no code implementations • 12 Feb 2024 • Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran
We propose and analyze an adaptive adversary that can retrain a Trojaned DNN and is also aware of SOTA output-based Trojaned model detectors.
no code implementations • 3 Dec 2022 • Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran
Overfitted models have been shown to be susceptible to query-based attacks such as membership inference attacks (MIAs).
no code implementations • 13 Jul 2022 • Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran
The results show that (i) with Submodular Trojan algorithm, the adversary needs to embed a Trojan trigger into a very small fraction of samples to achieve high accuracy on both Trojan and clean samples, and (ii) the MM Trojan algorithm yields a trained Trojan model that evades detection with probability 1.
no code implementations • 13 Apr 2022 • Dinuka Sahabandu, Sukarno Mertoguno, Radha Poovendran
Empirical evaluations show that using our byte-level features in ML-based ISA identification results in an 8% higher accuracy than the state-of-the-art features based on byte-histograms and byte pattern signatures.
no code implementations • 3 Aug 2021 • Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran
In this paper, we study the controlled islanding problem of a power system under disturbances introduced by a malicious adversary.
1 code implementation • 24 Jul 2020 • Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran
Our game model has imperfect information as the players do not have information about the actions of the opponent.
Computer Science and Game Theory Cryptography and Security