Search Results for author: Saurabh Bagchi

Found 26 papers, 6 papers with code

Leak and Learn: An Attacker's Cookbook to Train Using Leaked Data from Federated Learning

no code implementations26 Mar 2024 Joshua C. Zhao, Ahaan Dabholkar, Atul Sharma, Saurabh Bagchi

We demonstrate the effectiveness of both GI and LLL attacks in maliciously training models using the leaked data more accurately than a benign federated learning strategy.

Federated Learning

Benchmarking Algorithms for Federated Domain Generalization

1 code implementation11 Jul 2023 Ruqi Bai, Saurabh Bagchi, David I. Inouye

We then apply our methodology to evaluate 14 Federated DG methods, which include centralized DG methods adapted to the FL context, FL methods that handle client heterogeneity, and methods designed specifically for Federated DG.

Benchmarking Domain Generalization +1

The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning

no code implementations CVPR 2023 Joshua C. Zhao, Ahmed Roushdy Elkordy, Atul Sharma, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi

We show that this resource overhead is caused by an incorrect perspective in all prior work that treats an attack on an aggregate update in the same way as an individual update with a larger batch size.

Federated Learning

LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation

1 code implementation21 Mar 2023 Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi

When both FedAVG and secure aggregation are used, there is no current method that is able to attack multiple clients concurrently in a federated learning setting.

Federated Learning Reconstruction Attack

SmartAdapt: Multi-Branch Object Detection Framework for Videos on Mobiles

no code implementations CVPR 2022 ran Xu, Fangzhou Mu, Jayoung Lee, Preeti Mukherjee, Somali Chaterji, Saurabh Bagchi, Yin Li

In this paper, we ask, and answer, the wide-ranging question across all MBODFs: How to expose the right set of execution branches and then how to schedule the optimal one at inference time?

object-detection Video Object Detection

TESSERACT: Gradient Flip Score to Secure Federated Learning Against Model Poisoning Attacks

no code implementations19 Oct 2021 Atul Sharma, Wei Chen, Joshua Zhao, Qiang Qiu, Somali Chaterji, Saurabh Bagchi

The attack uses the intuition that simply by changing the sign of the gradient updates that the optimizer is computing, for a set of malicious clients, a model can be diverted from the optima to increase the test error rate.

Federated Learning Model Poisoning

Resilience to Multiple Attacks via Adversarially Trained MIMO Ensembles

no code implementations29 Sep 2021 Ruqi Bai, David I. Inouye, Saurabh Bagchi

We show that ensemble methods can improve adversarial robustness to multiple attacks if the ensemble is \emph{adversarially diverse}, which is defined by two properties: 1) the sub-models are adversarially robust themselves and yet 2) adversarial attacks do not transfer easily between sub-models.

Adversarial Robustness

Automatic Forecasting via Meta-Learning

no code implementations29 Sep 2021 Mustafa Abdallah, Ryan Rossi, Kanak Mahadik, Sungchul Kim, Handong Zhao, Haoliang Wang, Saurabh Bagchi

In this work, we develop techniques for fast automatic selection of the best forecasting model for a new unseen time-series dataset, without having to first train (or evaluate) all the models on the new time-series data to select the best one.

Meta-Learning Time Series +1

Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests

2 code implementations NeurIPS 2020 Sean Kulinski, Saurabh Bagchi, David I. Inouye

While previous distribution shift detection approaches can identify if a shift has occurred, these approaches cannot localize which specific features have caused a distribution shift -- a critical step in diagnosing or fixing any underlying issue.

Time Series Time Series Analysis

The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game

no code implementations5 Mar 2021 Mustafa Abdallah, Timothy Cason, Saurabh Bagchi, Shreyas Sundaram

Each node has a certain value to the attacker and the defender, along with a probability of being successfully compromised, which is a function of the investments in that node by both players.

Decision Making

Anomaly Detection through Transfer Learning in Agriculture and Manufacturing IoT Systems

no code implementations11 Feb 2021 Mustafa Abdallah, Wo Jae Lee, Nithin Raghunathan, Charilaos Mousoulis, John W. Sutherland, Saurabh Bagchi

While there is a rich literature on anomaly detection in many IoT-based systems, there is no existing work that documents the use of ML models for anomaly detection in digital agriculture and in smart manufacturing systems.

Anomaly Detection Time Series Analysis +1

Exploring Adversarial Examples via Invertible Neural Networks

no code implementations24 Dec 2020 Ruqi Bai, Saurabh Bagchi, David I. Inouye

We propose a new way of achieving such understanding through a recent development, namely, invertible neural models with Lipschitz continuous mapping functions from the input to the output.

Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems

no code implementations12 Nov 2020 Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making.

Decision Making

ApproxDet: Content and Contention-Aware Approximate Object Detection for Mobiles

1 code implementation21 Oct 2020 ran Xu, Chen-Lin Zhang, Pengcheng Wang, Jayoung Lee, Subrata Mitra, Somali Chaterji, Yin Li, Saurabh Bagchi

In this paper we introduce ApproxDet, an adaptive video object detection framework for mobile devices to meet accuracy-latency requirements in the face of changing content and resource contention scenarios.

Object object-detection +3

Can we Generalize and Distribute Private Representation Learning?

1 code implementation5 Oct 2020 Sheikh Shams Azam, Taejin Kim, Seyyedali Hosseinalipour, Carlee Joe-Wong, Saurabh Bagchi, Christopher Brinton

We study the problem of learning representations that are private yet informative, i. e., provide information about intended "ally" targets while hiding sensitive "adversary" attributes.

Federated Learning Generative Adversarial Network +2

BASCPS: How does behavioral decision making impact the security of cyber-physical systems?

no code implementations4 Apr 2020 Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

We model the security investment decisions made by the defenders as a security game.

Cryptography and Security Computer Science and Game Theory

Distributed Inference with Sparse and Quantized Communication

no code implementations2 Apr 2020 Aritra Mitra, John A. Richards, Saurabh Bagchi, Shreyas Sundaram

We prove that our rule guarantees convergence to the true state exponentially fast almost surely despite sparse communication, and that it has the potential to significantly reduce information flow from uninformative agents to informative agents.

Quantization

AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming

no code implementations16 Dec 2019 Nawanol Theera-Ampornpunt, Shikhar Suryavansh, Sameer Manchanda, Rajesh Panta, Kaustubh Joshi, Mostafa Ammar, Mung Chiang, Saurabh Bagchi

AppStreamer can, therefore, keep only a small part of the files on the device, akin to a "cache", and download the remainder from a cloud storage server or a nearby edge server when it predicts that the app will need them in the near future.

SimVecs: Similarity-Based Vectors for Utterance Representation in Conversational AI Systems

no code implementations CONLL 2019 Ashraf Mahgoub, Youssef Shahin, Riham Mansour, Saurabh Bagchi

Conversational AI systems are gaining a lot of attention recently in both industrial and scientific domains, providing a natural way of interaction between customers and adaptive intelligent systems.

Sentence

HAWKEYE: Adversarial Example Detector for Deep Neural Networks

no code implementations22 Sep 2019 Jinkyu Koo, Michael Roth, Saurabh Bagchi

Adversarial examples (AEs) are images that can mislead deep neural network (DNN) classifiers via introducing slight perturbations into original images.

Quantization

ApproxNet: Content and Contention-Aware Video Analytics System for Embedded Clients

no code implementations28 Aug 2019 Ran Xu, Rakesh Kumar, Pengcheng Wang, Peter Bai, Ganga Meghanath, Somali Chaterji, Subrata Mitra, Saurabh Bagchi

None of the current approximation techniques for object classification DNNs can adapt to changing runtime conditions, e. g., changes in resource availability on the device, the content characteristics, or requirements from the user.

Object Detection

ATHENA: Automated Tuning of Genomic Error Correction Algorithms using Language Models

no code implementations30 Dec 2018 Mustafa Abdallah, Ashraf Mahgoub, Saurabh Bagchi, Somali Chaterji

The performance of most error-correction algorithms that operate on genomic sequencer reads is dependent on the proper choice of its configuration parameters, such as the value of k in k-mer based techniques.

Language Modelling

Cannot find the paper you are looking for? You can Submit a new open access paper.