Search Results for author: Wenhai Sun

Found 3 papers, 0 papers with code

Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack

no code implementations1 Nov 2020 Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li

In MDP, we first propose a novel real-time model extraction status assessment scheme called Monitor to evaluate the situation of the model.

Model extraction

Mitigating Query-Flooding Parameter Duplication Attack on Regression Models with High-Dimensional Gaussian Mechanism

no code implementations6 Feb 2020 Xiaoguang Li, Hui Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Zhu

Public intelligent services enabled by machine learning algorithms are vulnerable to model extraction attacks that can steal confidential information of the learning models through public queries.

Model extraction regression

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data

no code implementations18 Dec 2019 Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou

On one hand, such work lacks of supporting scalable access control over multiple data users.

Cryptography and Security Databases Distributed, Parallel, and Cluster Computing

Cannot find the paper you are looking for? You can Submit a new open access paper.