no code implementations • 13 Jul 2024 • Shanghao Shi, Md Shahedul Haque, Abhijeet Parida, Marius George Linguraru, Y. Thomas Hou, Syed Muhammad Anwar, Wenjing Lou
However, in this paper, we propose a novel attack named MediLeak that enables a malicious parameter server to recover high-fidelity patient images from the model updates uploaded by the clients.
no code implementations • 12 Jul 2024 • Ning Wang, Shanghao Shi, Yang Xiao, Yimin Chen, Y. Thomas Hou, Wenjing Lou
Based on the intuition that clustering and subsequent backdoor detection can drastically benefit from knowing client data distributions, we propose a novel data distribution inference mechanism.
no code implementations • 18 Jun 2024 • Md Hasan Shahriar, Ning Wang, Y. Thomas Hou, Wenjing Lou
However, the proliferation of malicious data manipulation attacks against ML, namely adversarial and backdoor attacks, jeopardizes its reliability in safety-critical applications.
1 code implementation • 3 May 2024 • Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou
Our scheme assesses the effectiveness of these queries on a suspect model to determine whether it has been derived from the original model.
1 code implementation • 10 Nov 2023 • Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, Wenjing Lou
The first step is to reconstruct the latent space representations (LSRs) from the aggregated model updates using a closed-form inversion mechanism, leveraging specially crafted linear layers.
1 code implementation • 3 May 2022 • Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou
As ordinary injection attacks disrupt the typical timing properties of the CAN data stream, rule-based intrusion detection systems (IDS) can easily detect them.
no code implementations • 18 Dec 2019 • Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou
On one hand, such work lacks of supporting scalable access control over multiple data users.
Cryptography and Security Databases Distributed, Parallel, and Cluster Computing