Skip to main content

Showing 1–15 of 15 results for author: Krishnamurthy, S V

.
  1. arXiv:2402.08769  [pdf, other

    cs.LG cs.DC

    FLASH: Federated Learning Across Simultaneous Heterogeneities

    Authors: Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

    Abstract: The key premise of federated learning (FL) is to train ML models across a diverse set of data-owners (clients), without exchanging local data. An overarching challenge to this date is client heterogeneity, which may arise not only from variations in data distribution, but also in data quality, as well as compute/communication latency. An integrated view of these diverse and concurrent sources of h… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  2. arXiv:2401.04130  [pdf, other

    cs.LG cs.AI

    Plug-and-Play Transformer Modules for Test-Time Adaptation

    Authors: Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

    Abstract: Parameter-efficient tuning (PET) methods such as LoRA, Adapter, and Visual Prompt Tuning (VPT) have found success in enabling adaptation to new domains by tuning small modules within a transformer model. However, the number of domains encountered during test time can be very large, and the data is usually unlabeled. Thus, adaptation to new domains is challenging; it is also impractical to generate… ▽ More

    Submitted 8 February, 2024; v1 submitted 5 January, 2024; originally announced January 2024.

  3. arXiv:2209.09883  [pdf, other

    cs.CV

    Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks

    Authors: Abhishek Aich, Shasha Li, Chengyu Song, M. Salman Asif, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury

    Abstract: State-of-the-art generative model-based attacks against image classifiers overwhelmingly focus on single-object (i.e., single dominant object) images. Different from such settings, we tackle a more practical problem of generating adversarial perturbations using multi-object (i.e., multiple dominant objects) images as they are representative of most real-world scenes. Our goal is to design an attac… ▽ More

    Submitted 3 October, 2022; v1 submitted 20 September, 2022; originally announced September 2022.

    Comments: Accepted at WACV 2023 (Round 1), camera-ready version

  4. arXiv:2209.09502  [pdf, other

    cs.CV

    GAMA: Generative Adversarial Multi-Object Scene Attacks

    Authors: Abhishek Aich, Calvin-Khang Ta, Akash Gupta, Chengyu Song, Srikanth V. Krishnamurthy, M. Salman Asif, Amit K. Roy-Chowdhury

    Abstract: The majority of methods for crafting adversarial attacks have focused on scenes with a single dominant object (e.g., images from ImageNet). On the other hand, natural scenes include multiple dominant objects that are semantically related. Thus, it is crucial to explore designing attack strategies that look beyond learning on single-object scenes or attack single-object victim classifiers. Due to t… ▽ More

    Submitted 15 October, 2022; v1 submitted 20 September, 2022; originally announced September 2022.

    Comments: Accepted at NeurIPS 2022; First two authors contributed equally; Includes Supplementary Material

  5. arXiv:2203.15230  [pdf, other

    cs.CV cs.CR cs.LG

    Zero-Query Transfer Attacks on Context-Aware Object Detectors

    Authors: Zikui Cai, Shantanu Rane, Alejandro E. Brito, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

    Abstract: Adversarial attacks perturb images such that a deep neural network produces incorrect classification results. A promising approach to defend against adversarial attacks on natural multi-object scenes is to impose a context-consistency check, wherein, if the detected objects are not consistent with an appropriately defined context, then an attack is suspected. Stronger attacks are needed to fool su… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: CVPR 2022 Accepted

  6. arXiv:2112.03223  [pdf, other

    cs.CV cs.AI cs.LG

    Context-Aware Transfer Attacks for Object Detection

    Authors: Zikui Cai, Xinxin Xie, Shasha Li, Mingjun Yin, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

    Abstract: Blackbox transfer attacks for image classifiers have been extensively studied in recent years. In contrast, little progress has been made on transfer attacks for object detectors. Object detectors take a holistic view of the image and the detection of one object (or lack thereof) often depends on other objects in the scene. This makes such detectors inherently context-aware and adversarial attacks… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Comments: accepted to AAAI 2022

  7. arXiv:2110.12321  [pdf, other

    cs.CV cs.LG

    ADC: Adversarial attacks against object Detection that evade Context consistency checks

    Authors: Mingjun Yin, Shasha Li, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

    Abstract: Deep Neural Networks (DNNs) have been shown to be vulnerable to adversarial examples, which are slightly perturbed input images which lead DNNs to make wrong predictions. To protect from such examples, various defense strategies have been proposed. A very recent defense strategy for detecting adversarial examples, that has been shown to be robust to current attacks, is to check for intrinsic conte… ▽ More

    Submitted 23 October, 2021; originally announced October 2021.

    Comments: WCAV'22 Acceptted

  8. arXiv:2110.01823  [pdf, other

    cs.CV

    Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations

    Authors: Shasha Li, Abhishek Aich, Shitong Zhu, M. Salman Asif, Chengyu Song, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

    Abstract: When compared to the image classification models, black-box adversarial attacks against video classification models have been largely understudied. This could be possible because, with video, the temporal dimension poses significant additional challenges in gradient estimation. Query-efficient black-box attacks rely on effectively estimated gradients towards maximizing the probability of misclassi… ▽ More

    Submitted 26 October, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: Accepted at NeurIPS 2021; First two authors contributed equally; Includes Supplementary Material

  9. arXiv:2108.08421  [pdf, other

    cs.CV cs.LG

    Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes

    Authors: Mingjun Yin, Shasha Li, Zikui Cai, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

    Abstract: Vision systems that deploy Deep Neural Networks (DNNs) are known to be vulnerable to adversarial examples. Recent research has shown that checking the intrinsic consistencies in the input data is a promising way to detect adversarial attacks (e.g., by checking the object co-occurrence relationships in complex scenes). However, existing approaches are tied to specific models and do not offer genera… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: ICCV'21 Accepted

  10. You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning

    Authors: Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami

    Abstract: As Deep Packet Inspection (DPI) middleboxes become increasingly popular, a spectrum of adversarial attacks have emerged with the goal of evading such middleboxes. Many of these attacks exploit discrepancies between the middlebox network protocol implementations, and the more rigorous/complete versions implemented at end hosts. These evasion attacks largely involve subtle manipulations of packets t… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: 12 pages, 12 figures; accepted to ACM CoNEXT 2020

  11. arXiv:2008.11772  [pdf, ps, other

    cs.CV

    Measurement-driven Security Analysis of Imperceptible Impersonation Attacks

    Authors: Shasha Li, Karim Khalil, Rameswar Panda, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami

    Abstract: The emergence of Internet of Things (IoT) brings about new security challenges at the intersection of cyber and physical spaces. One prime example is the vulnerability of Face Recognition (FR) based access control in IoT systems. While previous research has shown that Deep Neural Network(DNN)-based FR systems (FRS) are potentially susceptible to imperceptible impersonation attacks, the potency of… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: accepted and appears in ICCCN 2020

  12. arXiv:2001.10999  [pdf, other

    cs.CR cs.LG

    A4 : Evading Learning-based Adblockers

    Authors: Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq

    Abstract: Efforts by online ad publishers to circumvent traditional ad blockers towards regaining fiduciary benefits, have been demonstrably successful. As a result, there have recently emerged a set of adblockers that apply machine learning instead of manually curated rules and have been shown to be more robust in blocking ads on websites including social media sites such as Facebook. Among these, AdGraph… ▽ More

    Submitted 29 January, 2020; originally announced January 2020.

    Comments: 10 pages, 7 figures

  13. IoTSan: Fortifying the Safety of IoT Systems

    Authors: Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick McDaniel

    Abstract: Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states. Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurati… ▽ More

    Submitted 27 October, 2018; v1 submitted 22 October, 2018; originally announced October 2018.

    Comments: Proc. of the 14th ACM CoNEXT, 2018

  14. arXiv:1807.00458  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Adversarial Perturbations Against Real-Time Video Classification Systems

    Authors: Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy Chowdhury, Ananthram Swami

    Abstract: Recent research has demonstrated the brittleness of machine learning systems to adversarial perturbations. However, the studies have been mostly limited to perturbations on images and more generally, classification that does not deal with temporally varying inputs. In this paper we ask "Are adversarial perturbations possible in real-time video classification systems and if so, what properties must… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Journal ref: Network and Distributed Systems Security (NDSS) Symposium 2019 24-27 February 2019, San Diego, CA, USA

  15. arXiv:0906.3038  [pdf, ps, other

    cs.NI

    A measurement driven, 802.11 anti-jamming system

    Authors: Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Christos Gkantsidis

    Abstract: Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, we first conduct extensive experiments on an indoor 802.11 network to assess the ability of two physical layer functions, rate adaptation and power co… ▽ More

    Submitted 16 June, 2009; originally announced June 2009.

    Comments: 16 pages, full version of a submitted work to CoNext 2009 conference