Skip to main content

Showing 1–29 of 29 results for author: Bhagoji, A

.
  1. arXiv:2406.02784  [pdf, other

    cs.NI

    Feasibility of State Space Models for Network Traffic Generation

    Authors: Andrew Chu, Xi Jiang, Shinan Liu, Arjun Bhagoji, Francesco Bronzino, Paul Schmitt, Nick Feamster

    Abstract: Many problems in computer networking rely on parsing collections of network traces (e.g., traffic prioritization, intrusion detection). Unfortunately, the availability and utility of these collections is limited due to privacy concerns, data staleness, and low representativeness. While methods for generating data to augment collections exist, they often fall short in replicating the quality of rea… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: 7 pages, 3 figures, 4 tables

  2. "Community Guidelines Make this the Best Party on the Internet": An In-Depth Study of Online Platforms' Content Moderation Policies

    Authors: Brennan Schaffner, Arjun Nitin Bhagoji, Siyuan Cheng, Jacqueline Mei, Jay L. Shen, Grace Wang, Marshini Chetty, Nick Feamster, Genevieve Lakier, Chenhao Tan

    Abstract: Moderating user-generated content on online platforms is crucial for balancing user safety and freedom of speech. Particularly in the United States, platforms are not subject to legal constraints prescribing permissible content. Each platform has thus developed bespoke content moderation policies, but there is little work towards a comparative understanding of these policies across platforms and t… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  3. arXiv:2401.09574  [pdf, ps, other

    cs.LG cs.CR

    Towards Scalable and Robust Model Versioning

    Authors: Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng

    Abstract: As the deployment of deep learning models continues to expand across industries, the threat of malicious incursions aimed at gaining access to these deployed models is on the rise. Should an attacker gain access to a deployed model, whether through server breaches, insider attacks, or model inversion techniques, they can then construct white-box adversarial attacks to manipulate the model's classi… ▽ More

    Submitted 10 March, 2024; v1 submitted 17 January, 2024; originally announced January 2024.

    Comments: Published in IEEE SaTML 2024

  4. arXiv:2310.08543  [pdf, other

    cs.NI

    NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation

    Authors: Xi Jiang, Shinan Liu, Aaron Gember-Jacobson, Arjun Nitin Bhagoji, Paul Schmitt, Francesco Bronzino, Nick Feamster

    Abstract: Datasets of labeled network traces are essential for a multitude of machine learning (ML) tasks in networking, yet their availability is hindered by privacy and maintenance concerns, such as data staleness. To overcome this limitation, synthetic network traces can often augment existing datasets. Unfortunately, current synthetic trace generation methods, which typically produce only aggregated flo… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  5. arXiv:2302.10722  [pdf, other

    cs.LG cs.CR

    Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker

    Authors: Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Ben Y. Zhao, Haitao Zheng, Prateek Mittal

    Abstract: Finding classifiers robust to adversarial examples is critical for their safe deployment. Determining the robustness of the best possible classifier under a given threat model for a given data distribution and comparing it to that achieved by state-of-the-art training methods is thus an important diagnostic tool. In this paper, we find achievable information-theoretic lower bounds on loss in the p… ▽ More

    Submitted 6 December, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

    Comments: NeurIPS 2023 Spotlight

  6. arXiv:2302.02031  [pdf, other

    cs.LG cs.AI cs.CY cs.NI

    Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning

    Authors: Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran

    Abstract: The proliferation of global censorship has led to the development of a plethora of measurement platforms to monitor and expose it. Censorship of the domain name system (DNS) is a key mechanism used across different countries. It is currently detected by applying heuristics to samples of DNS queries and responses (probes) for specific destinations. These heuristics, however, are both platform-speci… ▽ More

    Submitted 15 June, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: To appear in Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD '23)

  7. arXiv:2206.10673  [pdf, ps, other

    cs.CV cs.CR

    Natural Backdoor Datasets

    Authors: Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao

    Abstract: Extensive literature on backdoor poison attacks has studied attacks and defenses for backdoors using "digital trigger patterns." In contrast, "physical backdoors" use physical objects as triggers, have only recently been identified, and are qualitatively different enough to resist all defenses targeting digital trigger backdoors. Research on physical backdoors is limited by access to large dataset… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Comments: 18 pages

  8. arXiv:2206.09868  [pdf, other

    cs.LG cs.CR cs.CV

    Understanding Robust Learning through the Lens of Representation Similarities

    Authors: Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Prateek Mittal, Haitao Zheng

    Abstract: Representation learning, i.e. the generation of representations useful for downstream applications, is a task of fundamental importance that underlies much of the success of deep neural networks (DNNs). Recently, robustness to adversarial examples has emerged as a desirable property for DNNs, spurring the development of robust training methods that account for adversarial examples. In this paper,… ▽ More

    Submitted 15 September, 2022; v1 submitted 20 June, 2022; originally announced June 2022.

    Comments: 35 pages, 29 figures; Accepted to Neurips 2022

  9. arXiv:2206.04677  [pdf, other

    cs.CR cs.CV cs.LG

    On the Permanence of Backdoors in Evolving Models

    Authors: Huiying Li, Arjun Nitin Bhagoji, Yuxin Chen, Haitao Zheng, Ben Y. Zhao

    Abstract: Existing research on training-time attacks for deep neural networks (DNNs), such as backdoors, largely assume that models are static once trained, and hidden backdoors trained into models remain active indefinitely. In practice, models are rarely static but evolve continuously to address distribution drifts in the underlying data. This paper explores the behavior of backdoor attacks in time-varyin… ▽ More

    Submitted 8 February, 2023; v1 submitted 7 June, 2022; originally announced June 2022.

  10. arXiv:2112.06274  [pdf, other

    cs.LG cs.AI cs.CR

    SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification

    Authors: Ashwinee Panda, Saeed Mahloujifar, Arjun N. Bhagoji, Supriyo Chakraborty, Prateek Mittal

    Abstract: Federated learning is inherently vulnerable to model poisoning attacks because its decentralized nature allows attackers to participate with compromised devices. In model poisoning attacks, the attacker reduces the model's performance on targeted sub-tasks (e.g. classifying planes as birds) by uploading "poisoned" updates. In this report we introduce \algoname{}, a novel defense that uses global t… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

  11. arXiv:2110.06904  [pdf, ps, other

    cs.CR cs.AI

    Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

    Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao

    Abstract: In adversarial machine learning, new defenses against attacks on deep learning systems are routinely broken soon after their release by more powerful attacks. In this context, forensic tools can offer a valuable complement to existing defenses, by tracing back a successful attack to its root cause, and offering a path forward for mitigation to prevent similar attacks in the future. In this paper… ▽ More

    Submitted 15 June, 2022; v1 submitted 13 October, 2021; originally announced October 2021.

    Comments: 18 pages

    Journal ref: USENIX Security Symposium 2022

  12. arXiv:2109.03011  [pdf, other

    cs.NI cs.LG cs.PF

    LEAF: Navigating Concept Drift in Cellular Networks

    Authors: Shinan Liu, Francesco Bronzino, Paul Schmitt, Arjun Nitin Bhagoji, Nick Feamster, Hector Garcia Crespo, Timothy Coyle, Brian Ward

    Abstract: Operational networks commonly rely on machine learning models for many tasks, including detecting anomalies, inferring application performance, and forecasting demand. Yet, model accuracy can degrade due to concept drift, whereby the relationship between the features and the target to be predicted changes. Mitigating concept drift is an essential part of operationalizing machine learning models in… ▽ More

    Submitted 2 February, 2023; v1 submitted 7 September, 2021; originally announced September 2021.

    Journal ref: Proc. ACM Netw., Vol. 1, No. CoNEXT2, Article 7. Publication date: September 2023

  13. arXiv:2104.08382  [pdf, other

    cs.LG cs.AI cs.CR

    Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries

    Authors: Arjun Nitin Bhagoji, Daniel Cullina, Vikash Sehwag, Prateek Mittal

    Abstract: Understanding the fundamental limits of robust supervised learning has emerged as a problem of immense interest, from both practical and theoretical standpoints. In particular, it is critical to determine classifier-agnostic bounds on the training loss to establish when learning is possible. In this paper, we determine optimal lower bounds on the cross-entropy loss in the presence of test-time adv… ▽ More

    Submitted 4 June, 2021; v1 submitted 16 April, 2021; originally announced April 2021.

    Comments: 16 pages, 12 figures; Accepted to ICML 2021

  14. arXiv:2102.04291  [pdf, ps, other

    cs.CR

    A Real-time Defense against Website Fingerprinting Attacks

    Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao

    Abstract: Anonymity systems like Tor are vulnerable to Website Fingerprinting (WF) attacks, where a local passive eavesdropper infers the victim's activity. Current WF attacks based on deep learning classifiers have successfully overcome numerous proposed defenses. While recent defenses leveraging adversarial examples offer promise, these adversarial examples can only be computed after the network session h… ▽ More

    Submitted 8 February, 2021; originally announced February 2021.

    Comments: 18 pages

  15. arXiv:2007.04391  [pdf, other

    cs.LG cs.CR

    A Critical Evaluation of Open-World Machine Learning

    Authors: Liwei Song, Vikash Sehwag, Arjun Nitin Bhagoji, Prateek Mittal

    Abstract: Open-world machine learning (ML) combines closed-world models trained on in-distribution data with out-of-distribution (OOD) detectors, which aim to detect and reject OOD inputs. Previous works on open-world ML systems usually fail to test their reliability under diverse, and possibly adversarial conditions. Therefore, in this paper, we seek to understand how resilient are state-of-the-art open-wo… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

    Comments: Presented at the ICML 2020 Workshop on Uncertainty and Robustness in Deep Learning

  16. arXiv:2006.14580  [pdf, ps, other

    cs.CV cs.CR cs.LG

    Backdoor Attacks Against Deep Learning Systems in the Physical World

    Authors: Emily Wenger, Josephine Passananti, Arjun Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao

    Abstract: Backdoor attacks embed hidden malicious behaviors into deep learning models, which only activate and cause misclassifications on model inputs containing a specific trigger. Existing works on backdoor attacks and defenses, however, mostly focus on digital attacks that use digitally generated patterns as triggers. A critical question remains unanswered: can backdoor attacks succeed using physical ob… ▽ More

    Submitted 7 September, 2021; v1 submitted 25 June, 2020; originally announced June 2020.

    Comments: Accepted to the 2021 Conference on Computer Vision and Pattern Recognition (CVPR 2021); 14 pages

  17. arXiv:2005.10884  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking

    Authors: Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal

    Abstract: Localized adversarial patches aim to induce misclassification in machine learning models by arbitrarily modifying pixels within a restricted region of an image. Such attacks can be realized in the physical world by attaching the adversarial patch to the object to be misclassified, and defending against such attacks is an unsolved/open problem. In this paper, we propose a general defense framework… ▽ More

    Submitted 31 March, 2021; v1 submitted 16 May, 2020; originally announced May 2020.

    Comments: USENIX Security Symposium 2021; extended technical report

  18. arXiv:1912.04977  [pdf, other

    cs.LG cs.CR stat.ML

    Advances and Open Problems in Federated Learning

    Authors: Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson , et al. (34 additional authors not shown)

    Abstract: Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. service provider), while kee** the training data decentralized. FL embodies the principles of focused data collection and minimization, and can mitigate many of the systemic privacy risks and costs re… ▽ More

    Submitted 8 March, 2021; v1 submitted 10 December, 2019; originally announced December 2019.

    Comments: Published in Foundations and Trends in Machine Learning Vol 4 Issue 1. See: https://www.nowpublishers.com/article/Details/MAL-083

  19. arXiv:1909.12272  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Lower Bounds on Adversarial Robustness from Optimal Transport

    Authors: Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal

    Abstract: While progress has been made in understanding the robustness of machine learning classifiers to test-time adversaries (evasion attacks), fundamental questions remain unresolved. In this paper, we use optimal transport to characterize the minimum possible loss in an adversarial classification scenario. In this setting, an adversary receives a random labeled example from one of two classes, perturbs… ▽ More

    Submitted 30 October, 2019; v1 submitted 26 September, 2019; originally announced September 2019.

    Comments: Accepted for the 33rd Conference on Neural Information Processing Systems (NeurIPS 2019); 18 pages, 5 figures

  20. arXiv:1905.01726  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples

    Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal

    Abstract: A large body of recent work has investigated the phenomenon of evasion attacks using adversarial examples for deep learning systems, where the addition of norm-bounded perturbations to the test inputs leads to incorrect output classification. Previous work has investigated this phenomenon in closed-world systems where training and test inputs follow a pre-specified distribution. However, real-worl… ▽ More

    Submitted 5 May, 2019; originally announced May 2019.

    Comments: 18 pages, 5 figures, 9 tables

  21. arXiv:1811.12470  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Analyzing Federated Learning through an Adversarial Lens

    Authors: Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin Calo

    Abstract: Federated learning distributes model training among a multitude of agents, who, guided by privacy concerns, perform training using their local data but share only model parameter updates, for iterative aggregation at the server. In this work, we explore the threat of model poisoning attacks on federated learning initiated by a single, non-colluding malicious agent where the adversarial objective i… ▽ More

    Submitted 24 November, 2019; v1 submitted 29 November, 2018; originally announced November 2018.

    Comments: Extended version of paper accepted to ICML 2019, code available at https://github.com/inspire-group/ModelPoisoning; 19 pages, 14 figures

  22. arXiv:1806.01471  [pdf, ps, other

    stat.ML cs.CR cs.LG

    PAC-learning in the presence of evasion adversaries

    Authors: Daniel Cullina, Arjun Nitin Bhagoji, Prateek Mittal

    Abstract: The existence of evasion attacks during the test phase of machine learning algorithms represents a significant challenge to both their deployment and understanding. These attacks can be carried out by adding imperceptible perturbations to inputs to generate adversarial examples and finding effective defenses and detectors has proven to be difficult. In this paper, we step away from the attack-defe… ▽ More

    Submitted 6 June, 2018; v1 submitted 4 June, 2018; originally announced June 2018.

    Comments: 14 pages, 2 figures (minor changes to biblatex output)

  23. arXiv:1804.00866  [pdf, other

    quant-ph

    On the Local Equivalence of 2D Color Codes and Surface Codes with Applications

    Authors: Arun B. Aloshious, Arjun Nitin Bhagoji, Pradeep Kiran Sarvepalli

    Abstract: In recent years, there have been many studies on local stabilizer codes. Under the assumption of translation and scale invariance Yoshida classified such codes. His result implies that translation invariant 2D color codes are equivalent to copies of toric codes. Independently, Bombin, Duclos-Cianci, and Poulin showed that a local translation invariant 2D topological stabilizer code is locally equi… ▽ More

    Submitted 3 April, 2018; originally announced April 2018.

    Comments: LaTeX, 23 pages and 14 figures. This paper supersedes arXiv:1503.03009. Some of the results were presented at 2015 IEEE International Symposium on Information Theory, Hong Kong

  24. arXiv:1802.06430  [pdf, other

    cs.CR cs.CV

    DARTS: Deceiving Autonomous Cars with Toxic Signs

    Authors: Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal

    Abstract: Sign recognition is an integral part of autonomous cars. Any misclassification of traffic signs can potentially lead to a multitude of disastrous consequences, ranging from a life-threatening accident to even a large-scale interruption of transportation services relying on autonomous cars. In this paper, we propose and examine security attacks against sign recognition systems for Deceiving Autonom… ▽ More

    Submitted 31 May, 2018; v1 submitted 18 February, 2018; originally announced February 2018.

    Comments: Submitted to ACM CCS 2018; Extended version of [1801.02780] Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos

  25. arXiv:1801.02780  [pdf, other

    cs.CR cs.LG

    Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos

    Authors: Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang

    Abstract: We propose a new real-world attack against the computer vision based systems of autonomous vehicles (AVs). Our novel Sign Embedding attack exploits the concept of adversarial examples to modify innocuous signs and advertisements in the environment such that they are classified as the adversary's desired traffic sign with high confidence. Our attack greatly expands the scope of the threat posed to… ▽ More

    Submitted 26 March, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

    Comments: Extended abstract accepted for the 1st Deep Learning and Security Workshop; 5 pages, 4 figures

  26. arXiv:1712.09491  [pdf, other

    cs.LG cs.CR cs.CV

    Exploring the Space of Black-box Attacks on Deep Neural Networks

    Authors: Arjun Nitin Bhagoji, Warren He, Bo Li, Dawn Song

    Abstract: Existing black-box attacks on deep neural networks (DNNs) so far have largely focused on transferability, where an adversarial instance generated for a locally trained model can "transfer" to attack other learning models. In this paper, we propose novel Gradient Estimation black-box attacks for adversaries with query access to the target model's class probabilities, which do not rely on transferab… ▽ More

    Submitted 26 December, 2017; originally announced December 2017.

    Comments: 25 pages, 7 figures, 10 tables

  27. arXiv:1704.02654  [pdf, other

    cs.CR cs.LG

    Enhancing Robustness of Machine Learning Systems via Data Transformations

    Authors: Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal

    Abstract: We propose the use of data transformations as a defense against evasion attacks on ML classifiers. We present and investigate strategies for incorporating a variety of data transformations including dimensionality reduction via Principal Component Analysis and data `anti-whitening' to enhance the resilience of machine learning, targeting both the classification and the training phase. We empirical… ▽ More

    Submitted 29 November, 2017; v1 submitted 9 April, 2017; originally announced April 2017.

    Comments: 15 pages

  28. arXiv:1503.03009  [pdf, other

    quant-ph cs.IT

    Equivalence of 2D color codes (without translational symmetry) to surface codes

    Authors: Arjun Bhagoji, Pradeep Sarvepalli

    Abstract: In a recent work, Bombin, Duclos-Cianci, and Poulin showed that every local translationally invariant 2D topological stabilizer code is locally equivalent to a finite number of copies of Kitaev's toric code. For 2D color codes, Delfosse relaxed the constraint on translation invariance and mapped a 2D color code onto three surface codes. In this paper, we propose an alternate map based on linear al… ▽ More

    Submitted 27 April, 2015; v1 submitted 10 March, 2015; originally announced March 2015.

    Comments: Title slightly changed. Revised introduction, with minor corrections and additional references to related work. Expanded version of the manuscript submitted to ISIT 2015

  29. arXiv:1411.6034  [pdf

    astro-ph.IM astro-ph.EP physics.space-ph

    A Nano-satellite Mission to Study Charged Particle Precipitation from the Van Allen Radiation Belts caused due to Seismo-Electromagnetic Emissions

    Authors: Nithin Sivadas, Akshay Gulati, Deepti Kannapan, Ananth Saran Yalamarthy, Ankit Dhiman, Arjun Bhagoji, Athreya Shankar, Nitin Prasad, Harishankar Ramachandran, R. David Koilpillai

    Abstract: In the past decade, several attempts have been made to study the effects of seismo-electromagnetic emissions - an earthquake precursor, on the ionosphere and the radiation belts. The IIT Madras nano-satellite (IITMSAT) mission is designed to make sensitive measurements of charged particle fluxes in a Low Earth Orbit to study the nature of charged particle precipitation from the Van Allen radiation… ▽ More

    Submitted 21 November, 2014; originally announced November 2014.

    Comments: 6 pages, 3 figures, Submitted to and accepted at The 5th Nano-Satellite Symposium