Search Results for author: Benjamin Zi Hao Zhao

Found 13 papers, 5 papers with code

Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories

1 code implementation6 Apr 2023 Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar

We generate 150 examples of misinformation, of which 114 (76%) were remembered by BlenderBot 2 when combined with a personal statement.

Misinformation

DDoD: Dual Denial of Decision Attacks on Human-AI Teams

no code implementations7 Dec 2022 Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko

Artificial Intelligence (AI) systems have been increasingly used to make decision-making processes faster, more accurate, and more efficient.

Decision Making

Unintended Memorization and Timing Attacks in Named Entity Recognition Models

no code implementations4 Nov 2022 Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar

In this paper, we study the setting when NER models are available as a black-box service for identifying sensitive information in user documents and show that these models are vulnerable to membership inference on their training datasets.

Memorization named-entity-recognition +2

MANDERA: Malicious Node Detection in Federated Learning via Ranking

no code implementations22 Oct 2021 Wanchuang Zhu, Benjamin Zi Hao Zhao, Simon Luo, Tongliang Liu, Ke Deng

Although we know that the benign gradients and Byzantine attacked gradients are distributed differently, to detect the malicious gradients is challenging due to (1) the gradient is high-dimensional and each dimension has its unique distribution and (2) the benign gradients and the attacked gradients are always mixed (two-sample test methods cannot apply directly).

Federated Learning

Hidden Backdoors in Human-Centric Language Models

1 code implementation1 May 2021 Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu

We are able to demonstrate the adversary's high success rate of attacks, while maintaining functionality for regular users, with triggers inconspicuous by the human administrators.

Language Modelling Machine Translation +2

On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models

no code implementations12 Mar 2021 Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

In this paper, we take a closer look at another inference attack reported in literature, called attribute inference, whereby an attacker tries to infer missing attributes of a partially known record used in the training dataset by accessing the machine learning model as an API.

Attribute BIG-bench Machine Learning +1

Oriole: Thwarting Privacy against Trustworthy Deep Learning Models

no code implementations23 Feb 2021 Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian

Deep Neural Networks have achieved unprecedented success in the field of face recognition such that any individual can crawl the data of others from the Internet without their explicit permission for the purpose of training high-precision face recognition models, creating a serious violation of privacy.

Data Poisoning Face Recognition +2

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

1 code implementation20 Aug 2020 Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis

In this work, we empirically evaluate various implementations of differential privacy (DP), and measure their ability to fend off real-world privacy attacks, in addition to measuring their core goal of providing accurate classifications.

Cryptography and Security

Deep Learning Backdoors

no code implementations16 Jul 2020 Shaofeng Li, Shiqing Ma, Minhui Xue, Benjamin Zi Hao Zhao

The trigger can take a plethora of forms, including a special object present in the image (e. g., a yellow pad), a shape filled with custom textures (e. g., logos with particular colors) or even image-wide stylizations with special filters (e. g., images altered by Nashville or Gotham filters).

Backdoor Attack

On the Resilience of Biometric Authentication Systems against Random Inputs

1 code implementation13 Jan 2020 Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar

The average false positive rate (FPR) of the system, i. e., the rate at which an impostor is incorrectly accepted as the legitimate user, may be interpreted as a measure of the success probability of such an attack.

BIG-bench Machine Learning

Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization

1 code implementation6 Sep 2019 Shaofeng Li, Minhui Xue, Benjamin Zi Hao Zhao, Haojin Zhu, Xinpeng Zhang

We show that the proposed invisible backdoors can be fairly effective across various DNN models as well as four datasets MNIST, CIFAR-10, CIFAR-100, and GTSRB, by measuring their attack success rates for the adversary, functionality for the normal users, and invisibility scores for the administrators.

On Inferring Training Data Attributes in Machine Learning Models

no code implementations28 Aug 2019 Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar

A number of recent works have demonstrated that API access to machine learning models leaks information about the dataset records used to train the models.

Attribute BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.