Yong Guan - Academia.edu (original) (raw)
Uploads
Papers by Yong Guan
The conventional information leakage metrics assume that an adversary has complete knowledge of t... more The conventional information leakage metrics assume that an adversary has complete knowledge of the distribution of the mechanism used to disclose information correlated with the sensitive attributes of a system. The only uncertainty arises from the specific realizations that are drawn from this distribution. This assumption does not hold in various practical scenarios where an adversary usually lacks complete information about the joint statistics of the private, utility, and the disclosed data. As a result, the typical information leakage metrics fail to measure the leakage appropriately. In this paper, we introduce multiple new versions of the traditional information-theoretic leakage metrics, that aptly represent information leakage for an adversary who lacks complete knowledge of the joint data statistics, and we provide insights into the potential uses of each. We experiment on a real-world dataset to further demonstrate how the introduced leakage metrics compare with the conv...
Advances in Digital Forensics XIV, 2018
Fourth IEEE International Symposium on Network Computing and Applications, 2005
IFIP — The International Federation for Information Processing
2012 46th Annual Conference on Information Sciences and Systems (CISS), 2012
IEEE/ACM Transactions on Networking, 2010
IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, 2008
IEEE Transactions on Industrial Informatics, 2018
ACM Transactions on Cyber-Physical Systems, 2019
Simulink is widely used for model-driven development (MDD) of cyber-physical systems. Typically, ... more Simulink is widely used for model-driven development (MDD) of cyber-physical systems. Typically, the Simulink-based development starts with Stateflow modeling, followed by simulation, validation, and code generation mapped to physical execution platforms. However, recent trends have raised the demands of rigorous verification on safety-critical applications to prevent intrinsic development faults and improve the system dependability, which is unfortunately challenging. Even though the constructed Stateflow model and the generated code pass the validation of Simulink Design Verifier and Simulink Polyspace, respectively, the system may still fail due to some implicit defects contained in the design model (design defect) and the generated code (implementation defects). In this article, we bridge the Stateflow-based MDD and a well-defined rigorous verification to reduce development faults. First, we develop a self-contained toolkit to translate a Stateflow model into timed automata, whe...
2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007
2006 IEEE International Performance Computing and Communications Conference, 2006
2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975)
Third IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2007), 2007
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
IFIP Advances in Information and Communication Technology, 2012
2010 IEEE 30th International Conference on Distributed Computing Systems, 2010
2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), 2012
2013 IEEE Global Communications Conference (GLOBECOM), 2013
Proceedings 22nd International Conference on Distributed Computing Systems
2006 Securecomm and Workshops, 2006
The conventional information leakage metrics assume that an adversary has complete knowledge of t... more The conventional information leakage metrics assume that an adversary has complete knowledge of the distribution of the mechanism used to disclose information correlated with the sensitive attributes of a system. The only uncertainty arises from the specific realizations that are drawn from this distribution. This assumption does not hold in various practical scenarios where an adversary usually lacks complete information about the joint statistics of the private, utility, and the disclosed data. As a result, the typical information leakage metrics fail to measure the leakage appropriately. In this paper, we introduce multiple new versions of the traditional information-theoretic leakage metrics, that aptly represent information leakage for an adversary who lacks complete knowledge of the joint data statistics, and we provide insights into the potential uses of each. We experiment on a real-world dataset to further demonstrate how the introduced leakage metrics compare with the conv...
Advances in Digital Forensics XIV, 2018
Fourth IEEE International Symposium on Network Computing and Applications, 2005
IFIP — The International Federation for Information Processing
2012 46th Annual Conference on Information Sciences and Systems (CISS), 2012
IEEE/ACM Transactions on Networking, 2010
IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, 2008
IEEE Transactions on Industrial Informatics, 2018
ACM Transactions on Cyber-Physical Systems, 2019
Simulink is widely used for model-driven development (MDD) of cyber-physical systems. Typically, ... more Simulink is widely used for model-driven development (MDD) of cyber-physical systems. Typically, the Simulink-based development starts with Stateflow modeling, followed by simulation, validation, and code generation mapped to physical execution platforms. However, recent trends have raised the demands of rigorous verification on safety-critical applications to prevent intrinsic development faults and improve the system dependability, which is unfortunately challenging. Even though the constructed Stateflow model and the generated code pass the validation of Simulink Design Verifier and Simulink Polyspace, respectively, the system may still fail due to some implicit defects contained in the design model (design defect) and the generated code (implementation defects). In this article, we bridge the Stateflow-based MDD and a well-defined rigorous verification to reduce development faults. First, we develop a self-contained toolkit to translate a Stateflow model into timed automata, whe...
2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007
2006 IEEE International Performance Computing and Communications Conference, 2006
2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975)
Third IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2007), 2007
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009
IFIP Advances in Information and Communication Technology, 2012
2010 IEEE 30th International Conference on Distributed Computing Systems, 2010
2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), 2012
2013 IEEE Global Communications Conference (GLOBECOM), 2013
Proceedings 22nd International Conference on Distributed Computing Systems
2006 Securecomm and Workshops, 2006