no code implementations • 8 Dec 2023 • Xiaoyun Xu, Shujian Yu, Jingzheng Wu, Stjepan Picek
However, these methods still follow the design of traditional supervised adversarial training, limiting the potential of adversarial training on ViTs.
no code implementations • 6 Dec 2023 • Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek
This work shows that by using adversarial personas, one can overcome safety mechanisms set out by ChatGPT and Bard.
no code implementations • 20 Nov 2023 • Claude Carlet, Marko Ðurasevic, Bruno Gašperov, Domagoj Jakobovic, Luca Mariot, Stjepan Picek
Rotation symmetric Boolean functions represent an interesting class of Boolean functions as they are relatively rare compared to general Boolean functions.
no code implementations • 20 Nov 2023 • Claude Carlet, Marko Ðurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek
This paper provides a detailed experimentation with evolutionary algorithms with the goal of evolving (anti-)self-dual bent Boolean functions.
no code implementations • 13 Nov 2023 • Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek
Our findings highlight the urgency to address such vulnerabilities and provide insights into potential countermeasures for securing DNN models against backdoors on tabular data.
no code implementations • 24 Oct 2023 • Yang Chen, Stjepan Picek, Zhonglin Ye, Zhaoyang Wang, Haixing Zhao
We use a momentum gradient mechanism to choose the attack node features in the feature selection module.
no code implementations • 12 Oct 2023 • Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek
Optical Character Recognition (OCR) is a widely used tool to extract text from scanned documents.
no code implementations • 4 Aug 2023 • Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu
In this work, we are the first (to the best of our knowledge) to investigate label inference attacks on VFL using a zero-background knowledge strategy.
no code implementations • 9 May 2023 • Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek
Recently, researchers have successfully employed Graph Neural Networks (GNNs) to build enhanced recommender systems due to their capability to learn patterns from the interaction between involved entities.
no code implementations • 5 Apr 2023 • Jing Xu, Gorka Abad, Stjepan Picek
There is no work analyzing and explaining the backdoor attack performance when injecting triggers into the most important or least important area in the sample, which we refer to as trigger-injecting strategies MIAS and LIAS, respectively.
no code implementations • 19 Feb 2023 • Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek
Recent studies demonstrate that collaborative learning models, specifically federated learning, are vulnerable to security and privacy attacks such as model inference and backdoor attacks.
no code implementations • 13 Feb 2023 • Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta
Deep neural networks (DNNs) have demonstrated remarkable performance across various tasks, including image and speech recognition.
Ranked #1 on
Image Classification
on DVS128 Gesture
no code implementations • 12 Feb 2023 • Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek
By observing the range of possible changes an operator can provide, as well as relative probabilities of specific transitions in the objective space, one can use this information to design a more effective combination of genetic operators.
1 code implementation • 9 Feb 2023 • Xiaoyun Xu, Guilherme Perin, Stjepan Picek
In this paper, we propose a novel method, IB-RAR, which uses Information Bottleneck (IB) to strengthen adversarial robustness for both adversarial training and non-adversarial-trained methods.
no code implementations • 3 Feb 2023 • Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti
Nevertheless, it is vulnerable to backdoor attacks that modify the training set to embed a secret functionality in the trained model.
no code implementations • 1 Feb 2023 • Xiaoyun Xu, Oguzhan Ersoy, Stjepan Picek
This paper proposes a backdoor detection method by utilizing a special type of adversarial attack, universal adversarial perturbation (UAP), and its similarities with a backdoor trigger.
no code implementations • 9 Dec 2022 • Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Sihem Mesnager, Stjepan Picek
One example of such a property is called boomerang uniformity, which helps to be resilient against boomerang attacks.
no code implementations • 21 Nov 2022 • Claude Carlet, Luca Mariot, Luca Manzoni, Stjepan Picek
The design of binary error-correcting codes is a challenging optimization problem with several applications in telecommunications and storage, which has also been addressed with metaheuristic techniques and evolutionary algorithms.
1 code implementation • 6 Nov 2022 • Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti
This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic transformations of malicious samples through guitar effects.
no code implementations • 28 Oct 2022 • Mauro Conti, Jiaxin Li, Stjepan Picek
Membership Inference Attacks (MIAs) infer whether a data point is in the training data of a machine learning model.
no code implementations • 22 Aug 2022 • Rui Wang, Xingkai Wang, Huanhuan Chen, Jérémie Decouchant, Stjepan Picek, Nikolaos Laoutaris, Kaitai Liang
It is therefore currently impossible to ensure Byzantine robustness and confidentiality of updates without assuming a semi-honest majority.
no code implementations • 27 Jul 2022 • Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu
Even in those scenarios, our label-only MIA achieves a better attack performance in most cases.
no code implementations • 4 Mar 2022 • Stefanos Koffas, Stjepan Picek, Mauro Conti
It was recently shown that countermeasures in image classification, like Neural Cleanse and ABS, could be bypassed with dynamic triggers that are effective regardless of their pattern and location.
no code implementations • 17 Feb 2022 • Claude Carlet, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek
Finding balanced, highly nonlinear Boolean functions is a difficult problem where it is not known what nonlinearity values are possible to be reached in general.
no code implementations • 16 Feb 2022 • Carlos Coello Coello, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek
While there is no reason to doubt the performance of CMA-ES, the lack of comparison with different metaheuristics and results for the challenge-response pair-based attack leaves open questions if there are better-suited metaheuristics for the problem.
no code implementations • 16 Feb 2022 • Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati
Finding Boolean functions suitable for cryptographic primitives is a complex combinatorial optimization problem, since they must satisfy several properties to resist cryptanalytic attacks, and the space is very large, which grows super exponentially with the number of input variables.
no code implementations • 7 Feb 2022 • Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek
To further explore the properties of two backdoor attacks in Federated GNNs, we evaluate the attack performance for a different number of clients, trigger sizes, poisoning intensities, and trigger densities.
no code implementations • 25 Nov 2021 • Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati
Combinatorial designs provide an interesting source of optimization problems.
no code implementations • 21 Oct 2021 • Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek
The experiments show that our framework can verify the ownership of GNN models with a very high probability (up to $99\%$) for both tasks.
no code implementations • 15 Oct 2021 • Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci
We consider the setting where the attacker can access an ATM PIN pad of the same brand/model as the target one.
no code implementations • 29 Sep 2021 • Lucija Planinić, Marko Đurasević, Stjepan Picek, Domagoj Jakobovic
The winning trees can be used to initialize the population for the new GP run and result in improved convergence and fitness, provided some conditions on the size of solutions and winning trees are fulfilled.
no code implementations • 30 Jul 2021 • Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudible triggers.
Automatic Speech Recognition
Automatic Speech Recognition (ASR)
+2
1 code implementation • 25 May 2021 • Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati
Reversible Cellular Automata (RCA) are a particular kind of shift-invariant transformations characterized by a dynamics composed only of disjoint cycles.
no code implementations • 24 May 2021 • Lucija Planinic, Marko Djurasevic, Luca Mariot, Domagoj Jakobovic, Stjepan Picek, Carlos Coello Coello
This paper investigates the influence of genotype size on evolutionary algorithms' performance.
no code implementations • 8 Apr 2021 • Jing Xu, Minhui, Xue, Stjepan Picek
Backdoor attacks represent a serious threat to neural network models.
1 code implementation • 1 Dec 2020 • Burak Yildiz, Hayley Hung, Jesse H. Krijthe, Cynthia C. S. Liem, Marco Loog, Gosia Migut, Frans Oliehoek, Annibale Panichella, Przemyslaw Pawelczak, Stjepan Picek, Mathijs de Weerdt, Jan van Gemert
We present ReproducedPapers. org: an open online repository for teaching and structuring machine learning reproducibility.
no code implementations • 27 Apr 2020 • Marko Durasevic, Domagoj Jakobovic, Marcella Scoczynski Ribeiro Martins, Stjepan Picek, Markus Wagner
Genetic programming is an often-used technique for symbolic regression: finding symbolic expressions that match data from an unknown function.
1 code implementation • 23 Apr 2020 • Domagoj Jakobovic, Luca Manzoni, Luca Mariot, Stjepan Picek, Mauro Castelli
In the second experiment, we train a GP convolutional predictor on two degraded images, removing around 20% of their pixels.
no code implementations • 23 Apr 2020 • Luca Manzoni, Domagoj Jakobovic, Luca Mariot, Stjepan Picek, Mauro Castelli
Tasks related to Natural Language Processing (NLP) have recently been the focus of a large research endeavor by the machine learning community.
no code implementations • 13 Feb 2019 • Domagoj Jakobovic, Stjepan Picek, Marcella S. R. Martins, Markus Wagner
Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic algorithms.