Search Results for author: Y. Thomas Hou

Found 9 papers, 3 papers with code

Harvesting Private Medical Images in Federated Learning Systems with Crafted Models

no code implementations13 Jul 2024 Shanghao Shi, Md Shahedul Haque, Abhijeet Parida, Marius George Linguraru, Y. Thomas Hou, Syed Muhammad Anwar, Wenjing Lou

However, in this paper, we propose a novel attack named MediLeak that enables a malicious parameter server to recover high-fidelity patient images from the model updates uploaded by the clients.

Federated Learning Privacy Preserving

BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning

no code implementations12 Jul 2024 Ning Wang, Shanghao Shi, Yang Xiao, Yimin Chen, Y. Thomas Hou, Wenjing Lou

Based on the intuition that clustering and subsequent backdoor detection can drastically benefit from knowing client data distributions, we propose a novel data distribution inference mechanism.

Anomaly Detection Backdoor Attack +3

NoiSec: Harnessing Noise for Security against Adversarial and Backdoor Attacks

no code implementations18 Jun 2024 Md Hasan Shahriar, Ning Wang, Y. Thomas Hou, Wenjing Lou

However, the proliferation of malicious data manipulation attacks against ML, namely adversarial and backdoor attacks, jeopardizes its reliability in safety-critical applications.

ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models

1 code implementation3 May 2024 Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou

Our scheme assesses the effectiveness of these queries on a suspect model to determine whether it has been derived from the original model.

Learning-augmented Online Minimization of Age of Information and Transmission Costs

no code implementations5 Mar 2024 Zhongdong Liu, Keyuan Zhang, Bin Li, Yin Sun, Y. Thomas Hou, Bo Ji

To address this challenge, we develop a robust online algorithm to minimize the sum of transmission and staleness costs, ensuring a worst-case performance guarantee.

Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction

1 code implementation10 Nov 2023 Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, Wenjing Lou

The first step is to reconstruct the latent space representations (LSRs) from the aggregated model updates using a closed-form inversion mechanism, leveraging specially crafted linear layers.

Federated Learning

CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level

1 code implementation3 May 2022 Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou

As ordinary injection attacks disrupt the typical timing properties of the CAN data stream, rule-based intrusion detection systems (IDS) can easily detect them.

Intrusion Detection Time Series +1

AoI-minimizing Scheduling in UAV-relayed IoT Networks

no code implementations12 Jul 2021 Biplav Choudhury, Vijay K. Shah, Aidin Ferdowsi, Jeffrey H. Reed, Y. Thomas Hou

Our simulation results show that DQN-based scheduler outperforms MAF-MAD scheduler and three other baseline schedulers, i. e., Maximal AoI First (MAF), Round Robin (RR) and Random, employed at both hops under general conditions when the network is small (with 10's of IoT devices).

Scheduling

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data

no code implementations18 Dec 2019 Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou

On one hand, such work lacks of supporting scalable access control over multiple data users.

Cryptography and Security Databases Distributed, Parallel, and Cluster Computing

Cannot find the paper you are looking for? You can Submit a new open access paper.