Skip to main content

Showing 1–11 of 11 results for author: Rieger, P

.
  1. FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning

    Authors: Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Federated learning (FL) is a collaborative learning paradigm allowing multiple clients to jointly train a model without sharing their training data. However, FL is susceptible to poisoning attacks, in which the adversary injects manipulated model updates into the federated model aggregation process to corrupt or destroy predictions (untargeted poisoning) or implant hidden functionalities (targeted… ▽ More

    Submitted 16 January, 2024; v1 submitted 7 December, 2023; originally announced December 2023.

    Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. 16 pages, 8 figures, 12 tables, 1 algorithm, 3 equations

  2. arXiv:2310.02113  [pdf, other

    cs.CR cs.DC cs.LG

    FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks

    Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi

    Abstract: Federated learning (FL) is a distributed learning process that uses a trusted aggregation server to allow multiple parties (or clients) to collaboratively train a machine learning model without having them share their private data. Recent research, however, has demonstrated the effectiveness of inference and poisoning attacks on FL. Mitigating both attacks simultaneously is very challenging. State… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: To appear in Annual Computer Security Applications Conference (ACSAC) 2023

  3. arXiv:2308.00553  [pdf, other

    cs.CR

    FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning

    Authors: Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi

    Abstract: Federated Learning (FL) has become very popular since it enables clients to train a joint model collaboratively without sharing their private data. However, FL has been shown to be susceptible to backdoor and inference attacks. While in the former, the adversary injects manipulated updates into the aggregation process; the latter leverages clients' local models to deduce their private data. Contem… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  4. arXiv:2304.12917  [pdf, other

    cond-mat.mtrl-sci

    Defect-enhanced diffusion of magnetic skyrmions

    Authors: Philipp Rieger, Markus Weißenhofer, Ulrich Nowak

    Abstract: Defects, i.e. inhomogeneities of the underlying lattice, are ubiquitous in magnetic materials and can have a crucial impact on their applicability in spintronic devices. For magnetic skyrmions, localized and topologically non-trivial spin textures, they give rise to a spatially inhomogeneous energy landscape and can lead to pinning, resulting in an exponentially increased dwell time at certain pos… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

  5. arXiv:2302.07589  [pdf, other

    cs.CR cs.LG

    ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

    Authors: Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi

    Abstract: IoT application domains, device diversity and connectivity are rapidly growing. IoT devices control various functions in smart homes and buildings, smart cities, and smart factories, making these devices an attractive target for attackers. On the other hand, the large variability of different application scenarios and inherent heterogeneity of devices make it very challenging to reliably detect ab… ▽ More

    Submitted 16 February, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: To appear in the 32nd USENIX Security Symposium, August 2022, Anaheim CA, USA

  6. arXiv:2302.02740  [pdf, other

    cs.CR

    AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

    Authors: Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Mobile applications are widely used for online services sharing a large amount of personal data online. One-time authentication techniques such as passwords and physiological biometrics (e.g., fingerprint, face, and iris) have their own advantages but also disadvantages since they can be stolen or emulated, and do not prevent access to the underlying device, once it is unlocked. To address these c… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: 16 pages, 7 figures

  7. arXiv:2301.09508  [pdf, other

    cs.LG cs.AI

    BayBFed: Bayesian Backdoor Defense for Federated Learning

    Authors: Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi

    Abstract: Federated learning (FL) allows participants to jointly train a machine learning model without sharing their private data with others. However, FL is vulnerable to poisoning attacks such as backdoor attacks. Consequently, a variety of defenses have recently been proposed, which have primarily utilized intermediary states of the global model (i.e., logits) or distance of the local models (i.e., L2-n… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

  8. arXiv:2210.07714  [pdf, other

    cs.CR cs.LG

    CrowdGuard: Federated Backdoor Detection in Federated Learning

    Authors: Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Federated Learning (FL) is a promising approach enabling multiple clients to train Deep Neural Networks (DNNs) collaboratively without sharing their local training data. However, FL is susceptible to backdoor (or targeted poisoning) attacks. These attacks are initiated by malicious clients who seek to compromise the learning process by introducing specific behaviors into the learned model that can… ▽ More

    Submitted 22 August, 2023; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. Phillip Rieger and Torsten Krauß contributed equally to this contribution. 19 pages, 8 figures, 5 tables, 4 algorithms, 5 equations

  9. DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection

    Authors: Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi

    Abstract: Federated Learning (FL) allows multiple clients to collaboratively train a Neural Network (NN) model on their private data without revealing the data. Recently, several targeted poisoning attacks against FL have been introduced. These attacks inject a backdoor into the resulting model that allows adversary-controlled inputs to be misclassified. Existing countermeasures against backdoor attacks are… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: 18 pages, 8 figures; to appear in the Network and Distributed System Security Symposium (NDSS)

  10. arXiv:2101.02281  [pdf, other

    cs.CR

    FLAME: Taming Backdoors in Federated Learning (Extended Version 1)

    Authors: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider

    Abstract: Federated Learning (FL) is a collaborative machine learning approach allowing participants to jointly train a model without having to share their private, potentially sensitive local datasets with others. Despite its benefits, FL is vulnerable to backdoor attacks, in which an adversary injects manipulated model updates into the model aggregation process so that the resulting model will provide tar… ▽ More

    Submitted 5 August, 2023; v1 submitted 6 January, 2021; originally announced January 2021.

    Comments: This extended version incorporates a novel section (Section 10) that provides a comprehensive analysis of recent proposed attacks, notably "3DFed: Adaptive and extensible framework for covert backdoor attack in federated learning" by Li et al. This new section addresses flawed assertions made in the papers that aim to bypass FLAME or misinterpreted its fundamental design principles

  11. arXiv:1204.2754  [pdf

    cond-mat.supr-con

    Non-thermal response of YBCO thin films to picosecond THz pulses

    Authors: P. Probst, A. Semenov, M. Ries, A. Hoehl, P. Rieger, A. Scheuring, V. Judin, S. Wünsch, K. Il'in, N. Smale, Y. -L. Mathis, R. Müller, G. Ulm, G. Wüstefeld, H. -W. Hübers, J. Hänisch, B. Holzapfel, M. Siegel, A. -S. Müller

    Abstract: The photoresponse of YBa2Cu3O7-d thin film microbridges with thicknesses between 15 and 50 nm was studied in the optical and terahertz frequency range. The voltage transients in response to short radiation pulses were recorded in real time with a resolution of a few tens of picoseconds. The bridges were excited by either femtosecond pulses at a wavelength of 0.8 μm or broadband (0.1 - 1.5 THz) pic… ▽ More

    Submitted 12 April, 2012; originally announced April 2012.