Skip to main content

Showing 1–6 of 6 results for author: Zhao, J C

.
  1. arXiv:2405.03636  [pdf, other

    cs.CR cs.LG

    Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey

    Authors: Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth

    Abstract: Deep learning has shown incredible potential across a vast array of tasks and accompanying this growth has been an insatiable appetite for data. However, a large amount of data needed for enabling deep learning is stored on personal devices and recent concerns on privacy have further highlighted challenges for accessing such data. As a result, federated learning (FL) has emerged as an important pr… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: Submitted to ACM Computing Surveys

    ACM Class: I.2; H.4; I.5

  2. arXiv:2403.18144  [pdf, other

    cs.CR cs.CV

    Leak and Learn: An Attacker's Cookbook to Train Using Leaked Data from Federated Learning

    Authors: Joshua C. Zhao, Ahaan Dabholkar, Atul Sharma, Saurabh Bagchi

    Abstract: Federated learning is a decentralized learning paradigm introduced to preserve privacy of client data. Despite this, prior work has shown that an attacker at the server can still reconstruct the private training data using only the client updates. These attacks are known as data reconstruction attacks and fall into two major categories: gradient inversion (GI) and linear layer leakage attacks (LLL… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: Accepted to CVPR 2024

  3. arXiv:2303.14868  [pdf, other

    cs.LG cs.CR cs.CV

    The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning

    Authors: Joshua C. Zhao, Ahmed Roushdy Elkordy, Atul Sharma, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi

    Abstract: Secure aggregation promises a heightened level of privacy in federated learning, maintaining that a server only has access to a decrypted aggregate update. Within this setting, linear layer leakage methods are the only data reconstruction attacks able to scale and achieve a high leakage rate regardless of the number of clients or batch size. This is done through increasing the size of an injected… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

    Comments: Accepted to CVPR 2023

  4. arXiv:2303.12233  [pdf, other

    cs.LG cs.CR

    LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation

    Authors: Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi

    Abstract: Federated learning was introduced to enable machine learning over large decentralized datasets while promising privacy by eliminating the need for data sharing. Despite this, prior work has shown that shared gradients often contain private information and attackers can gain knowledge either through malicious modification of the architecture and parameters or by using optimization to approximate us… ▽ More

    Submitted 25 September, 2023; v1 submitted 21 March, 2023; originally announced March 2023.

    Comments: To appear in the IEEE Symposium on Security & Privacy (S&P) 2024

  5. arXiv:1911.07148  [pdf, ps, other

    math.NT math.CO

    Finding Modular Functions for Ramanujan-Type Identities

    Authors: William Y. C. Chen, Julia Q. D. Du, Jack C. D. Zhao

    Abstract: This paper is concerned with a class of partition functions $a(n)$ introduced by Radu and defined in terms of eta-quotients. By utilizing the transformation laws of Newman, Schoeneberg and Robins, and Radu's algorithms, we present an algorithm to find Ramanujan-type identities for $a(mn+t)$. While this algorithm is not guaranteed to succeed, it applies to many cases. For example, we deduce a witne… ▽ More

    Submitted 16 November, 2019; originally announced November 2019.

    Comments: 45 pages, to appear in Annals of Combinatorics

    MSC Class: 05A15; 11P83; 11P84; 05A17

  6. arXiv:1802.01374  [pdf, ps, other

    math.CO math.NT

    Congruences for the Coefficients of the Powers of the Euler Product

    Authors: Julia Q. D. Du, Edward Y. S. Liu, Jack C. D. Zhao

    Abstract: Let $p_k(n)$ be given by the $k$-th power of the Euler Product $\prod _{n=1}^{\infty}(1-q^n)^k=\sum_{n=0}^{\infty}p_k(n)q^{n}$. By investigating the properties of the modular equations of the second and the third order under the Atkin $U$-operator, we determine the generating functions of $p_{8k}(2^{2α} n +\frac{k(2^{2α}-1)}{3})$ $(1\leq k\leq 3)$ and $p_{3k} (3^{2β}n+\frac{k(3^{2β}-1)}{8})$… ▽ More

    Submitted 12 March, 2018; v1 submitted 5 February, 2018; originally announced February 2018.

    Comments: 26 pages, replaced references, corrected typos