Award