Skip to main content

Showing 1–23 of 23 results for author: Grosse, K

.
  1. arXiv:2403.14641  [pdf, other

    cs.CY cs.AI cs.LG

    Testing autonomous vehicles and AI: perspectives and challenges from cybersecurity, transparency, robustness and fairness

    Authors: David Fernández Llorca, Ronan Hamon, Henrik Junklewitz, Kathrin Grosse, Lars Kunze, Patrick Seiniger, Robert Swaim, Nick Reed, Alexandre Alahi, Emilia Gómez, Ignacio Sánchez, Akos Kriston

    Abstract: This study explores the complexities of integrating Artificial Intelligence (AI) into Autonomous Vehicles (AVs), examining the challenges introduced by AI components and the impact on testing procedures, focusing on some of the essential requirements for trustworthy AI. Topics addressed include the role of AI at various operational layers of AVs, the implications of the EU's AI Act on AVs, and the… ▽ More

    Submitted 21 February, 2024; originally announced March 2024.

    Comments: 44 pages, 8 figures, submitted to a peer-review journal

  2. arXiv:2312.13863  [pdf, other

    cs.LG cs.CR cs.RO

    Manipulating Trajectory Prediction with Backdoors

    Authors: Kaouther Messaoud, Kathrin Grosse, Mickael Chen, Matthieu Cord, Patrick Pérez, Alexandre Alahi

    Abstract: Autonomous vehicles ought to predict the surrounding agents' trajectories to allow safe maneuvers in uncertain and complex traffic situations. As companies increasingly apply trajectory prediction in the real world, security becomes a relevant concern. In this paper, we focus on backdoors - a security threat acknowledged in other fields but so far overlooked for trajectory prediction. To this end,… ▽ More

    Submitted 3 January, 2024; v1 submitted 21 December, 2023; originally announced December 2023.

    Comments: 9 pages, 7 figures

  3. arXiv:2311.09994  [pdf, other

    cs.CR cs.AI

    Towards more Practical Threat Models in Artificial Intelligence Security

    Authors: Kathrin Grosse, Lukas Bieringer, Tarek Richard Besold, Alexandre Alahi

    Abstract: Recent works have identified a gap between research and practice in artificial intelligence security: threats studied in academia do not always reflect the practical use and security risks of AI. For example, while models are often studied in isolation, they form part of larger ML pipelines in practice. Recent works also brought forward that adversarial manipulations introduced by academic attacks… ▽ More

    Submitted 26 March, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: 18 pages, 4 figures, 8 tables, accepted to Usenix Security, incorporated external feedback

  4. arXiv:2302.04623  [pdf

    cs.NI

    Employing Channel Probing to Derive End-of-Life Service Margins for Optical Spectrum Services. To appear in OPTICA Journal of Optical Communications and Networking

    Authors: K. Kaeval, F. Slyne, S. Troia, E. Kenny, K. Große, H. Griesser, D. C. Kilper, M. Ruffini, J-J Pedreno-Manresa, S. K. Patri, G. Jervan

    Abstract: Optical Spectrum as a Service (OSaaS) spanning over multiple transparent optical network domains, can significantly reduce the investment and operational costs of the end-to-end service. Based on the black-link approach, these services are empowered by reconfigurable transceivers and the emerging disaggregation trend in optical transport networks. This work investigates the accuracy aspects of the… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

  5. arXiv:2212.06123  [pdf, other

    cs.LG cs.RO

    A Survey on Reinforcement Learning Security with Application to Autonomous Driving

    Authors: Ambra Demontis, Maura Pintor, Luca Demetrio, Kathrin Grosse, Hsiao-Ying Lin, Chengfang Fang, Battista Biggio, Fabio Roli

    Abstract: Reinforcement learning allows machines to learn from their own experience. Nowadays, it is used in safety-critical applications, such as autonomous driving, despite being vulnerable to attacks carefully crafted to either prevent that the reinforcement learning algorithm learns an effective and reliable policy, or to induce the trained agent to make a wrong decision. The literature about the securi… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  6. Machine Learning Security in Industry: A Quantitative Survey

    Authors: Kathrin Grosse, Lukas Bieringer, Tarek Richard Besold, Battista Biggio, Katharina Krombholz

    Abstract: Despite the large body of academic work on machine learning security, little is known about the occurrence of attacks on machine learning systems in the wild. In this paper, we report on a quantitative study with 139 industrial practitioners. We analyze attack occurrence and concern and evaluate statistical hypotheses on factors influencing threat perception and exposure. Our results shed light on… ▽ More

    Submitted 10 March, 2023; v1 submitted 11 July, 2022; originally announced July 2022.

    Comments: Accepted at TIFS, version with more detailed appendix containing more detailed statistical results. 17 pages, 6 tables and 4 figures

  7. arXiv:2205.01992  [pdf, other

    cs.LG cs.AI cs.CR

    Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning

    Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Sebastiano Vascon, Werner Zellinger, Bernhard A. Moser, Alina Oprea, Battista Biggio, Marcello Pelillo, Fabio Roli

    Abstract: The success of machine learning is fueled by the increasing availability of computing power and large training datasets. The training data is used to learn new models or update existing ones, assuming that it is sufficiently representative of the data that will be encountered at test time. This assumption is challenged by the threat of poisoning, an attack that manipulates the training data to com… ▽ More

    Submitted 9 March, 2023; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: 35 pages, Accepted at ACM Computing Surveys

  8. Machine Learning Security against Data Poisoning: Are We There Yet?

    Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo

    Abstract: The recent success of machine learning (ML) has been fueled by the increasing availability of computing power and large amounts of data in many different applications. However, the trustworthiness of the resulting models can be compromised when such data is maliciously manipulated to mislead the learning process. In this article, we first review poisoning attacks that compromise the training data… ▽ More

    Submitted 8 March, 2024; v1 submitted 12 April, 2022; originally announced April 2022.

    Comments: preprint, 10 pages, 3 figures. Paper accepted to the IEEE Computer - Special Issue on Trustworthy AI

  9. arXiv:2106.07214  [pdf, other

    cs.LG cs.CR

    Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions

    Authors: Antonio Emanuele Cinà, Kathrin Grosse, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo

    Abstract: Backdoor attacks inject poisoning samples during training, with the goal of forcing a machine learning model to output an attacker-chosen class when presented a specific trigger at test time. Although backdoor attacks have been demonstrated in a variety of settings and against different models, the factors affecting their effectiveness are still not well understood. In this work, we provide a unif… ▽ More

    Submitted 16 March, 2022; v1 submitted 14 June, 2021; originally announced June 2021.

    Comments: preprint; 28 pages

  10. arXiv:2105.03726  [pdf, other

    cs.CR cs.AI

    Mental Models of Adversarial Machine Learning

    Authors: Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz

    Abstract: Although machine learning is widely used in practice, little is known about practitioners' understanding of potential security challenges. In this work, we close this substantial gap and contribute a qualitative study focusing on developers' mental models of the machine learning pipeline and potentially vulnerable components. Similar studies have helped in other security fields to discover root ca… ▽ More

    Submitted 29 June, 2022; v1 submitted 8 May, 2021; originally announced May 2021.

    Comments: accepted at SOUPS 2022

  11. arXiv:2102.02760  [pdf, other

    physics.plasm-ph

    Ignition and propagation of nanosecond pulsed discharges in distilled water -- negative vs. positive polarity applied to a pin electrode

    Authors: K. Grosse, M. Falke, A. von Keudell

    Abstract: Nanosecond plasmas in liquids are being used for water treatment, electrolysis or biomedical applications. The exact nature of these very dynamic plasmas and most important their ignition physics are strongly debated. The ignition itself may be explained by two competing hypothesis: (i) ignition via field effects or (ii) via electron multiplication in nanovoids. Both hypothesis are supported by th… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

  12. arXiv:2007.06993  [pdf, ps, other

    cs.CR cs.LG

    Adversarial Examples and Metrics

    Authors: Nico Döttling, Kathrin Grosse, Michael Backes, Ian Molloy

    Abstract: Adversarial examples are a type of attack on machine learning (ML) systems which cause misclassification of inputs. Achieving robustness against adversarial examples is crucial to apply ML in the real world. While most prior work on adversarial examples is empirical, a recent line of work establishes fundamental limitations of robust classification based on cryptographic hardness. Most positive an… ▽ More

    Submitted 15 July, 2020; v1 submitted 14 July, 2020; originally announced July 2020.

    Comments: 25 pages, 1 figure, under submission, fixe typos from previous version

  13. arXiv:2006.07014  [pdf, other

    cs.LG stat.ML

    How many winning tickets are there in one DNN?

    Authors: Kathrin Grosse, Michael Backes

    Abstract: The recent lottery ticket hypothesis proposes that there is one sub-network that matches the accuracy of the original network when trained in isolation. We show that instead each network contains several winning tickets, even if the initial weights are fixed. The resulting winning sub-networks are not instances of the same network under weight space symmetry, and show no overlap or correlation sig… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

    Comments: 17 pages, 15 figures, under submission

  14. arXiv:2006.06721  [pdf, other

    cs.LG cs.CR stat.ML

    Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks

    Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy

    Abstract: Backdoor attacks mislead machine-learning models to output an attacker-specified class when presented a specific trigger at test time. These attacks require poisoning the training data to compromise the learning algorithm, e.g., by injecting poisoning samples containing the trigger into the training set, along with the desired class label. Despite the increasing number of studies on backdoor attac… ▽ More

    Submitted 2 November, 2021; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: 9 pages, 7 figures, under submission

  15. arXiv:1909.08864  [pdf, other

    cs.CR cs.LG stat.ML

    Adversarial Vulnerability Bounds for Gaussian Process Classification

    Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez

    Abstract: Machine learning (ML) classification is increasingly used in safety-critical systems. Protecting ML classifiers from adversarial examples is crucial. We propose that the main threat is that of an attacker perturbing a confidently classified input to produce a confident misclassification. To protect against this we devise an adversarial bound (AB) for a Gaussian process classifier, that holds for t… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

    Comments: 10 pages + 2 pages references + 7 pages of supplementary. 12 figures. Submitted to AAAI

  16. arXiv:1902.03020  [pdf, ps, other

    cs.CR cs.LG

    On the security relevance of weights in deep learning

    Authors: Kathrin Grosse, Thomas A. Trost, Marius Mosbach, Michael Backes, Dietrich Klakow

    Abstract: Recently, a weight-based attack on stochastic gradient descent inducing overfitting has been proposed. We show that the threat is broader: A task-independent permutation on the initial weights suffices to limit the achieved accuracy to for example 50% on the Fashion MNIST dataset from initially more than $90$%. These findings are confirmed on MNIST and CIFAR. We formally confirm that the attack su… ▽ More

    Submitted 29 November, 2020; v1 submitted 8 February, 2019; originally announced February 2019.

    Comments: 16 pages, 18 figures, long version of paper published at ICANN 2020

  17. arXiv:1812.02606  [pdf, other

    cs.CR cs.LG

    The Limitations of Model Uncertainty in Adversarial Settings

    Authors: Kathrin Grosse, David Pfaff, Michael Thomas Smith, Michael Backes

    Abstract: Machine learning models are vulnerable to adversarial examples: minor perturbations to input samples intended to deliberately cause misclassification. While an obvious security threat, adversarial examples yield as well insights about the applied model itself. We investigate adversarial examples in the context of Bayesian neural network's (BNN's) uncertainty measures. As these measures are highly… ▽ More

    Submitted 17 November, 2019; v1 submitted 6 December, 2018; originally announced December 2018.

    Comments: Accepted to the Bayesian Deep Learning Workshop 2019 at NeurIPS. For longer version with more background, refer to previous version

  18. arXiv:1808.00590  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

    Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz

    Abstract: With the widespread use of machine learning (ML) techniques, ML as a service has become increasingly popular. In this setting, an ML model resides on a server and users can query it with their data via an API. However, if the user's input is sensitive, sending it to the server is undesirable and sometimes even legally not possible. Equally, the service provider does not want to share the model by… ▽ More

    Submitted 6 February, 2019; v1 submitted 1 August, 2018; originally announced August 2018.

  19. arXiv:1806.02032  [pdf, other

    cs.CR cs.LG stat.ML

    Killing four birds with one Gaussian process: the relation between different test-time attacks

    Authors: Kathrin Grosse, Michael T. Smith, Michael Backes

    Abstract: In machine learning (ML) security, attacks like evasion, model stealing or membership inference are generally studied in individually. Previous work has also shown a relationship between some attacks and decision function curvature of the targeted model. Consequently, we study an ML model allowing direct control over the decision surface curvature: Gaussian Process classifiers (GPCs). For evasion,… ▽ More

    Submitted 29 November, 2020; v1 submitted 6 June, 2018; originally announced June 2018.

    Comments: 10 pages, 8 figures, long version of paper accepted at ICPR 2020

  20. arXiv:1711.06598   

    cs.CR cs.LG stat.ML

    How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models

    Authors: Kathrin Grosse, David Pfaff, Michael Thomas Smith, Michael Backes

    Abstract: Machine learning models are vulnerable to Adversarial Examples: minor perturbations to input samples intended to deliberately cause misclassification. Current defenses against adversarial examples, especially for Deep Neural Networks (DNN), are primarily derived from empirical developments, and their security guarantees are often only justified retroactively. Many defenses therefore rely on hidden… ▽ More

    Submitted 3 January, 2019; v1 submitted 17 November, 2017; originally announced November 2017.

    Comments: Reasoning incomplete. Fixed issue in arXiv:1812.02606 (The limitations of model uncertainty in adversarial settings)

  21. arXiv:1702.06280  [pdf, other

    cs.CR cs.LG stat.ML

    On the (Statistical) Detection of Adversarial Examples

    Authors: Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, Patrick McDaniel

    Abstract: Machine Learning (ML) models are applied in a variety of tasks such as network intrusion detection or Malware classification. Yet, these models are vulnerable to a class of malicious inputs known as adversarial examples. These are slightly perturbed inputs that are classified incorrectly by the ML model. The mitigation of these adversarial inputs remains an open problem. As a step towards understa… ▽ More

    Submitted 17 October, 2017; v1 submitted 21 February, 2017; originally announced February 2017.

    Comments: 13 pages, 4 figures, 5 tables. New version: improved writing, incorporating external feedback

  22. arXiv:1606.04435  [pdf, other

    cs.CR cs.LG cs.NE

    Adversarial Perturbations Against Deep Neural Networks for Malware Classification

    Authors: Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel

    Abstract: Deep neural networks, like many other machine learning models, have recently been shown to lack robustness against adversarially crafted inputs. These inputs are derived from regular inputs by minor yet carefully selected perturbations that deceive machine learning models into desired misclassifications. Existing work in this emerging field was largely specific to the domain of image classificatio… ▽ More

    Submitted 16 June, 2016; v1 submitted 14 June, 2016; originally announced June 2016.

    Comments: version update: correcting typos, incorporating external feedback

  23. arXiv:1305.4946  [pdf

    cond-mat.mes-hall cond-mat.mtrl-sci

    Direct observation of nanometer-scale Joule and Peltier effects in phase change memory devices

    Authors: Kyle L. Grosse, Feng Xiong, Sungduk Hong, William P. King, Eric Pop

    Abstract: We measure power dissipation in phase change memory (PCM) devices by scanning Joule ex-pansion microscopy (SJEM) with ~50 nm spatial and 0.2 K temperature resolution. The temperature rise in the Ge2Sb2Te5 (GST) is dominated by Joule heating, but at the GST-TiW contacts it is a combination of Peltier and current crowding effects. Comparison of SJEM and electrical characterization with simulations o… ▽ More

    Submitted 21 May, 2013; originally announced May 2013.

    Comments: includes supplement

    Journal ref: Applied Physics Letters, vol. 102, p. 193503 (2013)