Skip to main content

Showing 1–25 of 25 results for author: Alouani, I

.
  1. arXiv:2406.01708  [pdf, other

    cs.CR cs.CV cs.LG

    Model for Peanuts: Hijacking ML Models without Training Access is Possible

    Authors: Mahmoud Ghorbel, Halima Bouzidi, Ioan Marius Bilasco, Ihsen Alouani

    Abstract: The massive deployment of Machine Learning (ML) models has been accompanied by the emergence of several attacks that threaten their trustworthiness and raise ethical and societal concerns such as invasion of privacy, discrimination risks, and lack of accountability. Model hijacking is one of these attacks, where the adversary aims to hijack a victim model to execute a different task than its origi… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 17 pages, 14 figures, 7 tables

  2. arXiv:2405.04049  [pdf, other

    cs.CR cs.LG cs.NE

    Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks

    Authors: Hamed Poursiami, Ihsen Alouani, Maryam Parsa

    Abstract: As spiking neural networks (SNNs) gain traction in deploying neuromorphic computing solutions, protecting their intellectual property (IP) has become crucial. Without adequate safeguards, proprietary SNN architectures are at risk of theft, replication, or misuse, which could lead to significant financial losses for the owners. While IP protection techniques have been extensively explored for artif… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 7 pages, 7 figures

  3. arXiv:2403.11515  [pdf, other

    cs.CV cs.RO

    SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique

    Abstract: Monocular depth estimation (MDE) has advanced significantly, primarily through the integration of convolutional neural networks (CNNs) and more recently, Transformers. However, concerns about their susceptibility to adversarial attacks have emerged, especially in safety-critical domains like autonomous driving and robotic navigation. Existing approaches for assessing CNN-based depth prediction met… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  4. arXiv:2402.00906  [pdf, other

    cs.CR cs.LG cs.NE

    BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks

    Authors: Hamed Poursiami, Ihsen Alouani, Maryam Parsa

    Abstract: With the mainstream integration of machine learning into security-sensitive domains such as healthcare and finance, concerns about data privacy have intensified. Conventional artificial neural networks (ANNs) have been found vulnerable to several attacks that can leak sensitive data. Particularly, model inversion (MI) attacks enable the reconstruction of data samples that have been used to train t… ▽ More

    Submitted 7 May, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

    Comments: 7 pages, 4 figures, 4 tables

  5. arXiv:2401.02342  [pdf, other

    cs.CR cs.AR cs.LG

    Evasive Hardware Trojan through Adversarial Power Trace

    Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani

    Abstract: The globalization of the Integrated Circuit (IC) supply chain, driven by time-to-market and cost considerations, has made ICs vulnerable to hardware Trojans (HTs). Against this threat, a promising approach is to use Machine Learning (ML)-based side-channel analysis, which has the advantage of being a non-intrusive method, along with efficiently detecting HTs under golden chip-free settings. In thi… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

  6. arXiv:2312.08877  [pdf, other

    cs.LG cs.CR cs.CV

    May the Noise be with you: Adversarial Training without Adversarial Examples

    Authors: Ayoub Arous, Andres F Lopez-Lopera, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: In this paper, we investigate the following question: Can we obtain adversarially-trained models without training on adversarial examples? Our intuition is that training a model with inherent stochasticity, i.e., optimizing the parameters by minimizing a stochastic loss function, yields a robust expectation function that is non-stochastic. In contrast to related methods that introduce noise at the… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  7. arXiv:2312.00173  [pdf, other

    cs.CV cs.CR

    Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

    Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Adversarial patches exemplify the tangible manifestation of the threat posed by adversarial attacks on Machine Learning (ML) models in real-world scenarios. Robustness against these attacks is of the utmost importance when designing computer vision applications, especially for safety-critical domains such as CCTV systems. In most practical situations, monitoring open spaces requires multi-view sys… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

  8. arXiv:2311.12914  [pdf, other

    cs.CV cs.CR

    Attention Deficit is Ordered! Fooling Deformable Vision Transformers with Collaborative Adversarial Patches

    Authors: Quazi Mishkatul Alam, Bilel Tarchoun, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: The latest generation of transformer-based vision models has proven to be superior to Convolutional Neural Network (CNN)-based models across several vision tasks, largely attributed to their remarkable prowess in relation modeling. Deformable vision transformers significantly reduce the quadratic complexity of attention modeling by using sparse attention structures, enabling them to incorporate fe… ▽ More

    Submitted 25 December, 2023; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: 12 pages, 14 figures

    ACM Class: I.4

  9. arXiv:2307.08811  [pdf, other

    cs.LG cs.IT

    Co(ve)rtex: ML Models as storage channels and their (mis-)applications

    Authors: Md Abdullah Al Mamun, Quazi Mishkatul Alam, Erfan Shayegani, Pedram Zaree, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: Machine learning (ML) models are overparameterized to support generality and avoid overfitting. The state of these parameters is essentially a "don't-care" with respect to the primary model provided that this state does not interfere with the primary model. In both hardware and software systems, don't-care states and undefined behavior have been shown to be sources of significant vulnerabilities.… ▽ More

    Submitted 11 May, 2024; v1 submitted 17 July, 2023; originally announced July 2023.

  10. arXiv:2305.11618  [pdf, other

    cs.CR cs.CV

    DAP: A Dynamic Adversarial Patch for Evading Person Detectors

    Authors: Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Patch-based adversarial attacks were proven to compromise the robustness and reliability of computer vision systems. However, their conspicuous and easily detectable nature challenge their practicality in real-world setting. To address this, recent work has proposed using Generative Adversarial Networks (GANs) to generate naturalistic patches that may not attract human attention. However, such app… ▽ More

    Submitted 20 November, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

  11. arXiv:2304.10029  [pdf, other

    cs.CR cs.CV cs.LG

    Jedi: Entropy-based Localization and Removal of Adversarial Patches

    Authors: Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Real-world adversarial physical patches were shown to be successful in compromising state-of-the-art models in a variety of computer vision applications. Existing defenses that are based on either input gradient or features analysis have been compromised by recent GAN-based attacks that generate naturalistic patches. In this paper, we propose Jedi, a new defense against adversarial patches that is… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: 9 pages, 11 figures. To appear in CVPR 2023

  12. arXiv:2303.01819  [pdf, other

    cs.LG cs.CR cs.CV

    Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens

    Authors: Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Machine Learning (ML) architectures have been applied to several applications that involve sensitive data, where a guarantee of users' data privacy is required. Differentially Private Stochastic Gradient Descent (DPSGD) is the state-of-the-art method to train privacy-preserving models. However, DPSGD comes at a considerable accuracy loss leading to sub-optimal privacy/utility trade-offs. Towards i… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  13. arXiv:2303.01734  [pdf, other

    cs.CV cs.CR

    AdvART: Adversarial Art for Camouflaged Object Detection Attacks

    Authors: Amira Guesmi, Ioan Marius Bilasco, Muhammad Shafique, Ihsen Alouani

    Abstract: Physical adversarial attacks pose a significant practical threat as it deceives deep learning systems operating in the real world by producing prominent and maliciously designed physical perturbations. Emphasizing the evaluation of naturalness is crucial in such attacks, as humans can readily detect and eliminate unnatural manipulations. To overcome this limitation, recent work has proposed levera… ▽ More

    Submitted 9 February, 2024; v1 submitted 3 March, 2023; originally announced March 2023.

  14. arXiv:2303.01351  [pdf, other

    cs.CV cs.RO

    APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: In recent times, monocular depth estimation (MDE) has experienced significant advancements in performance, largely attributed to the integration of innovative architectures, i.e., convolutional neural networks (CNNs) and Transformers. Nevertheless, the susceptibility of these models to adversarial attacks has emerged as a noteworthy concern, especially in domains where safety and security are para… ▽ More

    Submitted 20 November, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

  15. arXiv:2211.01182  [pdf, other

    cs.CR

    Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks

    Authors: Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: Machine-learning architectures, such as Convolutional Neural Networks (CNNs) are vulnerable to adversarial attacks: inputs crafted carefully to force the system output to a wrong label. Since machine-learning is being deployed in safety-critical and security-sensitive domains, such attacks may have catastrophic security and safety consequences. In this paper, we propose for the first time to use h… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2006.07700

  16. arXiv:2211.01112  [pdf, other

    cs.CR

    Adversarial Attack on Radar-based Environment Perception Systems

    Authors: Amira Guesmi, Ihsen Alouani

    Abstract: Due to their robustness to degraded capturing conditions, radars are widely used for environment perception, which is a critical task in applications like autonomous vehicles. More specifically, Ultra-Wide Band (UWB) radars are particularly efficient for short range settings as they carry rich information on the environment. Recent UWB-based systems rely on Machine Learning (ML) to exploit the ric… ▽ More

    Submitted 28 November, 2022; v1 submitted 2 November, 2022; originally announced November 2022.

  17. arXiv:2204.09514  [pdf, other

    cs.AR cs.CR cs.CV cs.DC cs.LG

    Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

    Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique

    Abstract: The real-world use cases of Machine Learning (ML) have exploded over the past few years. However, the current computing infrastructure is insufficient to support all real-world applications and scenarios. Apart from high efficiency requirements, modern ML systems are expected to be highly reliable against hardware failures as well as secure against adversarial and IP stealing attacks. Privacy conc… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: Appears at 40th IEEE VLSI Test Symposium (VTS 2022), 14 pages

  18. arXiv:2201.01621  [pdf, other

    cs.CR cs.LG

    ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

    Authors: Amira Guesmi, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Advances in deep learning have enabled a wide range of promising applications. However, these systems are vulnerable to Adversarial Machine Learning (AML) attacks; adversarially crafted perturbations to their inputs could cause them to misclassify. Several state-of-the-art adversarial attacks have demonstrated that they can reliably fool classifiers making these attacks a significant threat. Adver… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

    Comments: 12 pages

  19. arXiv:2110.04887  [pdf, other

    cs.CR cs.LG

    Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

    Authors: Bilel Tarchoun, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub

    Abstract: While machine learning applications are getting mainstream owing to a demonstrated efficiency in solving complex problems, they suffer from inherent vulnerability to adversarial attacks. Adversarial attacks consist of additive noise to an input which can fool a detector. Recently, successful real-world printable adversarial patches were proven efficient against state-of-the-art neural networks. In… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

    Comments: To appear in the 20th CyberWorlds Conference

  20. arXiv:2107.12873  [pdf, other

    cs.CR cs.AI

    PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

    Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani

    Abstract: In the recent years, Portable Document Format, commonly known as PDF, has become a democratized standard for document exchange and dissemination. This trend has been due to its characteristics such as its flexibility and portability across platforms. The widespread use of PDF has installed a false impression of inherent safety among benign users. However, the characteristics of PDF motivated hacke… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

  21. arXiv:2103.06936  [pdf, other

    cs.CR cs.LG

    Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

    Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh

    Abstract: Machine learning-based hardware malware detectors (HMDs) offer a potential game changing advantage in defending systems against malware. However, HMDs suffer from adversarial attacks, can be effectively reverse-engineered and subsequently be evaded, allowing malware to hide from detection. We address this issue by proposing a novel HMDs (Stochastic-HMDs) through approximate computing, which makes… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: 13 pages, 13 figures

  22. arXiv:2101.01416  [pdf, other

    cs.AR

    An Investigation on Inherent Robustness of Posit Data Representation

    Authors: Ihsen Alouani, Anouar Ben Khalifa, Farhad Merchant, Rainer Leupers

    Abstract: As the dimensions and operating voltages of computer electronics shrink to cope with consumers' demand for higher performance and lower power consumption, circuit sensitivity to soft errors increases dramatically. Recently, a new data-type is proposed in the literature called posit data type. Posit arithmetic has absolute advantages such as higher numerical accuracy, speed, and simpler hardware de… ▽ More

    Submitted 5 January, 2021; originally announced January 2021.

    Comments: To appear in VLSID 2021

  23. arXiv:2012.05321  [pdf, other

    cs.LG

    Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters

    Authors: Rida El-Allami, Alberto Marchisio, Muhammad Shafique, Ihsen Alouani

    Abstract: Deep Learning (DL) algorithms have gained popularity owing to their practical problem-solving capacity. However, they suffer from a serious integrity threat, i.e., their vulnerability to adversarial attacks. In the quest for DL trustworthiness, recent works claimed the inherent robustness of Spiking Neural Networks (SNNs) to these attacks, without considering the variability in their structural sp… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Comments: Accepted for publication at the 24th Design, Automation and Test in Europe (DATE'21), February, 2021

  24. Defensive Approximation: Securing CNNs using Approximate Computing

    Authors: Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: In the past few years, an increasing number of machine-learning and deep learning structures, such as Convolutional Neural Networks (CNNs), have been applied to solving a wide range of real-life problems. However, these architectures are vulnerable to adversarial attacks. In this paper, we propose for the first time to use hardware-supported approximate computing to improve the robustness of machi… ▽ More

    Submitted 29 July, 2021; v1 submitted 13 June, 2020; originally announced June 2020.

    Comments: ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2021)

  25. NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips

    Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique

    Abstract: Due to their proven efficiency, machine-learning systems are deployed in a wide range of complex real-life problems. More specifically, Spiking Neural Networks (SNNs) emerged as a promising solution to the accuracy, resource-utilization, and energy-efficiency challenges in machine-learning systems. While these systems are going mainstream, they have inherent security and reliability issues. In thi… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: Accepted for publication at the 2020 International Joint Conference on Neural Networks (IJCNN)