Skip to main content

Showing 1–50 of 62 results for author: Oprea, A

.
  1. arXiv:2405.20539  [pdf, other

    cs.LG cs.CR

    SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents

    Authors: Ethan Rathbun, Christopher Amato, Alina Oprea

    Abstract: Reinforcement learning (RL) is an actively growing field that is seeing increased usage in real-world, safety-critical applications -- making it paramount to ensure the robustness of RL algorithms against adversarial attacks. In this work we explore a particularly stealthy form of training-time attacks against RL -- backdoor poisoning. Here the adversary intercepts the training of an RL agent with… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 23 pages, 14 figures, NeurIPS

  2. arXiv:2405.20485  [pdf, other

    cs.CR cs.CL cs.LG

    Phantom: General Trigger Attacks on Retrieval Augmented Language Generation

    Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Retrieval Augmented Generation (RAG) expands the capabilities of modern large language models (LLMs) in chatbot applications, enabling developers to adapt and personalize the LLM output without expensive training or fine-tuning. RAG systems use an external knowledge database to retrieve the most relevant documents for a given query, providing this context to the LLM generator. While RAG achieves i… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  3. arXiv:2402.16982  [pdf, other

    cs.CR cs.PL

    Synthesizing Tight Privacy and Accuracy Bounds via Weighted Model Counting

    Authors: Lisa Oakley, Steven Holtzen, Alina Oprea

    Abstract: Programmatically generating tight differential privacy (DP) bounds is a hard problem. Two core challenges are (1) finding expressive, compact, and efficient encodings of the distributions of DP algorithms, and (2) state space explosion stemming from the multiple quantifiers and relational properties of the DP definition. We address the first challenge by develo** a method for tight privacy and… ▽ More

    Submitted 29 February, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

  4. arXiv:2310.09266  [pdf, other

    cs.CR cs.CL cs.LG

    User Inference Attacks on Large Language Models

    Authors: Nikhil Kandpal, Krishna Pillutla, Alina Oprea, Peter Kairouz, Christopher A. Choquette-Choo, Zheng Xu

    Abstract: Fine-tuning is a common and effective method for tailoring large language models (LLMs) to specialized tasks and applications. In this paper, we study the privacy implications of fine-tuning LLMs on user data. To this end, we consider a realistic threat model, called user inference, wherein an attacker infers whether or not a user's data was used for fine-tuning. We design attacks for performing u… ▽ More

    Submitted 23 February, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: v2 contains experiments on additional datasets and differential privacy

  5. arXiv:2310.03838  [pdf, other

    cs.LG

    Chameleon: Increasing Label-Only Membership Leakage with Adaptive Poisoning

    Authors: Harsh Chaudhari, Giorgio Severi, Alina Oprea, Jonathan Ullman

    Abstract: The integration of machine learning (ML) in numerous critical applications introduces a range of privacy concerns for individuals who provide their datasets for model training. One such privacy risk is Membership Inference (MI), in which an attacker seeks to determine whether a particular data sample was included in the training dataset of a model. Current state-of-the-art MI attacks capitalize on… ▽ More

    Submitted 16 January, 2024; v1 submitted 5 October, 2023; originally announced October 2023.

    Comments: To appear at International Conference on Learning Representations (ICLR) 2024

  6. arXiv:2309.01614  [pdf, other

    cs.LG cs.CR

    Dropout Attacks

    Authors: Andrew Yuan, Alina Oprea, Cheng Tan

    Abstract: Dropout is a common operator in deep learning, aiming to prevent overfitting by randomly drop** neurons during training. This paper introduces a new family of poisoning attacks against neural networks named DROPOUTATTACK. DROPOUTATTACK attacks the dropout operator by manipulating the selection of neurons to drop instead of selecting them uniformly at random. We design, implement, and evaluate fo… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  7. arXiv:2306.01655  [pdf, other

    cs.CR cs.LG

    Poisoning Network Flow Classifiers

    Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer

    Abstract: As machine learning (ML) classifiers increasingly oversee the automated monitoring of network traffic, studying their resilience against adversarial attacks becomes critical. This paper focuses on poisoning attacks, specifically backdoor attacks, against network traffic flow classifiers. We investigate the challenging scenario of clean-label poisoning where the adversary's capabilities are constra… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: 14 pages, 8 figures

  8. arXiv:2306.01181  [pdf, other

    cs.LG cs.CR

    TMI! Finetuned Models Leak Private Information from their Pretraining Data

    Authors: John Abascal, Stanley Wu, Alina Oprea, Jonathan Ullman

    Abstract: Transfer learning has become an increasingly popular technique in machine learning as a way to leverage a pretrained model trained for one task to assist with building a finetuned model for a related task. This paradigm has been especially popular for $\textit{privacy}$ in machine learning, where the pretrained model is considered public, and only the data for finetuning is considered sensitive. H… ▽ More

    Submitted 21 March, 2024; v1 submitted 1 June, 2023; originally announced June 2023.

  9. arXiv:2305.18447  [pdf, other

    cs.LG cs.CR cs.IT math.ST

    Unleashing the Power of Randomization in Auditing Differentially Private ML

    Authors: Krishna Pillutla, Galen Andrew, Peter Kairouz, H. Brendan McMahan, Alina Oprea, Sewoong Oh

    Abstract: We present a rigorous methodology for auditing differentially private machine learning algorithms by adding multiple carefully designed examples called canaries. We take a first principles approach based on three key components. First, we introduce Lifted Differential Privacy (LiDP) that expands the definition of differential privacy to handle randomized datasets. This gives us the freedom to desi… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

  10. arXiv:2302.03098  [pdf, other

    cs.LG cs.CR

    One-shot Empirical Privacy Estimation for Federated Learning

    Authors: Galen Andrew, Peter Kairouz, Sewoong Oh, Alina Oprea, H. Brendan McMahan, Vinith M. Suriyakumar

    Abstract: Privacy estimation techniques for differentially private (DP) algorithms are useful for comparing against analytical bounds, or to empirically measure privacy loss in settings where known analytical bounds are not tight. However, existing privacy auditing techniques usually make strong assumptions on the adversary (e.g., knowledge of intermediate model iterates or the training data distribution),… ▽ More

    Submitted 18 April, 2024; v1 submitted 6 February, 2023; originally announced February 2023.

    Comments: Final revision, oral presentation at ICLR 2024

  11. arXiv:2301.09732  [pdf, other

    cs.LG cs.CR

    Backdoor Attacks in Peer-to-Peer Federated Learning

    Authors: Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Most machine learning applications rely on centralized learning processes, opening up the risk of exposure of their training datasets. While federated learning (FL) mitigates to some extent these privacy risks, it relies on a trusted aggregation server for training a shared global model. Recently, new distributed learning architectures based on Peer-to-Peer Federated Learning (P2PFL) offer advanta… ▽ More

    Submitted 25 June, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

  12. Measurement of the $^{14}$N(n,p)$^{14}$C cross section at the CERN n_TOF facility from sub-thermal energy to 800 keV

    Authors: P. Torres-Sánchez, J. Praena, I. Porras, M. Sabaté-Gilarte, C. Lederer-Woods, O. Aberle, V. Alcayne, S. Amaducci, J. Andrzejewski, L. Audouin, V. Bécares, V. Babiano-Suarez, M. Bacak, M. Barbagallo, F. Bečvář, G. Bellia, E. Berthoumieux, J. Billowes, D. Bosnar, A. Brown, M. Busso, M. Caamaño, L. Caballero, F. Calviño, M. Calviani , et al. (107 additional authors not shown)

    Abstract: Background: The $^{14}$N(n,p)$^{14}$C reaction is of interest in neutron capture therapy, where nitrogen-related dose is the main component due to low-energy neutrons, and in astrophysics, where 14N acts as a neutron poison in the s-process. Several discrepancies remain between the existing data obtained in partial energy ranges: thermal energy, keV region and resonance region. Purpose: Measuring… ▽ More

    Submitted 9 December, 2022; originally announced December 2022.

    Comments: 18 pages, 15 figures, 4 tables

  13. arXiv:2210.03239  [pdf, other

    cs.CR

    Bad Citrus: Reducing Adversarial Costs with Model Distances

    Authors: Giorgio Severi, Will Pearce, Alina Oprea

    Abstract: Recent work by Jia et al., showed the possibility of effectively computing pairwise model distances in weight space, using a model explanation technique known as LIME. This method requires query-only access to the two models under examination. We argue this insight can be leveraged by an adversary to reduce the net cost (number of queries) of launching an evasion campaign against a deployed model.… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  14. arXiv:2208.12911  [pdf, other

    cs.CR cs.LG cs.NI

    Network-Level Adversaries in Federated Learning

    Authors: Giorgio Severi, Matthew Jagielski, Gökberk Yar, Yuxuan Wang, Alina Oprea, Cristina Nita-Rotaru

    Abstract: Federated learning is a popular strategy for training models on distributed, sensitive data, while preserving data privacy. Prior work identified a range of security threats on federated learning protocols that poison the data or the model. However, federated learning is a networked system where the communication between clients and server plays a critical role for the learning task performance. W… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: 12 pages. Appearing at IEEE CNS 2022

  15. arXiv:2208.12348  [pdf, other

    cs.LG cs.CR

    SNAP: Efficient Extraction of Private Properties with Poisoning

    Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman

    Abstract: Property inference attacks allow an adversary to extract global properties of the training dataset from a machine learning model. Such attacks have privacy implications for data owners sharing their datasets to train machine learning models. Several existing approaches for property inference attacks against deep neural networks have been proposed, but they all rely on the attacker training a large… ▽ More

    Submitted 21 June, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

    Comments: 28 pages, 16 figures

  16. Black-box Attacks Against Neural Binary Function Detection

    Authors: Joshua Bundt, Michael Davinroy, Ioannis Agadakos, Alina Oprea, William Robertson

    Abstract: Binary analyses based on deep neural networks (DNNs), or neural binary analyses (NBAs), have become a hotly researched topic in recent years. DNNs have been wildly successful at pushing the performance and accuracy envelopes in the natural language and image processing domains. Thus, DNNs are highly promising for solving binary analysis problems that are typically hard due to a lack of complete in… ▽ More

    Submitted 31 July, 2023; v1 submitted 24 August, 2022; originally announced August 2022.

    Comments: 16 pages

    Journal ref: The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023), October 16-18, 2023

  17. arXiv:2208.03276  [pdf, other

    cs.CR math.DS stat.AP

    Modeling Self-Propagating Malware with Epidemiological Models

    Authors: Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Nicola Perra, Tina Eliassi-Rad, Alina Oprea

    Abstract: Self-propagating malware (SPM) has recently resulted in large financial losses and high social impact, with well-known campaigns such as WannaCry and Colonial Pipeline being able to propagate rapidly on the Internet and cause service disruptions. To date, the propagation behavior of SPM is still not well understood, resulting in the difficulty of defending against these cyber threats. To address t… ▽ More

    Submitted 3 August, 2023; v1 submitted 5 August, 2022; originally announced August 2022.

  18. arXiv:2206.13594  [pdf, other

    cs.CR math.DS math.SP stat.AP

    Cyber Network Resilience against Self-Propagating Malware Attacks

    Authors: Alesia Chernikova, Nicolò Gozzi, Simona Boboila, Priyanka Angadi, John Loughner, Matthew Wilden, Nicola Perra, Tina Eliassi-Rad, Alina Oprea

    Abstract: Self-propagating malware (SPM) has led to huge financial losses, major data breaches, and widespread service disruptions in recent years. In this paper, we explore the problem of develo** cyber resilient systems capable of mitigating the spread of SPM attacks. We begin with an in-depth study of a well-known self-propagating malware, WannaCry, and present a compartmental model called SIIDR that a… ▽ More

    Submitted 8 October, 2022; v1 submitted 27 June, 2022; originally announced June 2022.

    Comments: 20 pages

  19. arXiv:2205.11459  [pdf, other

    cs.CR cs.LG

    CELEST: Federated Learning for Globally Coordinated Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Jack Davidson

    Abstract: The cyber-threat landscape has evolved tremendously in recent years, with new threat variants emerging daily, and large-scale coordinated campaigns becoming more prevalent. In this study, we propose CELEST (CollaborativE LEarning for Scalable Threat detection, a federated machine learning framework for global threat detection over HTTP, which is one of the most commonly used protocols for malware… ▽ More

    Submitted 16 March, 2023; v1 submitted 23 May, 2022; originally announced May 2022.

  20. arXiv:2205.09986  [pdf, other

    cs.CR cs.LG

    SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

    Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea

    Abstract: Secure multiparty computation (MPC) has been proposed to allow multiple mutually distrustful data owners to jointly train machine learning (ML) models on their combined data. However, by design, MPC protocols faithfully compute the training functionality, which the adversarial ML community has shown to leak private information and can be tampered with in poisoning attacks. In this work, we argue t… ▽ More

    Submitted 8 September, 2022; v1 submitted 20 May, 2022; originally announced May 2022.

  21. arXiv:2205.06369  [pdf, other

    cs.LG cs.CR

    How to Combine Membership-Inference Attacks on Multiple Updated Models

    Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu

    Abstract: A large body of research has shown that machine learning models are vulnerable to membership inference (MI) attacks that violate the privacy of the participants in the training data. Most MI research focuses on the case of a single standalone model, while production machine-learning platforms often update models over time, on data that often shifts in distribution, giving the attacker more informa… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Comments: 31 pages, 9 figures

  22. arXiv:2205.01992  [pdf, other

    cs.LG cs.AI cs.CR

    Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning

    Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Sebastiano Vascon, Werner Zellinger, Bernhard A. Moser, Alina Oprea, Battista Biggio, Marcello Pelillo, Fabio Roli

    Abstract: The success of machine learning is fueled by the increasing availability of computing power and large training datasets. The training data is used to learn new models or update existing ones, assuming that it is sufficiently representative of the data that will be encountered at test time. This assumption is challenged by the threat of poisoning, an attack that manipulates the training data to com… ▽ More

    Submitted 9 March, 2023; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: 35 pages, Accepted at ACM Computing Surveys

  23. arXiv:2202.05603  [pdf

    nucl-ex

    High accuracy, high resolution 235U(n,f) cross section from n_TOF (CERN) in the thermal to 10 keV energy range

    Authors: n_TOF collaboration, :, M. Mastromarco, S. Amaducci, N. Colonna, P. Finocchiaro, L. Cosentino, O. Aberle, J. Andrzejewski, L. Audouin, M. Bacak, J. Balibrea, M. Barbagallo, F. Bečvář, E. Berthoumieux, J. Billowes, D. Bosnar, A. Brown, M. Caamaño, F. Calviño, M. Calviani, D. Cano-Ott, R. Cardella, A. Casanovas, F. Cerutti , et al. (98 additional authors not shown)

    Abstract: The 235U(n,f) cross section was measured in a wide energy range (25 meV - 170 keV) at the n_TOF facility at CERN, relative to 6Li(n,t) and 10B(n,alpha) standard reactions, with high resolution and accuracy, with a setup based on a stack of six samples and six silicon detectors placed in the neutron beam. In this paper we report on the results in the region between thermal and 10 keV neutron energy… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

  24. arXiv:2112.13798  [pdf, other

    cs.CR

    PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

    Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan

    Abstract: Recent self-propagating malware (SPM) campaigns compromised hundred of thousands of victim machines on the Internet. It is challenging to detect these attacks in their early stages, as adversaries utilize common network services, use novel techniques, and can evade existing detection mechanisms. We propose PORTFILER (PORT-Level Network Traffic ProFILER), a new machine learning system applied to ne… ▽ More

    Submitted 24 May, 2022; v1 submitted 27 December, 2021; originally announced December 2021.

    Comments: An earlier version is accepted to be published in IEEE Conference on Communications and Network Security (CNS) 2021

  25. Living-Off-The-Land Command Detection Using Active Learning

    Authors: Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt

    Abstract: In recent years, enterprises have been targeted by advanced adversaries who leverage creative ways to infiltrate their systems and move laterally to gain access to critical data. One increasingly common evasive method is to hide the malicious activity behind a benign program by using tools that are already installed on user computers. These programs are usually part of the operating system distrib… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: 14 pages, published in RAID 2021

  26. arXiv:2110.02125  [pdf, other

    cs.CR cs.FL cs.LG eess.SY

    Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems

    Authors: Lisa Oakley, Alina Oprea, Stavros Tripakis

    Abstract: Probabilistic model checking is a useful technique for specifying and verifying properties of stochastic systems including randomized protocols and reinforcement learning models. Existing methods rely on the assumed structure and probabilities of certain system transitions. These assumptions may be incorrect, and may even be violated by an adversary who gains control of system components. In thi… ▽ More

    Submitted 31 July, 2022; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: To Appear, 35th IEEE Computer Security Foundations Symposium (2022)

  27. arXiv:2104.11636  [pdf, other

    cs.CR

    Collaborative Information Sharing for ML-Based Threat Detection

    Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson

    Abstract: Recently, coordinated attack campaigns started to become more widespread on the Internet. In May 2017, WannaCry infected more than 300,000 machines in 150 countries in a few days and had a large impact on critical infrastructure. Existing threat sharing platforms cannot easily adapt to emerging attack patterns. At the same time, enterprises started to adopt machine learning-based threat detection… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 6 pages, 5 figures. To be published in AI4CS-SDM2021

  28. arXiv:2104.10034  [pdf, other

    cs.CR

    On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

    Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea

    Abstract: Research and development of techniques which detect or remediate malicious network activity require access to diverse, realistic, contemporary data sets containing labeled malicious connections. In the absence of such data, said techniques cannot be meaningfully trained, tested, and evaluated. Synthetically produced data containing fabricated or merged network traffic is of limited value as it is… ▽ More

    Submitted 27 May, 2022; v1 submitted 20 April, 2021; originally announced April 2021.

    Comments: 4+2 pages, 3 figures, 1 table, for AI4CS-SDM21

  29. arXiv:2012.10374  [pdf, other

    physics.ins-det astro-ph.IM nucl-ex

    Imaging neutron capture cross sections: i-TED proof-of-concept and future prospects based on Machine-Learning techniques

    Authors: V. Babiano-Suárez, J. Lerendegui-Marco, J. Balibrea-Correa, L. Caballero, D. Calvo, I. Ladarescu, C. Domingo-Pardo, F. Calviño, A. Casanovas, A. Tarifeño-Saldivia, V. Alcayne, C. Guerrero, M. A. Millán-Callado, M. T. Rodríguez González, M. Barbagallo, O. Aberle, S. Amaducci, J. Andrzejewski, L. Audouin, M. Bacak, S. Bennett, E. Berthoumieux, J. Billowes, D. Bosnar, A. Brown , et al. (110 additional authors not shown)

    Abstract: i-TED is an innovative detection system which exploits Compton imaging techniques to achieve a superior signal-to-background ratio in ($n,γ$) cross-section measurements using time-of-flight technique. This work presents the first experimental validation of the i-TED apparatus for high-resolution time-of-flight experiments and demonstrates for the first time the concept proposed for background reje… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

    Comments: 16 pages, 16 figures

  30. arXiv:2012.07805  [pdf, other

    cs.CR cs.CL cs.LG

    Extracting Training Data from Large Language Models

    Authors: Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, Alina Oprea, Colin Raffel

    Abstract: It has become common to publish large (billion parameter) language models that have been trained on private datasets. This paper demonstrates that in such settings, an adversary can perform a training data extraction attack to recover individual training examples by querying the language model. We demonstrate our attack on GPT-2, a language model trained on scrapes of the public Internet, and ar… ▽ More

    Submitted 15 June, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  31. arXiv:2010.02962  [pdf

    cond-mat.mtrl-sci

    Conductance Model for Single-Crystalline/Compact Metal Oxide Gas Sensing Layers in the Non-Degenerate Limit: Example of Epitaxial SnO$_2$(101)

    Authors: Cristian Simion, Federico Schipani, Alexandra Papadogianni, Adelina Stanoiu, Melanie Budde, Alexandru Oprea, Udo Weimar, Oliver Bierwagen, Nicolae Barsan

    Abstract: Semiconducting metal oxide (SMOX)-based gas sensors are indispensable for safety and health applications, e.g. explosive, toxic gas alarms, controls for intake into car cabins and monitor for industrial processes. In the past, the sensor community has been studying polycrystalline materials as sensors where the porous and random microstructure of the SMOX does not allow a separation of the phenome… ▽ More

    Submitted 6 October, 2020; originally announced October 2020.

  32. Shape Coexistence at Zero Spin in 64Ni Driven by the Monopole Tensor Interaction

    Authors: N. Mărginean, D. Little, Y. Tsunoda, S. Leoni, R. V. F. Janssens, B. Fornal, T. Otsuka, C. Michelagnoli, L. Stan, F. C. L. Crespi, C. Costache, R. Lica, M. Sferrazza, A. Turturica, A. D. Ayangeakaa, K. Auranen, M. Barani, P. C. Bender, S. Bottoni, M. Boromiza, A. Bracco, S. Călinescu, C. M. Campbell, M. P. Carpenter, P. Chowdhury , et al. (53 additional authors not shown)

    Abstract: The low-spin structure of the semimagic 64Ni nucleus has been considerably expanded: combining four experiments, several 0+ and 2+ excited states were identified below 4.5 MeV, and their properties established. The Monte Carlo shell model accounts for the results and unveils an unexpectedly complex landscape of coexisting shapes: a prolate 0+ excitation is located at a surprisingly high energy (34… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Journal ref: Physical Review Letters 125, 102502 (2020)

  33. arXiv:2006.14026  [pdf, other

    cs.LG cs.CR stat.ML

    Subpopulation Data Poisoning Attacks

    Authors: Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea

    Abstract: Machine learning systems are deployed in critical settings, but they might fail in unexpected ways, impacting the accuracy of their predictions. Poisoning attacks against machine learning induce adversarial modification of data used by a machine learning algorithm to selectively change its output when it is deployed. In this work, we introduce a novel data poisoning attack called a \emph{subpopula… ▽ More

    Submitted 12 May, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: May12 update: add sever + backdoor defenses, comparison to witches' brew attack, better comparison to related work, transferability of representations for cmatch

  34. arXiv:2006.11928  [pdf, other

    cs.CR cs.LG

    With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models

    Authors: Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian

    Abstract: With the rise of third parties in the machine learning pipeline, the service provider in "Machine Learning as a Service" (MLaaS), or external data contributors in online learning, or the retraining of existing models, the need to ensure the security of the resulting machine learning models has become an increasingly important topic. The security community has demonstrated that without transparency… ▽ More

    Submitted 19 May, 2021; v1 submitted 21 June, 2020; originally announced June 2020.

    Comments: Accepted to IEEE Transactions on Information Forensics and Security (TIFS) 2021

  35. arXiv:2006.07709  [pdf, other

    cs.CR cs.LG

    Auditing Differentially Private Machine Learning: How Private is Private SGD?

    Authors: Matthew Jagielski, Jonathan Ullman, Alina Oprea

    Abstract: We investigate whether Differentially Private SGD offers better privacy in practice than what is guaranteed by its state-of-the-art analysis. We do so via novel data poisoning attacks, which we show correspond to realistic privacy attacks. While previous work (Ma et al., arXiv 2019) proposed this connection between differential privacy and data poisoning as a defense against data poisoning, our us… ▽ More

    Submitted 13 June, 2020; originally announced June 2020.

  36. arXiv:2003.01031  [pdf, other

    cs.CR cs.LG

    Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers

    Authors: Giorgio Severi, Jim Meyer, Scott Coull, Alina Oprea

    Abstract: Training pipelines for machine learning (ML) based malware classification often rely on crowdsourced threat feeds, exposing a natural attack injection point. In this paper, we study the susceptibility of feature-based ML malware classifiers to backdoor poisoning attacks, specifically focusing on challenging "clean label" attacks where attackers do not control the sample labeling process. We propos… ▽ More

    Submitted 10 January, 2021; v1 submitted 2 March, 2020; originally announced March 2020.

    Comments: 18 pages, 5 figures. To appear in USENIX Security 2021

  37. arXiv:2001.01601  [pdf, other

    physics.app-ph

    Structural, optical, and electrical properties of unintentionally doped NiO layers grown on MgO by plasma-assisted molecular beam epitaxy

    Authors: Melanie Budde, Carsten Tschammer, Philipp Franz, Johannes Feldl, Manfred Ramsteiner, Rüdiger Goldhahn, Martin Feneberg, Nicolae Barsan, Alexandru Oprea, Oliver Bierwagen

    Abstract: NiO layers were grown on MgO(100), MgO(110), and MgO(111) substrates by plasma-assisted molecular beam epitaxy under Ni-flux limited growth conditions. Single crystalline growth with a cube-on-cube epitaxial relationship was confirmed by X-ray diffraction measurements for all used growth conditions and substrates except MgO(111). A detailed growth series on MgO(100) was prepared using substrate te… ▽ More

    Submitted 6 January, 2020; originally announced January 2020.

    Journal ref: Journal of Applied Physics 123, 195301 (2018)

  38. Review and new concepts for neutron-capture measurements of astrophysical interest

    Authors: C. Domingo-Pardo, V. Babiano-Suarez, J. Balibrea-Correa, L. Caballero, I. Ladarescu, J. Lerendegui-Marco, J. L. Tain, F. Calviño, A. Casanovas, A. Segarra, A. E. Tarifeño-Saldivia, C. Guerrero, M. A. Millán-Callado, J. M. Quesada, M. T. Rodríguez-González, O. Aberle, V. Alcayne, S. Amaducci, J. Andrzejewski, L. Audouin, M. Bacak, M. Barbagallo, S. Bennett, E. Berthoumieux, D. Bosnar , et al. (106 additional authors not shown)

    Abstract: The idea of slow-neutron capture nucleosynthesis formulated in 1957 triggered a tremendous experimental effort in different laboratories worldwide to measure the relevant nuclear physics input quantities, namely ($n,γ$) cross sections over the stellar temperature range (from few eV up to several hundred keV) for most of the isotopes involved from Fe up to Bi. A brief historical review focused on t… ▽ More

    Submitted 16 November, 2019; originally announced November 2019.

    Comments: Nuclear Physics in Astrophysics IX - Conference Proceedings

  39. arXiv:1909.10480  [pdf, other

    cs.CR cs.LG

    FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments

    Authors: Alesia Chernikova, Alina Oprea

    Abstract: As advances in Deep Neural Networks (DNNs) demonstrate unprecedented levels of performance in many critical applications, their vulnerability to attacks is still an open question. We consider evasion attacks at testing time against Deep Learning in constrained environments, in which dependencies between features need to be satisfied. These situations may arise naturally in tabular data or may be t… ▽ More

    Submitted 14 June, 2022; v1 submitted 23 September, 2019; originally announced September 2019.

    Comments: 35 pages

  40. arXiv:1908.01928  [pdf, other

    cs.CR

    AppMine: Behavioral Analytics for Web Application Vulnerability Detection

    Authors: Indranil Jana, Alina Oprea

    Abstract: Web applications in widespread use have always been the target of large-scale attacks, leading to massive disruption of services and financial loss, as in the Equifax data breach. It has become common practice to deploy web application in containers like Docker for better portability and ease of deployment. We design a system called AppMine for lightweight monitoring of web applications running in… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

  41. arXiv:1908.00592  [pdf, other

    cs.CR

    The House That Knows You: User Authentication Based on IoT Data

    Authors: Talha Ongun, Oliver Spohngellert, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, Negin Salajegheh

    Abstract: Home-based Internet of Things (IoT) devices have gained in popularity and many households have become 'smart' by using devices such as smart sensors, locks, and voice-based assistants. Traditional authentication methods such as passwords, biometrics or multi-factor (using SMS or email) are either not applicable in the smart home setting, or they are inconvenient as they break the natural flow of i… ▽ More

    Submitted 27 December, 2021; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: 11 pages, 5 figures

  42. arXiv:1907.04846  [pdf, other

    cs.CR cs.LG stat.ML

    On Designing Machine Learning Models for Malicious Network Traffic Classification

    Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad

    Abstract: Machine learning (ML) started to become widely deployed in cyber security settings for shortening the detection cycle of cyber attacks. To date, most ML-based systems are either proprietary or make specific choices of feature representations and machine learning models. The success of these techniques is difficult to assess as public benchmark datasets are currently unavailable. In this paper, we… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

  43. QFlip: An Adaptive Reinforcement Learning Strategy for the FlipIt Security Game

    Authors: Lisa Oakley, Alina Oprea

    Abstract: A rise in Advanced Persistent Threats (APTs) has introduced a need for robustness against long-running, stealthy attacks which circumvent existing cryptographic security guarantees. FlipIt is a security game that models attacker-defender interactions in advanced scenarios such as APTs. Previous work analyzed extensively non-adaptive strategies in FlipIt, but adaptive strategies rise naturally in p… ▽ More

    Submitted 20 December, 2019; v1 submitted 27 June, 2019; originally announced June 2019.

    Comments: Outstanding Student Paper award

    Journal ref: Decision and Game Theory for Security. GameSec 2019. Lecture Notes in Computer Science, vol 11836. Springer, Cham. pp 364-384

  44. arXiv:1904.07370  [pdf, other

    cs.LG cs.CR stat.ML

    Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction

    Authors: Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim

    Abstract: Deep Neural Networks (DNNs) have tremendous potential in advancing the vision for self-driving cars. However, the security of DNN models in this context leads to major safety implications and needs to be better understood. We consider the case study of steering angle prediction from camera images, using the dataset from the 2014 Udacity challenge. We demonstrate for the first time adversarial test… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

    Comments: Preprint of the work accepted for publication at the IEEE Workshop on the Internet of Safe Things, San Francisco, CA, USA, May 23, 2019

  45. arXiv:1904.04475  [pdf, other

    cs.CR cs.AI cs.DB cs.DS

    Private Hierarchical Clustering and Efficient Approximation

    Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos

    Abstract: In collaborative learning, multiple parties contribute their datasets to jointly deduce global machine learning models for numerous predictive tasks. Despite its efficacy, this learning paradigm fails to encompass critical application domains that involve highly sensitive data, such as healthcare and security analytics, where privacy risks limit entities to individually train models using only the… ▽ More

    Submitted 1 October, 2021; v1 submitted 9 April, 2019; originally announced April 2019.

    Journal ref: CCSW 2021

  46. Measurement of the 235U(n,f) cross section relative to the 6Li(n,t) and 10B(n,alpha) standards from thermal to 170 keV neutron energy range at n_TOF

    Authors: S. Amaducci, L. Cosentino, M. Barbagallo, N. Colonna, A. Mengoni, C. Massimi, S. Lo Meo, P. Finocchiaro, O. Aberle, J. Andrzejewski, L. Audouin, M. Bacak, J. Balibrea, F. Bečvář, E. Berthoumieux, J. Billowes, D. Bosnar, A. Brown, M. Caamaño, F. Calviño, M. Calviani, D. Cano-Ott, R. Cardella, A. Casanovas, F. Cerutti , et al. (96 additional authors not shown)

    Abstract: The 235U(n,f) cross section was measured in a wide energy range at n_TOF relative to 6Li(n,t) and 10B(n,alpha), with high resolution and in a wide energy range, with a setup based on a stack of six samples and six silicon detectors placed in the neutron beam. This allowed us to make a direct comparison of the reaction yields under the same experimental conditions, and taking into account the forwa… ▽ More

    Submitted 4 March, 2019; v1 submitted 27 February, 2019; originally announced February 2019.

    Comments: 22 pages, 20 figures, submitted to PRC

  47. arXiv:1812.02696  [pdf, other

    cs.LG cs.DS cs.GT stat.ML

    Differentially Private Fair Learning

    Authors: Matthew Jagielski, Michael Kearns, Jieming Mao, Alina Oprea, Aaron Roth, Saeed Sharifi-Malvajerdi, Jonathan Ullman

    Abstract: Motivated by settings in which predictive models may be required to be non-discriminatory with respect to certain attributes (such as race), but even collecting the sensitive attribute may be forbidden or restricted, we initiate the study of fair learning under the constraint of differential privacy. We design two learning algorithms that simultaneously promise differential privacy and equalized o… ▽ More

    Submitted 31 May, 2019; v1 submitted 6 December, 2018; originally announced December 2018.

  48. arXiv:1809.02861  [pdf, other

    cs.LG cs.CR stat.ML

    Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks

    Authors: Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli

    Abstract: Transferability captures the ability of an attack against a machine-learning model to be effective against a different, potentially unknown, model. Empirical evidence for transferability has been shown in previous work, but the underlying reasons why an attack transfers or not are not yet well understood. In this paper, we present a comprehensive analysis aimed to investigate the transferability o… ▽ More

    Submitted 13 June, 2019; v1 submitted 8 September, 2018; originally announced September 2018.

    MSC Class: 68T10; 68T45

  49. The $^{7}$Be($\boldsymbol{n,p}$)$^{7}$Li reaction and the Cosmological Lithium Problem: measurement of the cross section in a wide energy range at n_TOF (CERN)

    Authors: L. Damone, M. Barbagallo, M. Mastromarco, A. Mengoni, L. Cosentino, E. Maugeri, S. Heinitz, D. Schumann, R. Dressler, F. Käppeler, N. Colonna, P. Finocchiaro, J. Andrzejewski, J. Perkowski, A. Gawlik, O. Aberle, S. Altstadt, M. Ayranov, L. Audouin, M. Bacak, J. Balibrea-Correa, J. Ballof, V. Bécares, F. Bečvář, C. Beinrucker , et al. (133 additional authors not shown)

    Abstract: We report on the measurement of the $^{7}$Be($n, p$)$^{7}$Li cross section from thermal to approximately 325 keV neutron energy, performed in the high-flux experimental area (EAR2) of the n\_TOF facility at CERN. This reaction plays a key role in the lithium yield of the Big Bang Nucleosynthesis (BBN) for standard cosmology. The only two previous time-of-flight measurements performed on this react… ▽ More

    Submitted 8 June, 2018; originally announced June 2018.

    Journal ref: Phys. Rev. Lett. 121, 042701 (2018)

  50. Cross section measurements of $^{155,157}$Gd(n,$γ$) induced by thermal and epithermal neutrons

    Authors: M. Mastromarco, A. Manna, O. Aberle, S. Amaducci, J. Andrzejewski, L. Audouin, M. Bacak, J. Balibrea, M. Barbagallo, F. Becvar, E. Berthoumieux, J. Billowes, D. Bosnar, A. Brown, M. Caamano, F. Calvino, M. Calviani, D. Cano-Ott, R. Cardella, A. Casanovas, D. M. Castelluccio, F. Cerutti, Y. H. Chen, E. Chiaveri, G. Clai , et al. (99 additional authors not shown)

    Abstract: Neutron capture measurements on $^{155}$Gd and $^{157}$Gd were performed using the time-of-flight technique at the n\_TOF facility at CERN. Four samples in form of self-sustaining metallic discs isotopically enriched in $^{155}$Gd and $^{157}$Gd were used. The measurements were carried out at the experimental area (EAR1) at 185 m from the neutron source, with an array of 4 C$_6$D$_6$ liquid scinti… ▽ More

    Submitted 10 May, 2018; originally announced May 2018.

    Journal ref: Eur. Phys. J. A (2019) 55: 9