no code implementations • 27 Jul 2022 • Abhishek Chakraborty, Daniel Xing, Yuntao Liu, Ankur Srivastava
The functionality of a deep learning (DL) model can be stolen via model extraction where an attacker obtains a surrogate model by utilizing the responses from a prediction API of the original model.
no code implementations • 7 Jan 2021 • Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
(3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and have similar effectiveness.
Cryptography and Security Hardware Architecture Formal Languages and Automata Theory
no code implementations • 13 Nov 2020 • Abhishek Chakraborty, Ketan Rajawat, Alec Koppel
We consider expected risk minimization problems when the range of the estimator is required to be nonnegative, motivated by the settings of maximum likelihood estimation (MLE) and trajectory optimization.