Search Results for author: Vasisht Duddu

Found 14 papers, 4 papers with code

SoK: Unintended Interactions among Machine Learning Defenses and Risks

1 code implementation7 Dec 2023 Vasisht Duddu, Sebastian Szyller, N. Asokan

We survey existing literature on unintended interactions, accommodating them within our framework.

Fairness Memorization

Attesting Distributional Properties of Training Data for Machine Learning

1 code implementation18 Aug 2023 Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan

The success of machine learning (ML) has been accompanied by increased concerns about its trustworthiness.

GrOVe: Ownership Verification of Graph Neural Networks using Embeddings

no code implementations17 Apr 2023 Asim Waheed, Vasisht Duddu, N. Asokan

In non-graph settings, fingerprinting models, or the data used to build them, have shown to be a promising approach toward ownership verification.

Model extraction

On the Alignment of Group Fairness with Attribute Privacy

no code implementations18 Nov 2022 Jan Aalmoes, Vasisht Duddu, Antoine Boutet

We are the first to demonstrate the alignment of group fairness with the specific privacy notion of attribute privacy in a blackbox setting.

Attribute Fairness +1

Inferring Sensitive Attributes from Model Explanations

1 code implementation21 Aug 2022 Vasisht Duddu, Antoine Boutet

We focus on the specific privacy risk of attribute inference attack wherein an adversary infers sensitive attributes of an input (e. g., race and sex) given its model explanations.

Attribute Inference Attack

Dikaios: Privacy Auditing of Algorithmic Fairness via Attribute Inference Attacks

no code implementations4 Feb 2022 Jan Aalmoes, Vasisht Duddu, Antoine Boutet

This unpredictable effect of fairness mechanisms on the attribute privacy risk is an important limitation on their utilization which has to be accounted by the model builder.

Attribute Fairness +1

SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning

no code implementations4 Dec 2021 Vasisht Duddu, Sebastian Szyller, N. Asokan

Using ten benchmark datasets, we show that SHAPr is indeed effective in estimating susceptibility of training data records to MIAs.

BIG-bench Machine Learning Data Valuation +2

Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Models

no code implementations26 Apr 2021 Sebastian Szyller, Vasisht Duddu, Tommi Gröndahl, N. Asokan

We present a framework for conducting such attacks, and show that an adversary can successfully extract functional surrogate models by querying $F_V$ using data from the same domain as the training data for $F_V$.

Generative Adversarial Network Image Classification +5

Quantifying (Hyper) Parameter Leakage in Machine Learning

no code implementations31 Oct 2019 Vasisht Duddu, D. Vijay Rao

While the attacks proposed in literature are empirical, there is a need for a theoretical framework to measure the information leaked under such extraction attacks.

BIG-bench Machine Learning Inference Attack +1

Fault Tolerance of Neural Networks in Adversarial Settings

no code implementations30 Oct 2019 Vasisht Duddu, N. Rajesh Pillai, D. Vijay Rao, Valentina E. Balas

Specifically, this work studies the impact of the fault tolerance of the Neural Network on training the model by adding noise to the input (Adversarial Robustness) and noise to the gradients (Differential Privacy).

Adversarial Robustness Fairness

Towards Enhancing Fault Tolerance in Neural Networks

1 code implementation6 Jul 2019 Vasisht Duddu, D. Vijay Rao, Valentina E. Balas

In the view of difference in functionality, a Neural Network is modelled as two separate networks, i. e, the Feature Extractor with unsupervised learning objective and the Classifier with a supervised learning objective.

Benchmarking

Fuzzy Graph Modelling of Anonymous Networks

no code implementations30 Mar 2018 Vasisht Duddu, Debasis Samanta, D. Vijay Rao

Anonymous networks have enabled secure and anonymous communication between the users and service providers while maintaining their anonymity and privacy.

Cryptography and Security Networking and Internet Architecture

Cannot find the paper you are looking for? You can Submit a new open access paper.