Search Results for author: Nael Abu-Ghazaleh

Found 12 papers, 2 papers with code

May the Noise be with you: Adversarial Training without Adversarial Examples

no code implementations12 Dec 2023 Ayoub Arous, Andres F Lopez-Lopera, Nael Abu-Ghazaleh, Ihsen Alouani

We model the propagation of noise through the layers, introducing a closed-form stochastic loss function that encapsulates a noise variance parameter.

Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

no code implementations30 Nov 2023 Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani

Adversarial patches exemplify the tangible manifestation of the threat posed by adversarial attacks on Machine Learning (ML) models in real-world scenarios.

object-detection Object Detection +1

Attention Deficit is Ordered! Fooling Deformable Vision Transformers with Collaborative Adversarial Patches

no code implementations21 Nov 2023 Quazi Mishkatul Alam, Bilel Tarchoun, Ihsen Alouani, Nael Abu-Ghazaleh

The latest generation of transformer-based vision models has proven to be superior to Convolutional Neural Network (CNN)-based models across several vision tasks, largely attributed to their remarkable prowess in relation modeling.

object-detection Object Detection

Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks

no code implementations16 Oct 2023 Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh

Large Language Models (LLMs) are swiftly advancing in architecture and capability, and as they integrate more deeply into complex systems, the urgency to scrutinize their security properties grows.

Adversarial Attack Federated Learning

Jailbreak in pieces: Compositional Adversarial Attacks on Multi-Modal Language Models

no code implementations26 Jul 2023 Erfan Shayegani, Yue Dong, Nael Abu-Ghazaleh

Specifically, we develop cross-modality attacks on alignment where we pair adversarial images going through the vision encoder with textual prompts to break the alignment of the language model.

Language Modelling

Learn to Compress (LtC): Efficient Learning-based Streaming Video Analytics

no code implementations22 Jul 2023 Quazi Mishkatul Alam, Israat Haque, Nael Abu-Ghazaleh

In this paper, we introduce LtC, a collaborative framework between the video source and the analytics server, that efficiently learns to reduce the video streams within an analytics pipeline.

Video Compression

DeepMem: ML Models as storage channels and their (mis-)applications

no code implementations17 Jul 2023 Md Abdullah Al Mamun, Quazi Mishkatul Alam, Erfan Shaigani, Pedram Zaree, Ihsen Alouani, Nael Abu-Ghazaleh

In this paper, we propose a novel information theoretic perspective of the problem; we consider the ML model as a storage channel with a capacity that increases with overparameterization.

Data Augmentation

Jedi: Entropy-based Localization and Removal of Adversarial Patches

no code implementations CVPR 2023 Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael Abu-Ghazaleh, Ihsen Alouani

Jedi tackles the patch localization problem from an information theory perspective; leverages two new ideas: (1) it improves the identification of potential patch regions using entropy analysis: we show that the entropy of adversarial patches is high, even in naturalistic patches; and (2) it improves the localization of adversarial patches, using an autoencoder that is able to complete patch regions from high entropy kernels.

ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

no code implementations5 Jan 2022 Amira Guesmi, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Ihsen Alouani

Thus, we propose ROOM, a novel Real-time Online-Offline attack construction Model where an offline component serves to warm up the online algorithm, making it possible to generate highly successful attacks under time constraints.

Adversarial Attack BIG-bench Machine Learning

Securing Connected Vehicle Applications with an Efficient Dual Cyber-Physical Blockchain Framework

no code implementations15 Feb 2021 Xiangguo Liu, Baiting Luo, Ahmed Abdo, Nael Abu-Ghazaleh, Qi Zhu

While connected vehicle (CV) applications have the potential to revolutionize traditional transportation system, cyber and physical attacks on them could be devastating.

Cryptography and Security

Defensive Approximation: Securing CNNs using Approximate Computing

1 code implementation13 Jun 2020 Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

We show that our approximate computing implementation achieves robustness across a wide range of attack scenarios.

Spectre Returns! Speculation Attacks using the Return Stack Buffer

1 code implementation20 Jul 2018 Esmaeil Mohammadian Koruyeh, Khaled Khasawneh, Chengyu Song, Nael Abu-Ghazaleh

In particular, on Core-i7 Skylake and newer processors (but not on Intel's Xeon processor line), a patch called RSB refilling is used to address a vulnerability when the RSB underfills; this defense interferes with SpectreRSB's ability to launch attacks that switch into the kernel.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.