Skip to main content

Showing 1–7 of 7 results for author: Çiçek, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.08618  [pdf, other

    cs.LG cs.CR

    SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier Detection

    Authors: Ege Erdogan, Unat Teksen, Mehmet Salih Celiktenyildiz, Alptekin Kupcu, A. Ercument Cicek

    Abstract: Split learning enables efficient and privacy-aware training of a deep neural network by splitting a neural network so that the clients (data holders) compute the first layers and only share the intermediate output with the central compute-heavy server. This paradigm introduces a new attack medium in which the server has full control over what the client models learn, which has already been exploit… ▽ More

    Submitted 11 December, 2023; v1 submitted 16 February, 2023; originally announced February 2023.

  2. SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning

    Authors: Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek

    Abstract: Distributed deep learning frameworks such as split learning provide great benefits with regards to the computational cost of training deep neural networks and the privacy-aware utilization of the collective data of a group of data-holders. Split learning, in particular, achieves this goal by dividing a neural network between a client and a server so that the client computes the initial set of laye… ▽ More

    Submitted 16 September, 2022; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES '22), November 7, 2022, Los Angeles, CA, USA

  3. UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning

    Authors: Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek

    Abstract: Training deep neural networks often forces users to work in a distributed or outsourced setting, accompanied with privacy concerns. Split learning aims to address this concern by distributing the model among a client and a server. The scheme supposedly provides privacy, since the server cannot see the clients' models and inputs. We show that this is not true via two novel attacks. (1) We show that… ▽ More

    Submitted 16 September, 2022; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES '22), November 7, 2022, Los Angeles, CA, USA

  4. arXiv:2001.08852  [pdf, other

    cs.CR

    Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons

    Authors: Kerem Ayoz, Erman Ayday, A. Ercument Cicek

    Abstract: Sharing genome data in a privacy-preserving way stands as a major bottleneck in front of the scientific progress promised by the big data era in genomics. A community-driven protocol named genomic data-sharing beacon protocol has been widely adopted for sharing genomic data. The system aims to provide a secure, easy to implement, and standardized interface for data sharing by only allowing yes/no… ▽ More

    Submitted 21 August, 2020; v1 submitted 23 January, 2020; originally announced January 2020.

  5. Apollo: A Sequencing-Technology-Independent, Scalable, and Accurate Assembly Polishing Algorithm

    Authors: Can Firtina, Jeremie S. Kim, Mohammed Alser, Damla Senol Cali, A. Ercument Cicek, Can Alkan, Onur Mutlu

    Abstract: Long reads produced by third-generation sequencing technologies are used to construct an assembly (i.e., the subject's genome), which is further used in downstream genome analysis. Unfortunately, long reads have high sequencing error rates and a large proportion of bps in these long reads are incorrectly identified. These errors propagate to the assembly and affect the accuracy of genome analysis.… ▽ More

    Submitted 7 March, 2020; v1 submitted 12 February, 2019; originally announced February 2019.

    Comments: 9 pages, 1 figure. Accepted in Bioinformatics

    Journal ref: Bioinformatics . 2020 Jun 1;36(12):3669-3679

  6. Bidirectional Type Checking for Relational Properties

    Authors: Ezgi Çiçek, Weihao Qu, Gilles Barthe, Marco Gaboardi, Deepak Garg

    Abstract: Relational type systems have been designed for several applications including information flow, differential privacy, and cost analysis. In order to achieve the best results, these systems often use relational refinements and relational effects to maximally exploit the similarity in the structure of the two programs being compared. Relational type systems are appealing for relational properties be… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

    Comments: 14 pages

  7. arXiv:1605.05847  [pdf, ps, other

    cs.CR cs.CY

    Privacy-Related Consequences of Turkish Citizen Database Leak

    Authors: Erin Avllazagaj, Erman Ayday, A. Ercument Cicek

    Abstract: Personal data is collected and stored more than ever by the governments and companies in the digital age. Even though the data is only released after anonymization, deanonymization is possible by joining different datasets. This puts the privacy of individuals in jeopardy. Furthermore, data leaks can unveil personal identifiers of individuals when security is breached. Processing the leaked datase… ▽ More

    Submitted 19 May, 2016; originally announced May 2016.

    Comments: 12 pages, 5 figures