Skip to main content

Showing 1–30 of 30 results for author: Celik, B

.
  1. arXiv:2404.06407  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Rethinking How to Evaluate Language Model Jailbreak

    Authors: Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik

    Abstract: Large language models (LLMs) have become increasingly integrated with various applications. To ensure that LLMs do not generate unsafe responses, they are aligned with safeguards that specify what content is restricted. However, such alignment can be bypassed to produce prohibited content using a technique commonly referred to as jailbreak. Different systems have been proposed to perform the jailb… ▽ More

    Submitted 7 May, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

  2. arXiv:2401.12317  [pdf, ps, other

    cs.RO cs.SE

    Software Engineering for Robotics: Future Research Directions; Report from the 2023 Workshop on Software Engineering for Robotics

    Authors: Claire Le Goues, Sebastian Elbaum, David Anthony, Z. Berkay Celik, Mauricio Castillo-Effen, Nikolaus Correll, Pooyan Jamshidi, Morgan Quigley, Trenton Tabor, Qi Zhu

    Abstract: Robots are experiencing a revolution as they permeate many aspects of our daily lives, from performing house maintenance to infrastructure inspection, from efficiently warehousing goods to autonomous vehicles, and more. This technical progress and its impact are astounding. This revolution, however, is outstrip** the capabilities of existing software development processes, techniques, and tools,… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 16 pages

  3. arXiv:2310.02431  [pdf, other

    cs.HC cs.CL

    Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions

    Authors: Yufan Chen, Arjun Arunasalam, Z. Berkay Celik

    Abstract: Users seek security & privacy (S&P) advice from online resources, including trusted websites and content-sharing platforms. These resources help users understand S&P technologies and tools and suggest actionable strategies. Large Language Models (LLMs) have recently emerged as trusted information sources. However, their accuracy and correctness have been called into question. Prior research has ou… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: Accepted to the Annual Computer Security Applications Conference (ACSAC), 2023

  4. arXiv:2309.07289  [pdf, other

    cs.HC cs.LG eess.SP

    User Training with Error Augmentation for Electromyogram-based Gesture Classification

    Authors: Yunus Bicer, Niklas Smedemark-Margulies, Basak Celik, Elifnur Sunger, Ryan Orendorff, Stephanie Naufel, Tales Imbiriba, Deniz Erdoğmuş, Eugene Tunik, Mathew Yarossi

    Abstract: We designed and tested a system for real-time control of a user interface by extracting surface electromyographic (sEMG) activity from eight electrodes in a wrist-band configuration. sEMG data were streamed into a machine-learning algorithm that classified hand gestures in real-time. After an initial model calibration, participants were presented with one of three types of feedback during a human-… ▽ More

    Submitted 22 March, 2024; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: 10 pages, 10 figures. V2: Fix latex characters in author name. V3: Add published DOI and Copyright notice

    Journal ref: in IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 32, pp. 1187-1197, 2024

  5. Developmental Scaffolding with Large Language Models

    Authors: Batuhan Celik, Alper Ahmetoglu, Emre Ugur, Erhan Oztop

    Abstract: Exploratoration and self-observation are key mechanisms of infant sensorimotor development. These processes are further guided by parental scaffolding accelerating skill and knowledge acquisition. In developmental robotics, this approach has been adopted often by having a human acting as the source of scaffolding. In this study, we investigate whether Large Language Models (LLMs) can act as a scaf… ▽ More

    Submitted 22 November, 2023; v1 submitted 2 September, 2023; originally announced September 2023.

    Comments: To appear in IEEE Transactions on Robotics ©IEEE2023

  6. arXiv:2309.00889  [pdf, other

    cs.RO cs.LG

    Discovering Predictive Relational Object Symbols with Symbolic Attentive Layers

    Authors: Alper Ahmetoglu, Batuhan Celik, Erhan Oztop, Emre Ugur

    Abstract: In this paper, we propose and realize a new deep learning architecture for discovering symbolic representations for objects and their relations based on the self-supervised continuous interaction of a manipulator robot with multiple objects on a tabletop environment. The key feature of the model is that it can handle a changing number number of objects naturally and map the object-object relations… ▽ More

    Submitted 2 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: text overlap with arXiv:2208.01021

  7. arXiv:2211.02630  [pdf, other

    eess.SP cs.LG

    Recursive Estimation of User Intent from Noninvasive Electroencephalography using Discriminative Models

    Authors: Niklas Smedemark-Margulies, Basak Celik, Tales Imbiriba, Aziz Kocanaogullari, Deniz Erdogmus

    Abstract: We study the problem of inferring user intent from noninvasive electroencephalography (EEG) to restore communication for people with severe speech and physical impairments (SSPI). The focus of this work is improving the estimation of posterior symbol probabilities in a ty** task. At each iteration of the ty** procedure, a subset of symbols is chosen for the next query based on the current prob… ▽ More

    Submitted 29 October, 2022; originally announced November 2022.

    Comments: 5 pages, 2 figures

  8. Online AutoML: An adaptive AutoML framework for online learning

    Authors: Bilge Celik, Prabhant Singh, Joaquin Vanschoren

    Abstract: Automated Machine Learning (AutoML) has been used successfully in settings where the learning task is assumed to be static. In many real-world scenarios, however, the data distribution will evolve over time, and it is yet to be shown whether AutoML techniques can effectively design online pipelines in dynamic environments. This study aims to automate pipeline design for online learning while conti… ▽ More

    Submitted 7 December, 2022; v1 submitted 24 January, 2022; originally announced January 2022.

    Comments: 25 pages, 8 figures. Machine Learning S.I.: Automating Data Science (2022)

  9. arXiv:2112.15203  [pdf, ps, other

    math.OC

    A Stochastic Programming Approach to Surgery Scheduling under Parallel Processing Principle

    Authors: Batuhan Celik, Serhat Gul, Melih Celik

    Abstract: Parallel processing is a principle which enables simultaneous implementation of anesthesia induction and operating room (OR) turnover with the aim of improving OR utilization. In this article, we study the problem of scheduling surgeries for multiple ORs and induction rooms (IR) that function based on the parallel processing principle under uncertainty. We propose a two-stage stochastic mixed-inte… ▽ More

    Submitted 30 December, 2021; originally announced December 2021.

  10. arXiv:2107.13173  [pdf, other

    cs.LG

    New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning

    Authors: Siddharth Divi, Yi-Shan Lin, Habiba Farrukh, Z. Berkay Celik

    Abstract: In Federated Learning (FL), the clients learn a single global model (FedAvg) through a central aggregator. In this setting, the non-IID distribution of the data across clients restricts the global FL model from delivering good performance on the local data of each client. Personalized FL aims to address this problem by finding a personalized model for each client. Recent works widely report the av… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

  11. arXiv:2105.15191  [pdf, other

    cs.LG cs.AI

    Unifying Distillation with Personalization in Federated Learning

    Authors: Siddharth Divi, Habiba Farrukh, Berkay Celik

    Abstract: Federated learning (FL) is a decentralized privacy-preserving learning technique in which clients learn a joint collaborative model through a central aggregator without sharing their data. In this setting, all clients learn a single common predictor (FedAvg), which does not generalize well on each client's local data due to the statistical data heterogeneity among clients. In this paper, we addres… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

  12. arXiv:2105.00645  [pdf, other

    cs.CR

    On the Safety Implications of Misordered Events and Commands in IoT Systems

    Authors: Furkan Goksel, Muslum Ozgur Ozmen, Michael Reeves, Basavesh Shivakumar, Z. Berkay Celik

    Abstract: IoT devices, equipped with embedded actuators and sensors, provide custom automation in the form of IoT apps. IoT apps subscribe to events and upon receipt, transmit actuation commands which trigger a set of actuators. Events and actuation commands follow paths in the IoT ecosystem such as sensor-to-edge, edge-to-cloud, and cloud-to-actuator, with different network and processing delays between th… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  13. S3: Side-Channel Attack on Stylus Pencil through Sensors

    Authors: Habiba Farrukh, Tinghan Yang, Hanwen Xu, Yuxuan Yin, He Wang, Z. Berkay Celik

    Abstract: With smart devices being an essential part of our everyday lives, unsupervised access to the mobile sensors' data can result in a multitude of side-channel attacks. In this paper, we study potential data leaks from Apple Pencil (2nd generation) supported by the Apple iPad Pro, the latest stylus pen which attaches to the iPad body magnetically for charging. We observe that the Pencil's body affects… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Comments: 25 pages

  14. Discovering IoT Physical Channel Vulnerabilities

    Authors: Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang

    Abstract: Smart homes contain diverse sensors and actuators controlled by IoT apps that provide custom automation. Prior works showed that an adversary could exploit physical interaction vulnerabilities among apps and put the users and environment at risk, e.g., to break into a house, an adversary turns on the heater to trigger an app that opens windows when the temperature exceeds a threshold. Currently, t… ▽ More

    Submitted 7 September, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: Published in ACM CCS 2022

  15. arXiv:2009.10639  [pdf, other

    cs.CV cs.AI cs.LG

    What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors

    Authors: Yi-Shan Lin, Wen-Chuan Lee, Z. Berkay Celik

    Abstract: EXplainable AI (XAI) methods have been proposed to interpret how a deep neural network predicts inputs through model saliency explanations that highlight the parts of the inputs deemed important to arrive a decision at a specific target. However, it remains challenging to quantify correctness of their interpretability as current evaluation approaches either require subjective input from humans or… ▽ More

    Submitted 22 September, 2020; originally announced September 2020.

  16. arXiv:2006.14679  [pdf, other

    eess.SP cs.CY eess.SY

    On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities

    Authors: Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan Gerdes, Z. Berkay Celik

    Abstract: Traffic Collision Avoidance Systems (TCAS) are safety-critical systems required on most commercial aircrafts in service today. However, TCAS was not designed to account for malicious actors. While in the past it may have been infeasible for an attacker to craft radio signals to mimic TCAS signals, attackers today have access to open-source digital signal processing software, like GNU Radio, and in… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  17. Adaptation Strategies for Automated Machine Learning on Evolving Data

    Authors: Bilge Celik, Joaquin Vanschoren

    Abstract: Automated Machine Learning (AutoML) systems have been shown to efficiently build good models for new datasets. However, it is often not clear how well they can adapt when the data evolves over time. The main goal of this study is to understand the effect of data stream challenges such as concept drift on the performance of AutoML methods, and which adaptation strategies can be employed to make the… ▽ More

    Submitted 10 May, 2022; v1 submitted 9 June, 2020; originally announced June 2020.

    Comments: 12 pages, 7 figures (14 counting subfigures), submitted to TPAMI - AutoML Special Issue

  18. arXiv:2002.07641  [pdf, other

    cs.SE cs.PF

    IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper)

    Authors: Michael Norris, Berkay Celik, Patrick McDaniel, Gang Tan, Prasanna Venkatesh, Shulin Zhao, Anand Sivasubramaniam

    Abstract: IoT devices are decentralized and deployed in un-stable environments, which causes them to be prone to various kinds of faults, such as device failure and network disruption. Yet, current IoT platforms require programmers to handle faults manually, a complex and error-prone task. In this paper, we present IoTRepair, a fault-handling system for IoT that (1)integrates a fault identification module t… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

  19. arXiv:1911.10461  [pdf, other

    cs.CR cs.LG

    Real-time Analysis of Privacy-(un)aware IoT Applications

    Authors: Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Users trust IoT apps to control and automate their smart devices. These apps necessarily have access to sensitive data to implement their functionality. However, users lack visibility into how their sensitive data is used (or leaked), and they often blindly trust the app developers. In this paper, we present IoTWatcH, a novel dynamic analysis tool that uncovers the privacy risks of IoT apps in rea… ▽ More

    Submitted 24 November, 2019; originally announced November 2019.

  20. arXiv:1911.10186  [pdf, other

    cs.CR

    KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

    Authors: Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

    Abstract: In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a mult… ▽ More

    Submitted 2 June, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020)

  21. arXiv:1809.06962  [pdf, other

    cs.CR cs.PL

    Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

    Authors: Z. Berkay Celik, Earlence Fernandes, Eric Pauley, Gang Tan, Patrick McDaniel

    Abstract: Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive---new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digita… ▽ More

    Submitted 24 December, 2018; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: syntax and grammar error are fixed, and IoT platforms are updated to match with the submission

  22. arXiv:1805.08876  [pdf, other

    cs.CR eess.SY

    Soteria: Automated IoT Safety and Security Analysis

    Authors: Z. Berkay Celik, Patrick McDaniel, Gang Tan

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital systems have changed the way we live, play and work. Yet existing IoT platforms cannot evaluate whether an IoT app or environment is safe, secure, and operates correctly. In this paper, we present Soteria, a static analysis system for validating whether an IoT app or IoT… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

    Comments: Accepted to the USENIX Annual Technical Conference (USENIX ATC), 2018

  23. arXiv:1802.08307  [pdf, other

    cs.CR cs.PL

    Sensitive Information Tracking in Commodity IoT

    Authors: Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, A. Selcuk Uluagac

    Abstract: Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for… ▽ More

    Submitted 22 February, 2018; originally announced February 2018.

    Comments: first submission

  24. arXiv:1708.08160  [pdf

    q-bio.QM

    Determining Positive Cancer Rescue Mutations in p53 Based Cancers by using Artificial Intelligence

    Authors: Kaan Aygen, Berkay Celik, Umut Eser

    Abstract: A mutation in a protein-coding gene in DNA can alter the protein structure coded by the same gene. Structurally altered proteins usually lose their functions and sometimes gain an undesirable function instead. These types of mutations and their effects can result in genetic diseases or antibiotic resistant bacteria, among other health issues. Important curing methods have been developed for detect… ▽ More

    Submitted 27 August, 2017; originally announced August 2017.

    Comments: 4 pages, 5 figures. This report is a result of as a high-school project

  25. arXiv:1707.01871  [pdf, other

    cs.CR

    Achieving Secure and Differentially Private Computations in Multiparty Settings

    Authors: Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Sharing and working on sensitive data in distributed settings from healthcare to finance is a major challenge due to security and privacy concerns. Secure multiparty computation (SMC) is a viable panacea for this, allowing distributed parties to make computations while the parties learn nothing about their data, but the final result. Although SMC is instrumental in such distributed settings, it do… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

  26. arXiv:1702.08342  [pdf, other

    cs.CR cs.PL

    Curie: Policy-based Secure Data Exchange

    Authors: Z. Berkay Celik, Hidayet Aksu, Abbas Acar, Ryan Sheatsley, A. Selcuk Uluagac, Patrick McDaniel

    Abstract: Data sharing among partners---users, organizations, companies---is crucial for the advancement of data analytics in many domains. Sharing through secure computation and differential privacy allows these partners to perform private computations on their sensitive data in controlled ways. However, in reality, there exist complex relationships among members. Politics, regulations, interest, trust, da… ▽ More

    Submitted 9 February, 2019; v1 submitted 27 February, 2017; originally announced February 2017.

    Comments: updated (this version has been accepted to CODASPY 2019)

  27. arXiv:1611.08648  [pdf, other

    cs.CR cs.CY cs.LG stat.ML

    Patient-Driven Privacy Control through Generalized Distillation

    Authors: Z. Berkay Celik, David Lopez-Paz, Patrick McDaniel

    Abstract: The introduction of data analytics into medicine has changed the nature of patient treatment. In this, patients are asked to disclose personal information such as genetic markers, lifestyle habits, and clinical history. This data is then used by statistical models to predict personalized treatments. However, due to privacy concerns, patients often desire to withhold sensitive information. This sel… ▽ More

    Submitted 13 October, 2017; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: IEEE Symposium on Privacy-Aware Computing (IEEE PAC), 2017

  28. arXiv:1603.09638  [pdf, other

    cs.CR cs.LG stat.ML

    Detection under Privileged Information

    Authors: Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami

    Abstract: For well over a quarter century, detection systems have been driven by models learned from input features collected from real or simulated environments. An artifact (e.g., network event, potential malware sample, suspicious email) is deemed malicious or non-malicious based on its similarity to the learned model at runtime. However, the training of the models has been historically limited to only t… ▽ More

    Submitted 30 March, 2018; v1 submitted 31 March, 2016; originally announced March 2016.

    Comments: A short version of this paper is accepted to ASIACCS 2018

  29. arXiv:1602.02697  [pdf, other

    cs.CR cs.LG

    Practical Black-Box Attacks against Machine Learning

    Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami

    Abstract: Machine learning (ML) models, e.g., deep neural networks (DNNs), are vulnerable to adversarial examples: malicious inputs modified to yield erroneous model outputs, while appearing unmodified to human observers. Potential attacks include having malicious content like malware identified as legitimate or controlling vehicle behavior. Yet, all existing adversarial example attacks require knowledge of… ▽ More

    Submitted 19 March, 2017; v1 submitted 8 February, 2016; originally announced February 2016.

    Comments: Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE

  30. arXiv:1511.07528  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    The Limitations of Deep Learning in Adversarial Settings

    Authors: Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami

    Abstract: Deep learning takes advantage of large datasets and computationally efficient training algorithms to outperform other approaches at various machine learning tasks. However, imperfections in the training phase of deep neural networks make them vulnerable to adversarial samples: inputs crafted by adversaries with the intent of causing deep neural networks to misclassify. In this work, we formalize t… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.

    Comments: Accepted to the 1st IEEE European Symposium on Security & Privacy, IEEE 2016. Saarbrucken, Germany