Skip to main content

Showing 1–9 of 9 results for author: Suya, F

.
  1. arXiv:2311.11544  [pdf, other

    cs.LG cs.CR

    Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks

    Authors: Evan Rose, Fnu Suya, David Evans

    Abstract: Machine learning is susceptible to poisoning attacks, in which an attacker controls a small fraction of the training data and chooses that data with the goal of inducing some behavior unintended by the model developer in the trained model. We consider a realistic setting in which the adversary with the ability to insert a limited number of data points attempts to control the model's behavior on a… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: 18 pages, 11 figures

  2. arXiv:2310.17534  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    SoK: Pitfalls in Evaluating Black-Box Attacks

    Authors: Fnu Suya, Anshuman Suri, Tingwei Zhang, **gtao Hong, Yuan Tian, David Evans

    Abstract: Numerous works study black-box attacks on image classifiers. However, these works make different assumptions on the adversary's knowledge and current literature lacks a cohesive organization centered around the threat model. To systematize knowledge in this area, we propose a taxonomy over the threat space spanning the axes of feedback granularity, the access of interactive queries, and the qualit… ▽ More

    Submitted 14 February, 2024; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: Accepted at SaTML 2024

  3. arXiv:2307.01073  [pdf, other

    cs.LG cs.CR

    What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?

    Authors: Fnu Suya, Xiao Zhang, Yuan Tian, David Evans

    Abstract: We study indiscriminate poisoning for linear learners where an adversary injects a few crafted examples into the training data with the goal of forcing the induced model to incur higher test error. Inspired by the observation that linear learners on some datasets are able to resist the best known attacks even without any defenses, we further investigate whether datasets can be inherently robust to… ▽ More

    Submitted 9 November, 2023; v1 submitted 3 July, 2023; originally announced July 2023.

    Comments: NeurIPS 2023 camera-ready version, 39 pages

  4. arXiv:2303.11643  [pdf, other

    cs.LG cs.AI cs.CR

    Manipulating Transfer Learning for Property Inference

    Authors: Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans

    Abstract: Transfer learning is a popular method for tuning pretrained (upstream) models for different downstream tasks using limited data and computational resources. We study how an adversary with control over an upstream model used in transfer learning can conduct property inference attacks on a victim's tuned downstream model. For example, to infer the presence of images of a specific individual in the d… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted to CVPR 2023

  5. arXiv:2104.15129  [pdf, other

    cs.CR cs.AI

    Stealthy Backdoors as Compression Artifacts

    Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans

    Abstract: In a backdoor attack on a machine learning model, an adversary produces a model that performs well on normal inputs but outputs targeted misclassifications on inputs containing a small trigger pattern. Model compression is a widely-used approach for reducing the size of deep learning models without much accuracy loss, enabling resource-hungry models to be compressed for use on resource-constrained… ▽ More

    Submitted 30 April, 2021; originally announced April 2021.

    Comments: 20 pages, 9 figures, 14 tables

  6. arXiv:2006.16469  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Model-Targeted Poisoning Attacks with Provable Convergence

    Authors: Fnu Suya, Saeed Mahloujifar, Anshuman Suri, David Evans, Yuan Tian

    Abstract: In a poisoning attack, an adversary with control over a small fraction of the training data attempts to select that data in a way that induces a corrupted model that misbehaves in favor of the adversary. We consider poisoning attacks against convex machine learning models and propose an efficient poisoning attack designed to induce a specified model. Unlike previous model-targeted poisoning attack… ▽ More

    Submitted 21 April, 2021; v1 submitted 29 June, 2020; originally announced June 2020.

    Comments: 32 pages, code available at: https://github.com/suyeecav/model-targeted-poisoning

  7. arXiv:2004.13825  [pdf, other

    cs.CR cs.LG

    Scalable Attack on Graph Data by Injecting Vicious Nodes

    Authors: Jihong Wang, Minnan Luo, Fnu Suya, Jundong Li, Zijiang Yang, Qinghua Zheng

    Abstract: Recent studies have shown that graph convolution networks (GCNs) are vulnerable to carefully designed attacks, which aim to cause misclassification of a specific node on the graph with unnoticeable perturbations. However, a vast majority of existing works cannot handle large-scale graphs because of their high time complexity. Additionally, existing works mainly focus on manipulating existing nodes… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

  8. arXiv:1908.07000  [pdf, other

    cs.CR

    Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries

    Authors: Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian

    Abstract: We study adversarial examples in a black-box setting where the adversary only has API access to the target model and each query is expensive. Prior work on black-box adversarial examples follows one of two main strategies: (1) transfer attacks use white-box attacks on local models to find candidate adversarial examples that transfer to the target model, and (2) optimization-based attacks use queri… ▽ More

    Submitted 1 December, 2019; v1 submitted 19 August, 2019; originally announced August 2019.

    Comments: USENIX Security 2020 camera-ready version, Code available at: https://github.com/suyeecav/Hybrid-Attack

  9. arXiv:1712.08713  [pdf, other

    cs.CR cs.LG stat.ML

    Query-limited Black-box Attacks to Classifiers

    Authors: Fnu Suya, Yuan Tian, David Evans, Paolo Papotti

    Abstract: We study black-box attacks on machine learning classifiers where each query to the model incurs some cost or risk of detection to the adversary. We focus explicitly on minimizing the number of queries as a major objective. Specifically, we consider the problem of attacking machine learning classifiers subject to a budget of feature modification cost while minimizing the number of queries, where ea… ▽ More

    Submitted 22 December, 2017; originally announced December 2017.

    Comments: 5 Pages, 2017 NIPS workshop on machine learning and computer security (12/08/2017-12/09/2017)