Skip to main content

Showing 1–50 of 106 results for author: Kerschbaum, F

.
  1. arXiv:2406.05447  [pdf, other

    astro-ph.IM astro-ph.EP astro-ph.SR

    The PLATO Mission

    Authors: Heike Rauer, Conny Aerts, Juan Cabrera, Magali Deleuil, Anders Erikson, Laurent Gizon, Mariejo Goupil, Ana Heras, Jose Lorenzo-Alvarez, Filippo Marliani, Cesar Martin-Garcia, J. Miguel Mas-Hesse, Laurence O'Rourke, Hugh Osborn, Isabella Pagano, Giampaolo Piotto, Don Pollacco, Roberto Ragazzoni, Gavin Ramsay, Stéphane Udry, Thierry Appourchaux, Willy Benz, Alexis Brandeker, Manuel Güdel, Eduardo Janot-Pacheco , et al. (801 additional authors not shown)

    Abstract: PLATO (PLAnetary Transits and Oscillations of stars) is ESA's M3 mission designed to detect and characterise extrasolar planets and perform asteroseismic monitoring of a large number of stars. PLATO will detect small planets (down to <2 R_(Earth)) around bright stars (<11 mag), including terrestrial planets in the habitable zone of solar-like stars. With the complement of radial velocity observati… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  2. arXiv:2405.02437  [pdf, other

    cs.CR cs.LG

    FastLloyd: Federated, Accurate, Secure, and Tunable $k$-Means Clustering with Differential Privacy

    Authors: Abdulrahman Diaa, Thomas Humphries, Florian Kerschbaum

    Abstract: We study the problem of privacy-preserving $k$-means clustering in the horizontally federated setting. Existing federated approaches using secure computation, suffer from substantial overheads and do not offer output privacy. At the same time, differentially private (DP) $k$-means algorithms assume a trusted central curator and do not extend to federated settings. Naively combining the secure and… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  3. arXiv:2405.01222  [pdf, ps, other

    astro-ph.SR astro-ph.GA

    Probing the dynamical and kinematical structures of detached shells around AGB stars

    Authors: M. Maercker, E. De Beck, T. Khouri, W. H. T. Vlemmings, J. Gustafsson, H. Olofsson, D. Tafoya, F. Kerschbaum, M. Lindqvist

    Abstract: Aims. We aim to resolve the spatial and kinematic sub-structures in five detached-shell sources to provide detailed constraints for hydrodynamic models that describe the formation and evolution of the shells. Methods. We use observations of the 12 CO (1-0) emission towards five carbon-AGB stars with ALMA. The data have angular resolutions of 0.3 arcsec to 1arcsec and a velocity resolution of 0.3 k… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 18 pages (incl. 5 pages Appendix), 13 Figures

    Journal ref: A&A 687, A112 (2024)

  4. arXiv:2402.14937  [pdf, other

    cs.LG cs.CR

    SoK: Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge

    Authors: Lucas Fenaux, Florian Kerschbaum

    Abstract: Adversarial examples are malicious inputs to machine learning models that trigger a misclassification. This type of attack has been studied for close to a decade, and we find that there is a lack of study and formalization of adversary knowledge when mounting attacks. This has yielded a complex space of attack research with hard-to-compare threat models and attacks. We focus on the image classific… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  5. arXiv:2312.11339  [pdf, other

    astro-ph.SR astro-ph.EP

    The EBLM Project XI. Mass, radius and effective temperature measurements for 23 M-dwarf companions to solar-type stars observed with CHEOPS

    Authors: M. I. Swayne, P. F. L. Maxted, A. H. M. J. Triaud, S. G. Sousa, A. Deline, D. Ehrenreich, S. Hoyer, G. Olofsson, I. Boisse, A. Duck, S. Gill, D. Martin, J. McCormac, C. M. Persson, A. Santerne, D. Sebastian, M. R. Standing, L. Acuña, Y. Alibert, R. Alonso, G. Anglada, T. Bárczy, D. Barrado Navascues, S. C. C. Barros, W. Baumjohann , et al. (82 additional authors not shown)

    Abstract: Observations of low-mass stars have frequently shown a disagreement between observed stellar radii and radii predicted by theoretical stellar structure models. This ``radius inflation'' problem could have an impact on both stellar and exoplanetary science. We present the final results of our observation programme with the CHEOPS satellite to obtain high-precision light curves of eclipsing binaries… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 21 pages, 10 figures, accepted for publication in MNRAS, Supplementary material provided as ancillary files

  6. arXiv:2312.00157  [pdf, other

    cs.LG cs.CR cs.CV

    Universal Backdoor Attacks

    Authors: Benjamin Schneider, Nils Lukas, Florian Kerschbaum

    Abstract: Web-scraped datasets are vulnerable to data poisoning, which can be used for backdooring deep image classifiers during training. Since training on large datasets is expensive, a model is trained once and re-used many times. Unlike adversarial examples, backdoor attacks often target specific classes rather than any class learned by the model. One might expect that targeting many classes through a n… ▽ More

    Submitted 19 January, 2024; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: Accepted for publication at ICLR 2024

  7. arXiv:2310.14565  [pdf, other

    cs.CR

    PEPSI: Practically Efficient Private Set Intersection in the Unbalanced Setting

    Authors: Rasoul Akhavan Mahdavi, Nils Lukas, Faezeh Ebrahimianghazani, Thomas Humphries, Bailey Kacsmar, John Premkumar, Xinda Li, Simon Oya, Ehsan Amjadian, Florian Kerschbaum

    Abstract: Two parties with private data sets can find shared elements using a Private Set Intersection (PSI) protocol without revealing any information beyond the intersection. Circuit PSI protocols privately compute an arbitrary function of the intersection - such as its cardinality, and are often employed in an unbalanced setting where one party has more data than the other. Existing protocols are either… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

  8. Differentially Private Data Generation with Missing Data

    Authors: Shubhankar Mohapatra, Jianqiao Zong, Florian Kerschbaum, Xi He

    Abstract: Despite several works that succeed in generating synthetic data with differential privacy (DP) guarantees, they are inadequate for generating high-quality synthetic data when the input data has missing values. In this work, we formalize the problems of DP synthetic data with missing values and propose three effective adaptive strategies that significantly improve the utility of the synthetic data… ▽ More

    Submitted 30 May, 2024; v1 submitted 17 October, 2023; originally announced October 2023.

    Comments: 18 pages, 9 figures, 2 tables

    Journal ref: PVLDB Volume 17, 2024

  9. Extended far-UV emission surrounding asymptotic giant branch stars as seen by GALEX

    Authors: V. Răstău, M. Mečina, F. Kerschbaum, H. Olofsson, M. Maercker, M. Drechsler, X. Strottner, L. Mulato

    Abstract: Aims. Our goal is to study the long-term mass-loss rate characteristics of asymptotic giant branch (AGB) stars through wind-wind and wind-interstellar medium interaction. Methods. Far-ultraviolet (FUV) images from the Galex survey are used to investigate extended UV emission associated with AGB stars. Results. FUV emission was found towards eight objects. The emission displays different shapes… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

    Journal ref: A&A 680, A12 (2023)

  10. arXiv:2309.16952  [pdf, other

    cs.CR cs.LG

    Leveraging Optimization for Adaptive Attacks on Image Watermarks

    Authors: Nils Lukas, Abdulrahman Diaa, Lucas Fenaux, Florian Kerschbaum

    Abstract: Untrustworthy users can misuse image generators to synthesize high-quality deepfakes and engage in unethical activities. Watermarking deters misuse by marking generated content with a hidden message, enabling its detection using a secret watermarking key. A core security property of watermarking is robustness, which states that an attacker can only evade detection by substantially degrading image… ▽ More

    Submitted 20 January, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: ICLR'24

  11. arXiv:2309.06496  [pdf, other

    cs.CR

    Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption

    Authors: Rasoul Akhavan Mahdavi, Haoyan Ni, Dimitry Linkov, Florian Kerschbaum

    Abstract: As machine learning as a service continues gaining popularity, concerns about privacy and intellectual property arise. Users often hesitate to disclose their private information to obtain a service, while service providers aim to protect their proprietary models. Decision trees, a widely used machine learning model, are favoured for their simplicity, interpretability, and ease of training. In this… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

  12. Identifying and Mitigating the Security Risks of Generative AI

    Authors: Clark Barrett, Brad Boyd, Elie Burzstein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang

    Abstract: Every major technical invention resurfaces the dual-use dilemma -- the new technology has the potential to be used for good as well as for harm. Generative AI (GenAI) techniques, such as large language models (LLMs) and diffusion models, have shown remarkable capabilities (e.g., in-context learning, code-completion, and text-to-image generation and editing). However, GenAI can be used just as well… ▽ More

    Submitted 28 December, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

    Journal ref: Foundations and Trends in Privacy and Security 6 (2023) 1-52

  13. arXiv:2308.10718  [pdf, other

    cs.CR cs.CV

    Backdooring Textual Inversion for Concept Censorship

    Authors: Yutong Wu, Jie Zhang, Florian Kerschbaum, Tianwei Zhang

    Abstract: Recent years have witnessed success in AIGC (AI Generated Content). People can make use of a pre-trained diffusion model to generate images of high quality or freely modify existing pictures with only prompts in nature language. More excitingly, the emerging personalization techniques make it feasible to create specific-desired images with only a few images as references. However, this induces sev… ▽ More

    Submitted 23 August, 2023; v1 submitted 21 August, 2023; originally announced August 2023.

  14. arXiv:2306.08538  [pdf, other

    cs.CR cs.LG

    Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions

    Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum

    Abstract: Machine Learning as a Service (MLaaS) is an increasingly popular design where a company with abundant computing resources trains a deep neural network and offers query access for tasks like image classification. The challenge with this design is that MLaaS requires the client to reveal their potentially sensitive queries to the company hosting the model. Multi-party computation (MPC) protects the… ▽ More

    Submitted 16 April, 2024; v1 submitted 14 June, 2023; originally announced June 2023.

    Comments: To appear at USENIX Security 2024

  15. arXiv:2305.09671  [pdf, other

    cs.CR cs.LG

    Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks

    Authors: Nils Lukas, Florian Kerschbaum

    Abstract: Deep image classification models trained on vast amounts of web-scraped data are susceptible to data poisoning - a mechanism for backdooring models. A small number of poisoned samples seen during training can severely undermine a model's integrity during inference. Existing work considers an effective defense as one that either (i) restores a model's integrity through repair or (ii) detects an att… ▽ More

    Submitted 29 June, 2023; v1 submitted 7 May, 2023; originally announced May 2023.

    Comments: Preprint

  16. arXiv:2304.07361  [pdf, other

    cs.LG cs.CR

    PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators

    Authors: Nils Lukas, Florian Kerschbaum

    Abstract: Deepfakes refer to content synthesized using deep generators, which, when misused, have the potential to erode trust in digital media. Synthesizing high-quality deepfakes requires access to large and complex generators only a few entities can train and provide. The threat is malicious users that exploit access to the provided model and generate harmful deepfakes without risking detection. Watermar… ▽ More

    Submitted 7 November, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: USENIX Security 2023

  17. arXiv:2303.09043  [pdf, ps, other

    cs.CR

    HE is all you need: Compressing FHE Ciphertexts using Additive HE

    Authors: Rasoul Akhavan Mahdavi, Abdulrahman Diaa, Florian Kerschbaum

    Abstract: Fully Homomorphic Encryption (FHE) permits the evaluation of an arbitrary function on encrypted data. However, FHE ciphertexts, particularly those based on lattice assumptions such as LWE/RLWE are very large compared to the underlying plaintext. Large ciphertexts are hard to communicate over the network and this is an obstacle to the adoption of FHE, particularly for clients with limited bandwidth… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

  18. TOI-1055 b: Neptunian planet characterised with HARPS, TESS, and CHEOPS

    Authors: A. Bonfanti, D. Gandolfi, J. A. Egger, L. Fossati, J. Cabrera, A. Krenn, Y. Alibert, W. Benz, N. Billot, H. -G. Florén, M. Lendl, V. Adibekyan, S. Salmon, N. C. Santos, S. G. Sousa, T. G. Wilson, O. Barragán, A. Collier Cameron, L. Delrez, M. Esposito, E. Goffo, H. Osborne, H. P. Osborn, L. M. Serrano, V. Van Eylen , et al. (67 additional authors not shown)

    Abstract: TOI-1055 is a Sun-like star known to host a transiting Neptune-sized planet on a 17.5-day orbit (TOI-1055 b). Radial velocity (RV) analyses carried out by two independent groups using nearly the same set of HARPS spectra have provided measurements of planetary masses that differ by $\sim$ 2$σ$. Our aim in this work is to solve the inconsistency in the published planetary masses by significantly ex… ▽ More

    Submitted 22 February, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

    Comments: 13 pages, 6 figures, 5 tables. Accepted for publication in A&A

    Journal ref: A&A 671, L8 (2023)

  19. arXiv:2211.10752  [pdf, other

    cs.CV

    Towards Robust Dataset Learning

    Authors: Yihan Wu, Xinda Li, Florian Kerschbaum, Heng Huang, Hongyang Zhang

    Abstract: Adversarial training has been actively studied in recent computer vision research to improve the robustness of models. However, due to the huge computational cost of generating adversarial samples, adversarial training methods are often slow. In this paper, we study the problem of learning a robust dataset such that any classifier naturally trained on the dataset is adversarially robust. Such a da… ▽ More

    Submitted 19 November, 2022; originally announced November 2022.

  20. arXiv:2211.07026  [pdf, other

    cs.CR

    Comprehension from Chaos: Towards Informed Consent for Private Computation

    Authors: Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum

    Abstract: Private computation, which includes techniques like multi-party computation and private query execution, holds great promise for enabling organizations to analyze data they and their partners hold while maintaining data subjects' privacy. Despite recent interest in communicating about differential privacy, end users' perspectives on private computation have not previously been studied. To fill thi… ▽ More

    Submitted 23 August, 2023; v1 submitted 13 November, 2022; originally announced November 2022.

  21. arXiv:2209.13913  [pdf, other

    cs.CR

    Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection

    Authors: Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi

    Abstract: In a Private section intersection (PSI) protocol, Alice and Bob compute the intersection of their respective sets without disclosing any element not in the intersection. PSI protocols have been extensively studied in the literature and are deployed in industry. With state-of-the-art protocols achieving optimal asymptotic complexity, performance improvements are rare and can only improve complexi… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

  22. arXiv:2205.02130  [pdf, other

    cs.CR cs.CL cs.LG

    The Limits of Word Level Differential Privacy

    Authors: Justus Mattern, Benjamin Weggenmann, Florian Kerschbaum

    Abstract: As the issues of privacy and trust are receiving increasing attention within the research community, various attempts have been made to anonymize textual data. A significant subset of these approaches incorporate differentially private mechanisms to perturb word embeddings, thus replacing individual words in a sentence. While these methods represent very important contributions, have various advan… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  23. arXiv:2204.07877  [pdf, other

    cs.CR cs.LG

    Assessing Differentially Private Variational Autoencoders under Membership Inference

    Authors: Daniel Bernau, Jonas Robl, Florian Kerschbaum

    Abstract: We present an approach to quantify and compare the privacy-accuracy trade-off for differentially private Variational Autoencoders. Our work complements previous work in two aspects. First, we evaluate the the strong reconstruction MI attack against Variational Autoencoders under differential privacy. Second, we address the data scientist's challenge of setting privacy parameter epsilon, which stee… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

  24. arXiv:2202.07569  [pdf, other

    cs.CR

    Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators

    Authors: Rasoul Akhavan Mahdavi, Florian Kerschbaum

    Abstract: Equality operators are an essential building block in tasks over secure computation such as private information retrieval. In private information retrieval (PIR), a user queries a database such that the server does not learn which element is queried. In this work, we propose \emph{equality operators for constant-weight codewords}. A constant-weight code is a collection of codewords that share the… ▽ More

    Submitted 16 February, 2022; v1 submitted 15 February, 2022; originally announced February 2022.

  25. arXiv:2110.05524  [pdf, other

    cs.CR

    Generalization Techniques Empirically Outperform Differential Privacy against Membership Inference

    Authors: Jiaxiang Liu, Simon Oya, Florian Kerschbaum

    Abstract: Differentially private training algorithms provide protection against one of the most popular attacks in machine learning: the membership inference attack. However, these privacy algorithms incur a loss of the model's classification accuracy, therefore creating a privacy-utility trade-off. The amount of noise that differential privacy requires to provide strong theoretical protection guarantees in… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

  26. arXiv:2110.04180  [pdf, other

    cs.CR

    IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization

    Authors: Simon Oya, Florian Kerschbaum

    Abstract: Effective query recovery attacks against Searchable Symmetric Encryption (SSE) schemes typically rely on auxiliary ground-truth information about the queries or dataset. Query recovery is also possible under the weaker statistical auxiliary information assumption, although statistical-based attacks achieve lower accuracy and are not considered a serious threat. In this work we present IHOP, a stat… ▽ More

    Submitted 31 May, 2022; v1 submitted 8 October, 2021; originally announced October 2021.

    Comments: 18 pages

  27. arXiv:2108.10742  [pdf, other

    astro-ph.SR astro-ph.GA

    DEATHSTAR: Nearby AGB stars with the Atacama Compact Array II. CO envelope sizes and asymmetries: The S-type stars

    Authors: M. Andriantsaralaza, S. Ramstedt, W. H. T. Vlemmings, T. Danilovich, E. De Beck, M. A. T. Groenewegen, S. Höfner, F. Kerschbaum, T. Khouri, M. Lindqvist, M. Maercker, H. Olofsson, G. Quintana-Lacaci, M. Saberi, R. Sahai, A. Zijlstra

    Abstract: We aim to constrain the sizes of the CO circumstellar envelopes (CSEs) of 16 S-type stars, along with an additional 7 and 4 CSEs of C-type and M-type AGB stars, respectively. We map the emission from the CO J=2-1 and 3-2 lines observed with the Atacama Compact Array (ACA) and its total power (TP) antennas, and fit with a Gaussian distribution in the uv- and image planes for ACA-only and TP observa… ▽ More

    Submitted 24 August, 2021; originally announced August 2021.

    Comments: 8 pages, 2 figures, 4 appendices, accepted in A&A

    Journal ref: A&A 653, A53 (2021)

  28. arXiv:2108.04974  [pdf, other

    cs.CR cs.LG

    SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)

    Authors: Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum

    Abstract: Deep Neural Network (DNN) watermarking is a method for provenance verification of DNN models. Watermarking should be robust against watermark removal attacks that derive a surrogate model that evades provenance verification. Many watermarking schemes that claim robustness have been proposed, but their robustness is only validated in isolation against a relatively small set of attacks. There is no… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

  29. arXiv:2107.12407  [pdf, other

    cs.CR

    Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics

    Authors: Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum

    Abstract: Key-value data is a naturally occurring data type that has not been thoroughly investigated in the local trust model. Existing local differentially private (LDP) solutions for computing statistics over key-value data suffer from the inherent accuracy limitations of each user adding their own noise. Multi-party computation (MPC) maintains better accuracy than LDP and similarly does not require a tr… ▽ More

    Submitted 30 August, 2022; v1 submitted 26 July, 2021; originally announced July 2021.

  30. arXiv:2103.05792  [pdf, other

    cs.CR cs.DB

    Equi-Joins Over Encrypted Data for Series of Queries

    Authors: Masoumeh Shafieinejad, Suraj Gupta, ** Yang Liu, Koray Karabina, Florian Kerschbaum

    Abstract: Encryption provides a method to protect data outsourced to a DBMS provider, e.g., in the cloud. However, performing database operations over encrypted data requires specialized encryption schemes that carefully balance security and performance. In this paper, we present a new encryption scheme that can efficiently perform equi-joins over encrypted data with better security than the state-of-the-ar… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Comments: 13 pages, 4 figures, 6 tables

  31. arXiv:2103.05173  [pdf, other

    cs.DB cs.CR

    PCOR: Private Contextual Outlier Release via Differentially Private Search

    Authors: Masoumeh Shafieinejad, Florian Kerschbaum, Ihab F. Ilyas

    Abstract: Outlier detection plays a significant role in various real world applications such as intrusion, malfunction, and fraud detection. Traditionally, outlier detection techniques are applied to find outliers in the context of the whole dataset. However, this practice neglects contextual outliers, that are not outliers in the whole dataset but in some specific neighborhoods. Contextual outliers are par… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  32. arXiv:2103.02913  [pdf, other

    cs.CR cs.LG

    Quantifying identifiability to choose and audit $ε$ in differentially private deep learning

    Authors: Daniel Bernau, Günther Eibl, Philip W. Grassal, Hannah Keller, Florian Kerschbaum

    Abstract: Differential privacy allows bounding the influence that training data records have on a machine learning model. To use differential privacy in machine learning, data scientists must choose privacy parameters $(ε,δ)$. Choosing meaningful privacy parameters is key, since models trained with weak privacy parameters might result in excessive privacy leakage, while strong privacy parameters might overl… ▽ More

    Submitted 20 July, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

  33. arXiv:2102.09651  [pdf, other

    cs.CR

    Obfuscated Access and Search Patterns in Searchable Encryption

    Authors: Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum

    Abstract: Searchable Symmetric Encryption (SSE) allows a data owner to securely outsource its encrypted data to a cloud server while maintaining the ability to search over it and retrieve matched documents. Most existing SSE schemes leak which documents are accessed per query, i.e., the so-called access pattern, and thus are vulnerable to attacks that can recover the database or the queried keywords. Curren… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

    Comments: To be published at Network and Distributed Systems Security (NDSS) Symposium 2021, 21-24 February 2021, San Diego, CA, USA

  34. Extended view on the dust shells around two carbon stars

    Authors: M. Mečina, B. Aringer, W. Nowotny, M. A. T. Groenewegen, F. Kerschbaum, M. Brunner, H. -P. Gail

    Abstract: Stars on the asymptotic giant branch (AGB) lose considerable amounts of matter through their dust-driven stellar winds. A number of such sources have been imaged by Herschel/PACS, revealing a diverse sample of different morphological types. Among them are a few examples which show geometrically thin, spherically symmetric shells which can be used to probe the mass loss history of their host stars.… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Journal ref: A&A 644, A66 (2020)

  35. arXiv:2010.12112  [pdf, other

    cs.CR cs.LG

    Investigating Membership Inference Attacks under Data Dependencies

    Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum

    Abstract: Training machine learning models on privacy-sensitive data has become a popular practice, driving innovation in ever-expanding fields. This has opened the door to new attacks that can have serious privacy implications. One such attack, the Membership Inference Attack (MIA), exposes whether or not a particular data point was used to train a model. A growing body of literature uses Differentially Pr… ▽ More

    Submitted 14 June, 2023; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: IEEE 36th Computer Security Foundations Symposium (CSF)

  36. arXiv:2010.03465  [pdf, other

    cs.CR

    Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption

    Authors: Simon Oya, Florian Kerschbaum

    Abstract: Recent Searchable Symmetric Encryption (SSE) schemes enable secure searching over an encrypted database stored in a server while limiting the information leaked to the server. These schemes focus on hiding the access pattern, which refers to the set of documents that match the client's queries. This provides protection against current attacks that largely depend on this leakage to succeed. However… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 16 pages. 11 figures. To appear at Proceedings of the 30th USENIX Security Symposium (August 11-13, 2021, Vancouver, B.C., Canada)

  37. arXiv:2008.07885  [pdf, ps, other

    astro-ph.SR astro-ph.GA

    DEATHSTAR: Nearby AGB stars with the Atacama Compact Array I. CO envelope sizes and asymmetries: A new hope for accurate mass-loss-rate estimates

    Authors: S. Ramstedt, W. H. T. Vlemmings, L. Doan, T. Danilovich, M. Lindqvist, M. Saberi, H. Olofsson, E. De Beck, M. A. T. Groenewegen, S. Höfner, J. H. Kastner, F. Kerschbaum, T. Khouri, M. Maercker, R. Montez, G. Quintana-Lacaci, R. Sahai, D. Tafoya, A. Zijlstra

    Abstract: This is the first publication of the DEATHSTAR project. The goal of the project is to reduce the uncertainties of observational estimates of mass-loss rates from Asymptotic Giant Branch (AGB) stars. Line emission from 12CO J=2-1 and 3-2 were mapped using the ACA. In this initial analysis, the emission distribution was fit to a Gaussian distribution in the uv-plane. Detailed radiative transfer anal… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

    Comments: 10 pages, 5 figures, 5 appendices, accepted in A&A

  38. arXiv:2003.09481  [pdf, other

    cs.DB cs.CR cs.DS

    Efficient Oblivious Database Joins

    Authors: Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila

    Abstract: A major algorithmic challenge in designing applications intended for secure remote execution is ensuring that they are oblivious to their inputs, in the sense that their memory access patterns do not leak sensitive information to the server. This problem is particularly relevant to cloud databases that wish to allow queries over the client's encrypted data. One of the major obstacles to such a goa… ▽ More

    Submitted 15 December, 2020; v1 submitted 20 March, 2020; originally announced March 2020.

    Journal ref: Proceedings of the VLDB Endowment (PVLDB), 13(11): 2132-2145, 2020

  39. arXiv:2002.05097  [pdf, other

    cs.CR

    EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves

    Authors: Benny Fuhry, Jayanth Jain H A, Florian Kerschbaum

    Abstract: Data confidentiality is an important requirement for clients when outsourcing databases to the cloud. Trusted execution environments, such as Intel SGX, offer an efficient, hardware-based solution to this cryptographic problem. Existing solutions are not optimized for column-oriented, in-memory databases and pose impractical memory requirements on the enclave. We present EncDBDB, a novel approach… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

  40. arXiv:1912.11328  [pdf, other

    cs.CR cs.LG

    Assessing differentially private deep learning with Membership Inference

    Authors: Daniel Bernau, Philip-William Grassal, Jonas Robl, Florian Kerschbaum

    Abstract: Attacks that aim to identify the training data of public neural networks represent a severe threat to the privacy of individuals participating in the training data set. A possible protection is offered by anonymization of the training data or training function with differential privacy. However, data scientists can choose between local and central differential privacy and need to select meaningful… ▽ More

    Submitted 26 May, 2020; v1 submitted 24 December, 2019; originally announced December 2019.

  41. arXiv:1912.00888  [pdf, other

    cs.LG cs.CR stat.ML

    Deep Neural Network Fingerprinting by Conferrable Adversarial Examples

    Authors: Nils Lukas, Yuxuan Zhang, Florian Kerschbaum

    Abstract: In Machine Learning as a Service, a provider trains a deep neural network and gives many users access. The hosted (source) model is susceptible to model stealing attacks, where an adversary derives a surrogate model from API access to the source model. For post hoc detection of such attacks, the provider needs a robust method to determine whether a suspect model is a surrogate of their model. We p… ▽ More

    Submitted 20 January, 2021; v1 submitted 2 December, 2019; originally announced December 2019.

  42. arXiv:1911.10756  [pdf, ps, other

    astro-ph.SR astro-ph.GA

    The extended molecular envelope of the asymptotic giant branch star $π^{1}$ Gruis as seen by ALMA II. The spiral-outflow observed at high-angular resolution

    Authors: L. Doan, S. Ramstedt, W. H. T. Vlemmings, S. Mohamed, S. Höfner, E. De Beck, F. Kerschbaum, M. Lindqvist, M. Maercker, C. Paladini, M. Wittkowski

    Abstract: The AGB star $π^{1}$ Gruis has a known companion (at a separation of ~400 AU) which cannot explain the strong deviations from the spherical symmetry of the CSE. Recently, hydrodynamic simulations of mass transfer in closer binary systems have successfully reproduced the spiral-shaped CSEs found around a handful of sources. There is growing evidence for an even closer, undetected companion complica… ▽ More

    Submitted 27 November, 2019; v1 submitted 25 November, 2019; originally announced November 2019.

    Comments: 12 pages, 11 figures

  43. arXiv:1910.14268  [pdf, other

    cs.CR cs.LG stat.ML

    RIGA: Covert and Robust White-Box Watermarking of Deep Neural Networks

    Authors: Tianhao Wang, Florian Kerschbaum

    Abstract: Watermarking of deep neural networks (DNN) can enable their tracing once released by a data owner. In this paper, we generalize white-box watermarking algorithms for DNNs, where the data owner needs white-box access to the model to extract the watermark. White-box watermarking algorithms have the advantage that they do not impact the accuracy of the watermarked model. We propose Robust whIte-box G… ▽ More

    Submitted 13 February, 2021; v1 submitted 31 October, 2019; originally announced October 2019.

    Comments: WebConf'21 (Full Paper)

  44. arXiv:1909.08362  [pdf, other

    cs.CR

    Non-Interactive Private Decision Tree Evaluation

    Authors: Anselme Tueno, Yordan Boev, Florian Kerschbaum

    Abstract: Decision trees are a powerful prediction model with many applications in statistics, data mining, and machine learning. In some settings, the model and the data to be classified may contain sensitive information belonging to different parties. In this paper, we, therefore, address the problem of privately evaluating a decision tree on private data. This scenario consists of a server holding a priv… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

  45. arXiv:1909.08347  [pdf, other

    cs.CR

    Secure Computation of the kth-Ranked Element in a Star Network

    Authors: Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi

    Abstract: We consider the problem of securely computing the kth-ranked element in a sequence of n private integers distributed among n parties. The kth-ranked element (e.g., minimum, maximum, median) is of particular interest in benchmarking, which allows a company to compare its own key performance indicator to the statistics of its peer group. The individual integers are sensitive data, yet the kth-ranked… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

  46. arXiv:1906.07745  [pdf, other

    cs.LG cs.CR stat.ML

    On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks

    Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum

    Abstract: Obtaining the state of the art performance of deep learning models imposes a high cost to model generators, due to the tedious data preparation and the substantial processing requirements. To protect the model from unauthorized re-distribution, watermarking approaches have been introduced in the past couple of years. We investigate the robustness and reliability of state-of-the-art deep neural net… ▽ More

    Submitted 25 November, 2019; v1 submitted 18 June, 2019; originally announced June 2019.

  47. arXiv:1903.04585  [pdf, other

    astro-ph.SR

    Cool, evolved stars: results, challenges, and promises for the next decade

    Authors: Gioia Rau, Rodolfo Montez Jr., Kenneth G. Carpenter, Markus Wittkowski, Sara Bladh, Margarita Karovska, Vladimir Airapetian, Tom Ayres, Martha Boyer, Andrea Chiavassa, Geoffrey Clayton, William Danchi, Orsola De Marco, Andrea K. Dupree, Tomasz Kaminski, Joel H. Kastner, Franz Kerschbaum, Jeffrey Linsky, Bruno Lopez, John Monnier, Miguel Montargès, Krister Nielsen, Keiichi Ohnaka, Sofia Ramstedt, Rachael Roettenbacher , et al. (5 additional authors not shown)

    Abstract: Cool, evolved stars are the main source of chemical enrichment of the interstellar medium (ISM), and understanding their mass loss and structure offers a unique opportunity to study the cycle of matter in the Universe. Pulsation, convection, and other dynamic processes in cool evolved stars create an atmosphere where molecules and dust can form, including those necessary to the formation of life (… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

    Comments: 10 pages, 2 figures, White Paper submitted to the Astronomy and Astrophysics Decadal Survey (Astro2020)

  48. Reduction of the maximum mass-loss rate of OH/IR stars due to unnoticed binary interaction

    Authors: L. Decin, W. Homan, T. Danilovich, A. de Koter, D. Engels, L. B. F. M. Waters, S. Muller, C. Gielen, D. A. García-Hernández, R. J. Stancliffe, M. Vande Sande, G. Molenberghs, F. Kerschbaum, A. A. Zijlstra, I. El Mellah

    Abstract: In 1981, the idea of a superwind that ends the life of cool giant stars was proposed. Extreme OH/IR-stars develop superwinds with the highest mass-loss rates known so far, up to a few 10^(-4) Msun/yr, informing our understanding of the maximum mass-loss rate achieved during the Asymptotic Giant Branch (AGB) phase. A condundrum arises whereby the observationally determined duration of the superwind… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: Publication date: 25 February 2019 at 16:00h GMT

    Journal ref: Nature Astronomy, 2019

  49. ALMA observations of the "fresh" carbon-rich AGB star TX Piscium. The discovery of an elliptical detached shell

    Authors: Magdalena Brunner, Marko Mecina, Matthias Maercker, Ernst A. Dorfi, Franz Kerschbaum, Hans Olofsson, Gioia Rau

    Abstract: Aims. The carbon-rich asymptotic giant branch (AGB) star TX Piscium (TX Psc) has been observed multiple times during multiple epochs and at different wavelengths and resolutions, showing a complex molecular CO line profile and a ring-like structure in thermal dust emission. We investigate the molecular counterpart in high resolution, aiming to resolve the ring-like structure and identify its origi… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Journal ref: A&A 621, A50 (2019)

  50. Molecular line study of the S-type AGB star W Aquilae. ALMA observations of CS, SiS, SiO and HCN

    Authors: Magdalena Brunner, Taissa Danilovich, Sofia Ramstedt, Ivan Marti-Vidal, Elvire De Beck, Wouter H. T. Vlemmings, Michael Lindqvist, Franz Kerschbaum

    Abstract: Context. With the outstanding spatial resolution and sensitivity of the Atacama Large Millimeter/sub-millimeter Array (ALMA), molecular gas other than the abundant CO can be observed and resolved in circumstellar envelopes (CSEs) around evolved stars, such as the binary S-type Asymptotic Giant Branch (AGB) star W Aquilae. Aims. We aim to constrain the chemical composition of the CSE and determine… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

    Journal ref: A&A 617, A23 (2018)