Skip to main content

Showing 1–10 of 10 results for author: Lukas, N

.
  1. arXiv:2312.00157  [pdf, other

    cs.LG cs.CR cs.CV

    Universal Backdoor Attacks

    Authors: Benjamin Schneider, Nils Lukas, Florian Kerschbaum

    Abstract: Web-scraped datasets are vulnerable to data poisoning, which can be used for backdooring deep image classifiers during training. Since training on large datasets is expensive, a model is trained once and re-used many times. Unlike adversarial examples, backdoor attacks often target specific classes rather than any class learned by the model. One might expect that targeting many classes through a n… ▽ More

    Submitted 19 January, 2024; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: Accepted for publication at ICLR 2024

  2. arXiv:2310.14565  [pdf, other

    cs.CR

    PEPSI: Practically Efficient Private Set Intersection in the Unbalanced Setting

    Authors: Rasoul Akhavan Mahdavi, Nils Lukas, Faezeh Ebrahimianghazani, Thomas Humphries, Bailey Kacsmar, John Premkumar, Xinda Li, Simon Oya, Ehsan Amjadian, Florian Kerschbaum

    Abstract: Two parties with private data sets can find shared elements using a Private Set Intersection (PSI) protocol without revealing any information beyond the intersection. Circuit PSI protocols privately compute an arbitrary function of the intersection - such as its cardinality, and are often employed in an unbalanced setting where one party has more data than the other. Existing protocols are either… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

  3. arXiv:2309.16952  [pdf, other

    cs.CR cs.LG

    Leveraging Optimization for Adaptive Attacks on Image Watermarks

    Authors: Nils Lukas, Abdulrahman Diaa, Lucas Fenaux, Florian Kerschbaum

    Abstract: Untrustworthy users can misuse image generators to synthesize high-quality deepfakes and engage in unethical activities. Watermarking deters misuse by marking generated content with a hidden message, enabling its detection using a secret watermarking key. A core security property of watermarking is robustness, which states that an attacker can only evade detection by substantially degrading image… ▽ More

    Submitted 20 January, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: ICLR'24

  4. arXiv:2306.08538  [pdf, other

    cs.CR cs.LG

    Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions

    Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum

    Abstract: Machine Learning as a Service (MLaaS) is an increasingly popular design where a company with abundant computing resources trains a deep neural network and offers query access for tasks like image classification. The challenge with this design is that MLaaS requires the client to reveal their potentially sensitive queries to the company hosting the model. Multi-party computation (MPC) protects the… ▽ More

    Submitted 16 April, 2024; v1 submitted 14 June, 2023; originally announced June 2023.

    Comments: To appear at USENIX Security 2024

  5. arXiv:2305.09671  [pdf, other

    cs.CR cs.LG

    Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks

    Authors: Nils Lukas, Florian Kerschbaum

    Abstract: Deep image classification models trained on vast amounts of web-scraped data are susceptible to data poisoning - a mechanism for backdooring models. A small number of poisoned samples seen during training can severely undermine a model's integrity during inference. Existing work considers an effective defense as one that either (i) restores a model's integrity through repair or (ii) detects an att… ▽ More

    Submitted 29 June, 2023; v1 submitted 7 May, 2023; originally announced May 2023.

    Comments: Preprint

  6. arXiv:2304.07361  [pdf, other

    cs.LG cs.CR

    PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators

    Authors: Nils Lukas, Florian Kerschbaum

    Abstract: Deepfakes refer to content synthesized using deep generators, which, when misused, have the potential to erode trust in digital media. Synthesizing high-quality deepfakes requires access to large and complex generators only a few entities can train and provide. The threat is malicious users that exploit access to the provided model and generate harmful deepfakes without risking detection. Watermar… ▽ More

    Submitted 7 November, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: USENIX Security 2023

  7. arXiv:2302.00539  [pdf, other

    cs.LG

    Analyzing Leakage of Personally Identifiable Information in Language Models

    Authors: Nils Lukas, Ahmed Salem, Robert Sim, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin

    Abstract: Language Models (LMs) have been shown to leak information about training data through sentence-level membership inference and reconstruction attacks. Understanding the risk of LMs leaking Personally Identifiable Information (PII) has received less attention, which can be attributed to the false assumption that dataset curation techniques such as scrubbing are sufficient to prevent PII leakage. Scr… ▽ More

    Submitted 23 April, 2023; v1 submitted 1 February, 2023; originally announced February 2023.

    Comments: IEEE Symposium on Security and Privacy (S&P) 2023

  8. arXiv:2108.04974  [pdf, other

    cs.CR cs.LG

    SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)

    Authors: Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum

    Abstract: Deep Neural Network (DNN) watermarking is a method for provenance verification of DNN models. Watermarking should be robust against watermark removal attacks that derive a surrogate model that evades provenance verification. Many watermarking schemes that claim robustness have been proposed, but their robustness is only validated in isolation against a relatively small set of attacks. There is no… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

  9. arXiv:1912.00888  [pdf, other

    cs.LG cs.CR stat.ML

    Deep Neural Network Fingerprinting by Conferrable Adversarial Examples

    Authors: Nils Lukas, Yuxuan Zhang, Florian Kerschbaum

    Abstract: In Machine Learning as a Service, a provider trains a deep neural network and gives many users access. The hosted (source) model is susceptible to model stealing attacks, where an adversary derives a surrogate model from API access to the source model. For post hoc detection of such attacks, the provider needs a robust method to determine whether a suspect model is a surrogate of their model. We p… ▽ More

    Submitted 20 January, 2021; v1 submitted 2 December, 2019; originally announced December 2019.

  10. arXiv:1906.07745  [pdf, other

    cs.LG cs.CR stat.ML

    On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks

    Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum

    Abstract: Obtaining the state of the art performance of deep learning models imposes a high cost to model generators, due to the tedious data preparation and the substantial processing requirements. To protect the model from unauthorized re-distribution, watermarking approaches have been introduced in the past couple of years. We investigate the robustness and reliability of state-of-the-art deep neural net… ▽ More

    Submitted 25 November, 2019; v1 submitted 18 June, 2019; originally announced June 2019.