Cyber Security

We leverage model pruning and knowledge distillation for resource-efficient and privacy-preserving federated learning. Our research also includes multisource anomaly detection for advanced persistent threat and insider threat detection.

Funded Projects

Publications

2024

[c1] Resource-Efficient Federated Training Framework for Heterogeneous and Resource-Constrained Environments
H. Desai, A. Hilal, and H. Eldardiry
International Conference on Parallel & Distributed Processing Techniques & Applications 2024

2023

[t1] Resource-Efficient Federated Training Framework for Heterogeneous and Resource-Constrained Environments
H. Desai
MS Thesis

2019

[i1] Secure Two-Party Feature Selection
V. Rao, Y. Long, H. Eldardiry, S. Rane, R. Rossi, and F. Torres
2019

2018

[p1] Computer-Implemented System and Method for Detecting Anomalies using Sample-based Rule Identification
H. Eldardiry, K. Sricharan, D. Greene, and R. Price
PATENT 10140576 GRANTED 2018

2016

[p2] Detecting Anomalies in Work Practice Data by Combining Multiple Domains of Information
E. Bart, J. Liu, H. Eldardiry, and R. Price
PATENT 9264442 GRANTED 2016

[c2] Provenance Segmentation
R. Abreu, D. Archer, J. Cheney, E. Chapman, H. Eldardiry, and A. Gascon
Workshop on Theory and Practice of Provenance (TaPP), Provenance Week 2016

2015

[p3] System and Method for Modeling Behavior Change and Consistency to Detect Malicious Insiders
H. Eldardiry, E. Bart, J. Liu, J. Hanley, R. Price, and O. Brdiczka
PATENT 2908495 PUBLISHED 2015

[c3] Diagnosing Advanced Persistent Threats
R. Abreu, D. Bobrow, H. Eldardiry, A. Feldman, J. Hanley, T. Honda, J. de Kleer, A. Perez, D. Archer, and D. Burke
International Workshop on Principles of Diagnosis (DX) 2015

2014

[p4] Method and Apparatus for Combining Multidimensional Fraud Measurements for Anomaly Detection
Y. Zhang, J. Liu, and H. Eldardiry
PATENT 0244528 PUBLISHED 2014

[j1] Multisource Fusion for Anomaly Detection: using Across-Domain and Across-Time Peer-Group Consistency Checks
H. Eldardiry, K. Sricharan, J. Liu, J. Hanley, O. Brdiczka, R. Price, and E. Bart
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Special Edition on Insider Threat Detection 2014
Impact Factor 3.1

[c4] Ganging Up on Big Data: Computer-Intermediated Collaborative Analysis
M. Stefik and H. Eldardiry
IEEE International Conference on Collaboration Technologies and Systems (CTS) IARPA International Symposium on Collaborative Analysis and Reasoning Systems (CARS) 2014

2013

[c5] Fraud Detection for Healthcare
H. Eldardiry, J. Liu, Y. Zhang, and M. Fromherz
ACM Special Interest Group on Knowledge Discovery and Data Mining 1st Data Mining for Healthcare Workshop (SIGKDD-DMH) 2013
Acceptance Rate 17%

[c6] Multidomain Information Fusion for Insider Threat Detection
H. Eldardiry, E. Bart, J. Liu, J. Hanley, R. Price, and O. Brdiczka
IEEE Security and Privacy Workshop on Research for Insider Threat (WRIT) 2013
Acceptance Rate 37.5%
Best Paper Award