Skip to main content

Showing 1–11 of 11 results for author: Yaghini, M

.
  1. arXiv:2402.03540  [pdf, other

    cs.LG cs.GT stat.ML

    Regulation Games for Trustworthy Machine Learning

    Authors: Mohammad Yaghini, Patty Liu, Franziska Boenisch, Nicolas Papernot

    Abstract: Existing work on trustworthy machine learning (ML) often concentrates on individual aspects of trust, such as fairness or privacy. Additionally, many techniques overlook the distinction between those who train ML models and those responsible for assessing their trustworthiness. To address these issues, we propose a framework that views trustworthy ML as a multi-objective multi-agent optimization p… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  2. arXiv:2302.09183  [pdf, other

    cs.LG cs.AI cs.CY

    Learning with Impartiality to Walk on the Pareto Frontier of Fairness, Privacy, and Utility

    Authors: Mohammad Yaghini, Patty Liu, Franziska Boenisch, Nicolas Papernot

    Abstract: Deploying machine learning (ML) models often requires both fairness and privacy guarantees. Both of these objectives present unique trade-offs with the utility (e.g., accuracy) of the model. However, the mutual interactions between fairness, privacy, and utility are less well-understood. As a result, often only one objective is optimized, while the others are tuned as hyper-parameters. Because the… ▽ More

    Submitted 17 February, 2023; originally announced February 2023.

  3. arXiv:2208.03567  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Proof-of-Learning is Currently More Broken Than You Think

    Authors: Congyu Fang, Hengrui Jia, Anvith Thudi, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Varun Chandrasekaran, Nicolas Papernot

    Abstract: Proof-of-Learning (PoL) proposes that a model owner logs training checkpoints to establish a proof of having expended the computation necessary for training. The authors of PoL forego cryptographic approaches and trade rigorous security guarantees for scalability to deep learning. They empirically argued the benefit of this approach by showing how spoofing--computing a proof for a stolen model--is… ▽ More

    Submitted 17 April, 2023; v1 submitted 6 August, 2022; originally announced August 2022.

    Comments: Published in IEEE EuroS&P 2023

  4. arXiv:2207.12545  [pdf, other

    cs.LG stat.ML

    $p$-DkNN: Out-of-Distribution Detection Through Statistical Testing of Deep Representations

    Authors: Adam Dziedzic, Stephan Rabanser, Mohammad Yaghini, Armin Ale, Murat A. Erdogdu, Nicolas Papernot

    Abstract: The lack of well-calibrated confidence estimates makes neural networks inadequate in safety-critical domains such as autonomous driving or healthcare. In these settings, having the ability to abstain from making a prediction on out-of-distribution (OOD) data can be as important as correctly classifying in-distribution data. We introduce $p$-DkNN, a novel inference procedure that takes a trained de… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

  5. arXiv:2202.02751  [pdf, other

    cs.LG cs.CR cs.SD eess.AS

    Tubes Among Us: Analog Attack on Automatic Speaker Identification

    Authors: Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz

    Abstract: Recent years have seen a surge in the popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be vulnerable to adversarial examples. A large number of modern systems protect themselves against such attacks by targeting artificiality, i.e., they deploy mechanisms to detect the lack of human involvement in generating the adversarial examples.… ▽ More

    Submitted 27 May, 2023; v1 submitted 6 February, 2022; originally announced February 2022.

    Comments: Published at USENIX Security 2023 https://www.usenix.org/conference/usenixsecurity23/presentation/ahmed

  6. arXiv:2109.10870  [pdf, other

    cs.CR cs.LG cs.SE

    SoK: Machine Learning Governance

    Authors: Varun Chandrasekaran, Hengrui Jia, Anvith Thudi, Adelin Travers, Mohammad Yaghini, Nicolas Papernot

    Abstract: The application of machine learning (ML) in computer systems introduces not only many benefits but also risks to society. In this paper, we develop the concept of ML governance to balance such benefits and risks, with the aim of achieving responsible applications of ML. Our approach first systematizes research towards ascertaining ownership of data and models, thus fostering a notion of identity s… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  7. arXiv:2104.10706  [pdf, other

    stat.ML cs.CR cs.LG

    Dataset Inference: Ownership Resolution in Machine Learning

    Authors: Pratyush Maini, Mohammad Yaghini, Nicolas Papernot

    Abstract: With increasingly more data and computation involved in their training, machine learning models constitute valuable intellectual property. This has spurred interest in model stealing, which is made more practical by advances in learning with partial, little, or no supervision. Existing defenses focus on inserting unique watermarks in a model's decision surface, but this is insufficient: the waterm… ▽ More

    Submitted 21 April, 2021; originally announced April 2021.

    Comments: Published as a conference paper at ICLR 2021 (Spotlight Presentation)

  8. arXiv:2103.05633  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Proof-of-Learning: Definitions and Practice

    Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot

    Abstract: Training machine learning (ML) models typically involves expensive iterative optimization. Once the model's final parameters are released, there is currently no mechanism for the entity which trained the model to prove that these parameters were indeed the result of this optimization procedure. Such a mechanism would support security of ML applications in several ways. For instance, it would simpl… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    Comments: To appear in the 42nd IEEE Symposium on Security and Privacy

  9. arXiv:1911.03020  [pdf, other

    cs.AI cs.CY

    A Human-in-the-loop Framework to Construct Context-aware Mathematical Notions of Outcome Fairness

    Authors: Mohammad Yaghini, Andreas Krause, Hoda Heidari

    Abstract: Existing mathematical notions of fairness fail to account for the context of decision-making. We argue that moral consideration of contextual factors is an inherently human task. So we present a framework to learn context-aware mathematical formulations of fairness by eliciting people's situated fairness assessments. Our family of fairness notions corresponds to a new interpretation of economic mo… ▽ More

    Submitted 18 May, 2021; v1 submitted 7 November, 2019; originally announced November 2019.

    Comments: In the forth AAAI/ACM Conference on Artificial Intelligence, Ethics, and Society (AIES-2021)

  10. arXiv:1906.00389  [pdf, other

    cs.LG cs.CR cs.CY stat.ML

    Disparate Vulnerability to Membership Inference Attacks

    Authors: Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso

    Abstract: A membership inference attack (MIA) against a machine-learning model enables an attacker to determine whether a given data record was part of the model's training data or not. In this paper, we provide an in-depth study of the phenomenon of disparate vulnerability against MIAs: unequal success rate of MIAs against different population subgroups. We first establish necessary and sufficient conditio… ▽ More

    Submitted 16 September, 2021; v1 submitted 2 June, 2019; originally announced June 2019.

    Comments: To appear in Privacy-Enhancing Technologies Symposium (PETS) 2022. This version has an updated authors list

  11. arXiv:1601.06762  [pdf, other

    cs.IT cs.GT cs.NI

    Energy-Aware Optimization and Mechanism Design for Cellular Device-to-Device Local Area Networks

    Authors: Mehdi Naderi Soorki, Mohammad Yaghini, Mohammad Hossein Manshaei, Walid Saad, Hossein Saidi

    Abstract: In a device-to-device (D2D) local area network (LAN), mobile users (MUs) must cooperate to download common real-time content from a wireless cellular network. However, sustaining such D2D LANs over cellular networks requires the introduction of mechanisms that will incentivize the MUs to cooperate. In this paper, the problem of energy-aware D2D LAN formation over cellular networks is studied. The… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: To appear in the 50th Annual Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2016