Skip to main content

Showing 1–21 of 21 results for author: Shamsabadi, A S

.
  1. arXiv:2310.01424  [pdf, ps, other

    cs.CL cs.AI

    Identifying and Mitigating Privacy Risks Stemming from Language Models: A Survey

    Authors: Victoria Smith, Ali Shahin Shamsabadi, Carolyn Ashurst, Adrian Weller

    Abstract: Large Language Models (LLMs) have shown greatly enhanced performance in recent years, attributed to increased size and extensive training data. This advancement has led to widespread interest and adoption across industries and the public. However, training data memorization in Machine Learning models scales with model size, particularly concerning for LLMs. Memorized text sequences have the potent… ▽ More

    Submitted 18 June, 2024; v1 submitted 27 September, 2023; originally announced October 2023.

    Comments: 15 pages

  2. arXiv:2301.04017  [pdf, other

    cs.CR cs.LG

    Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation

    Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot

    Abstract: Federated learning (FL) is a framework for users to jointly train a machine learning model. FL is promoted as a privacy-enhancing technology (PET) that provides data minimization: data never "leaves" personal devices and users share only model updates with a server (e.g., a company) coordinating the distributed training. While prior work showed that in vanilla FL a malicious server can extract use… ▽ More

    Submitted 12 April, 2023; v1 submitted 9 January, 2023; originally announced January 2023.

  3. arXiv:2211.15410  [pdf, other

    cs.LG cs.CR

    Private Multi-Winner Voting for Machine Learning

    Authors: Adam Dziedzic, Christopher A Choquette-Choo, Natalie Dullerud, Vinith Menon Suriyakumar, Ali Shahin Shamsabadi, Muhammad Ahmad Kaleem, Somesh Jha, Nicolas Papernot, Xiao Wang

    Abstract: Private multi-winner voting is the task of revealing $k$-hot binary vectors satisfying a bounded differential privacy (DP) guarantee. This task has been understudied in machine learning literature despite its prevalence in many domains such as healthcare. We propose three new DP multi-winner mechanisms: Binary, $τ$, and Powerset voting. Binary voting operates independently per label through compos… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

    Comments: Accepted at PoPETS 2023

  4. arXiv:2206.00772  [pdf, other

    cs.LG cs.AI cs.CR

    On the reversibility of adversarial attacks

    Authors: Chau Yi Li, Ricardo Sánchez-Matilla, Ali Shahin Shamsabadi, Riccardo Mazzon, Andrea Cavallaro

    Abstract: Adversarial attacks modify images with perturbations that change the prediction of classifiers. These modified images, known as adversarial examples, expose the vulnerabilities of deep neural network classifiers. In this paper, we investigate the predictability of the map** between the classes predicted for original images and for their corresponding adversarial examples. This predictability rel… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

  5. arXiv:2203.00949  [pdf, other

    cs.LG cs.CR

    GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation

    Authors: Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez

    Abstract: In this paper, we study the problem of learning Graph Neural Networks (GNNs) with Differential Privacy (DP). We propose a novel differentially private GNN based on Aggregation Perturbation (GAP), which adds stochastic noise to the GNN's aggregation function to statistically obfuscate the presence of a single edge (edge-level privacy) or a single node and all its adjacent edges (node-level privacy)… ▽ More

    Submitted 18 November, 2022; v1 submitted 2 March, 2022; originally announced March 2022.

    Comments: Accepted at USENIX Security '23

  6. arXiv:2202.11823  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    Differentially Private Speaker Anonymization

    Authors: Ali Shahin Shamsabadi, Brij Mohan Lal Srivastava, Aurélien Bellet, Nathalie Vauquier, Emmanuel Vincent, Mohamed Maouche, Marc Tommasi, Nicolas Papernot

    Abstract: Sharing real-world speech utterances is key to the training and deployment of voice-based services. However, it also raises privacy risks as speech contains a wealth of personal data. Speaker anonymization aims to remove speaker information from a speech utterance while leaving its linguistic and prosodic attributes intact. State-of-the-art techniques operate by disentangling the speaker informati… ▽ More

    Submitted 6 October, 2022; v1 submitted 23 February, 2022; originally announced February 2022.

  7. arXiv:2202.02751  [pdf, other

    cs.LG cs.CR cs.SD eess.AS

    Tubes Among Us: Analog Attack on Automatic Speaker Identification

    Authors: Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz

    Abstract: Recent years have seen a surge in the popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be vulnerable to adversarial examples. A large number of modern systems protect themselves against such attacks by targeting artificiality, i.e., they deploy mechanisms to detect the lack of human involvement in generating the adversarial examples.… ▽ More

    Submitted 27 May, 2023; v1 submitted 6 February, 2022; originally announced February 2022.

    Comments: Published at USENIX Security 2023 https://www.usenix.org/conference/usenixsecurity23/presentation/ahmed

  8. arXiv:2112.02918  [pdf, other

    cs.LG cs.CR cs.DC

    When the Curious Abandon Honesty: Federated Learning Is Not Private

    Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot

    Abstract: In federated learning (FL), data does not leave personal devices when they are jointly training a machine learning model. Instead, these devices share gradients, parameters, or other model updates, with a central party (e.g., a company) coordinating the training. Because data never "leaves" personal devices, FL is often presented as privacy-preserving. Yet, recently it was shown that this protecti… ▽ More

    Submitted 12 April, 2023; v1 submitted 6 December, 2021; originally announced December 2021.

  9. arXiv:2011.08483  [pdf, other

    cs.SD cs.LG eess.AS

    FoolHD: Fooling speaker identification by Highly imperceptible adversarial Disturbances

    Authors: Ali Shahin Shamsabadi, Francisco Sepúlveda Teixeira, Alberto Abad, Bhiksha Raj, Andrea Cavallaro, Isabel Trancoso

    Abstract: Speaker identification models are vulnerable to carefully designed adversarial perturbations of their input signals that induce misclassification. In this work, we propose a white-box steganography-inspired adversarial attack that generates imperceptible adversarial perturbations against a speaker identification model. Our approach, FoolHD, uses a Gated Convolutional Autoencoder that operates in t… ▽ More

    Submitted 20 February, 2021; v1 submitted 17 November, 2020; originally announced November 2020.

    Comments: https://fsepteixeira.github.io/FoolHD/

  10. Semantically Adversarial Learnable Filters

    Authors: Ali Shahin Shamsabadi, Changjae Oh, Andrea Cavallaro

    Abstract: We present an adversarial framework to craft perturbations that mislead classifiers by accounting for the image content and the semantics of the labels. The proposed framework combines a structure loss and a semantic adversarial loss in a multi-task objective function to train a fully convolutional neural network. The structure loss helps generate perturbations whose type and magnitude are defined… ▽ More

    Submitted 5 April, 2022; v1 submitted 13 August, 2020; originally announced August 2020.

    Comments: 13 pages

    Journal ref: IEEE Transactions on Image Processing, 2021

  11. Exploiting vulnerabilities of deep neural networks for privacy protection

    Authors: Ricardo Sanchez-Matilla, Chau Yi Li, Ali Shahin Shamsabadi, Riccardo Mazzon, Andrea Cavallaro

    Abstract: Adversarial perturbations can be added to images to protect their content from unwanted inferences. These perturbations may, however, be ineffective against classifiers that were not {seen} during the generation of the perturbation, or against defenses {based on re-quantization, median filtering or JPEG compression. To address these limitations, we present an adversarial attack {that is} specifica… ▽ More

    Submitted 19 July, 2020; originally announced July 2020.

    Journal ref: IEEE Transactions on Multimedia 2020

  12. arXiv:2004.05703  [pdf, other

    cs.LG cs.CR stat.ML

    DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

    Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi

    Abstract: We present DarkneTZ, a framework that uses an edge device's Trusted Execution Environment (TEE) in conjunction with model partitioning to limit the attack surface against Deep Neural Networks (DNNs). Increasingly, edge devices (smartphones and consumer IoT devices) are equipped with pre-trained DNNs for a variety of applications. This trend comes with privacy risks as models can leak information a… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

    Comments: 13 pages, 8 figures, accepted to ACM MobiSys 2020

  13. arXiv:2004.05574  [pdf, other

    cs.CR cs.LG

    PrivEdge: From Local to Distributed Private Training and Prediction

    Authors: Ali Shahin Shamsabadi, Adria Gascon, Hamed Haddadi, Andrea Cavallaro

    Abstract: Machine Learning as a Service (MLaaS) operators provide model training and prediction on the cloud. MLaaS applications often rely on centralised collection and aggregation of user data, which could lead to significant privacy concerns when dealing with sensitive personal data. To address this problem, we propose PrivEdge, a technique for privacy-preserving MLaaS that safeguards the privacy of user… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

    Comments: IEEE Transactions on Information Forensics and Security (TIFS)

  14. arXiv:1911.10891  [pdf, other

    cs.CV

    ColorFool: Semantic Adversarial Colorization

    Authors: Ali Shahin Shamsabadi, Ricardo Sanchez-Matilla, Andrea Cavallaro

    Abstract: Adversarial attacks that generate small L_p-norm perturbations to mislead classifiers have limited success in black-box settings and with unseen classifiers. These attacks are also not robust to defenses that use denoising filters and to adversarial training procedures. Instead, adversarial attacks that generate unrestricted perturbations are more robust to defenses, are generally more successful… ▽ More

    Submitted 12 April, 2020; v1 submitted 25 November, 2019; originally announced November 2019.

    Comments: Conference on Computer Vision and Pattern Recognition (CVPR2020)

  15. arXiv:1910.12227  [pdf, other

    cs.LG cs.CV stat.ML

    EdgeFool: An Adversarial Image Enhancement Filter

    Authors: Ali Shahin Shamsabadi, Changjae Oh, Andrea Cavallaro

    Abstract: Adversarial examples are intentionally perturbed images that mislead classifiers. These images can, however, be easily detected using denoising algorithms, when high-frequency spatial perturbations are used, or can be noticed by humans, when perturbations are large. In this paper, we propose EdgeFool, an adversarial image enhancement filter that learns structure-aware adversarial perturbations. Ed… ▽ More

    Submitted 5 March, 2020; v1 submitted 27 October, 2019; originally announced October 2019.

    Journal ref: Proceedings of the 45th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)2020

  16. arXiv:1907.06034  [pdf, other

    cs.CR cs.LG

    Towards Characterizing and Limiting Information Exposure in DNN Layers

    Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, Hamed Haddadi

    Abstract: Pre-trained Deep Neural Network (DNN) models are increasingly used in smartphones and other user devices to enable prediction services, leading to potential disclosures of (sensitive) information from training data captured inside these models. Based on the concept of generalization error, we propose a framework to measure the amount of sensitive information memorized in each layer of a DNN. Our r… ▽ More

    Submitted 13 July, 2019; originally announced July 2019.

    Comments: 5 pages, 6 figures, CCS PPML workshop

  17. arXiv:1907.03372  [pdf, other

    cs.CR cs.LG

    QUOTIENT: Two-Party Secure Neural Network Training and Prediction

    Authors: Nitin Agrawal, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón

    Abstract: Recently, there has been a wealth of effort devoted to the design of secure protocols for machine learning tasks. Much of this is aimed at enabling secure prediction from highly-accurate Deep Neural Networks (DNNs). However, as DNNs are trained on data, a key question is how such models can be also trained securely. The few prior works on secure DNN training have focused either on designing custom… ▽ More

    Submitted 7 July, 2019; originally announced July 2019.

  18. arXiv:1802.03583  [pdf, other

    cs.LG stat.ML

    Distributed One-class Learning

    Authors: Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro

    Abstract: We propose a cloud-based filter trained to block third parties from uploading privacy-sensitive images of others to online social media. The proposed filter uses Distributed One-Class Learning, which decomposes the cloud-based filter into multiple one-class classifiers. Each one-class classifier captures the properties of a class of privacy-sensitive images with an autoencoder. The multi-class fil… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

  19. arXiv:1802.03151  [pdf, other

    stat.ML cs.CR cs.CV cs.IT cs.LG

    Deep Private-Feature Extraction

    Authors: Seyed Ali Osia, Ali Taheri, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Hamid R. Rabiee

    Abstract: We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information… ▽ More

    Submitted 28 February, 2018; v1 submitted 9 February, 2018; originally announced February 2018.

  20. arXiv:1710.01727  [pdf, ps, other

    cs.CV cs.AI cs.CR

    Privacy-Preserving Deep Inference for Rich User Data on The Cloud

    Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi

    Abstract: Deep neural networks are increasingly being used in a variety of machine learning applications applied to rich user data on the cloud. However, this approach introduces a number of privacy and efficiency challenges, as the cloud operator can perform secondary inferences on the available data. Recently, advances in edge processing have paved the way for more efficient, and private, data processing… ▽ More

    Submitted 11 October, 2017; v1 submitted 4 October, 2017; originally announced October 2017.

    Comments: arXiv admin note: substantial text overlap with arXiv:1703.02952

  21. A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics

    Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Sina Sajadmanesh, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi

    Abstract: Internet of Things (IoT) devices and applications are being deployed in our homes and workplaces. These devices often rely on continuous data collection to feed machine learning models. However, this approach introduces several privacy and efficiency challenges, as the service operator can perform unwanted inferences on the available data. Recently, advances in edge processing have paved the way f… ▽ More

    Submitted 26 December, 2019; v1 submitted 8 March, 2017; originally announced March 2017.

    Comments: To appear in IEEE Internet of Things Journal

    Journal ref: IEEE Internet of Things Journal, May 2020