no code implementations • 8 Jun 2023 • Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple
We also develop a novel aggregation scheme within the encrypted domain, utilizing users' non-poisoning rates, to effectively address data poisoning attacks while ensuring privacy is preserved by the proposed encryption scheme.
no code implementations • 20 Mar 2023 • Charuka Herath, Yogachandran Rahulamathavan, Xiaolan Liu
However, the aggregation process of local model updates to obtain a global model in federated learning is susceptible to malicious attacks, such as backdoor poisoning, label-flipping, and membership inference.
no code implementations • 25 Mar 2022 • Madushi H. Pathmaperuma, Yogachandran Rahulamathavan, Safak Dogan, Ahmet M. Kondoz, Rongxing Lu
Despite the widespread use of encryption techniques to provide confidentiality over Internet communications, mobile device users are still susceptible to privacy and security risks.
1 code implementation • 4 Apr 2020 • Yogachandran Rahulamathavan, Safak Dogan, Xiyu Shi, Rongxing Lu, Muttukrishnan Rajarajan, Ahmet Kondoz
Privacy-preserving applications allow users to perform on-line daily actions without leaking sensitive information.
Cryptography and Security
no code implementations • 14 Mar 2014 • Segun Aina, Yogachandran Rahulamathavan, Raphael C. -W. Phan, Jonathon A. Chambers
To date, most facial expression analysis have been based on posed image databases and is carried out without being able to protect the identity of the subjects whose expressions are being recognised.