Skip to main content

Showing 1–5 of 5 results for author: Aremu, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09250  [pdf, other

    cs.CV cs.AI cs.LG

    MirrorCheck: Efficient Adversarial Defense for Vision-Language Models

    Authors: Samar Fares, Klea Ziu, Toluwani Aremu, Nikita Durasov, Martin Takáč, Pascal Fua, Karthik Nandakumar, Ivan Laptev

    Abstract: Vision-Language Models (VLMs) are becoming increasingly vulnerable to adversarial attacks as various novel attack strategies are being proposed against these models. While existing defenses excel in unimodal contexts, they currently fall short in safeguarding VLMs against adversarial threats. To mitigate this vulnerability, we propose a novel, yet elegantly simple approach for detecting adversaria… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2406.00569  [pdf, other

    cs.LG cs.AI

    Redefining Contributions: Shapley-Driven Federated Learning

    Authors: Nurbek Tastan, Samar Fares, Toluwani Aremu, Samuel Horvath, Karthik Nandakumar

    Abstract: Federated learning (FL) has emerged as a pivotal approach in machine learning, enabling multiple participants to collaboratively train a global model without sharing raw data. While FL finds applications in various domains such as healthcare and finance, it is challenging to ensure global model convergence when participants do not contribute equally and/or honestly. To overcome this challenge, pri… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

    Comments: Accepted by IJCAI 2024

  3. arXiv:2312.15229  [pdf, ps, other

    cs.LG cs.CR cs.CV

    Regularized PolyKervNets: Optimizing Expressiveness and Efficiency for Private Inference in Deep Neural Networks

    Authors: Toluwani Aremu

    Abstract: Private computation of nonlinear functions, such as Rectified Linear Units (ReLUs) and max-pooling operations, in deep neural networks (DNNs) poses significant challenges in terms of storage, bandwidth, and time consumption. To address these challenges, there has been a growing interest in utilizing privacy-preserving techniques that leverage polynomial activation functions and kernelized convolut… ▽ More

    Submitted 23 December, 2023; originally announced December 2023.

    Comments: Technical report on experimental findings published in the IACR Cryptology ePrint Archive (https://ia.cr/2023/1917). The report spans 7 pages and includes 8 tables

  4. arXiv:2212.12307  [pdf

    cs.CR cs.CY

    Defending against cybersecurity threats to the payments and banking system

    Authors: Williams Haruna, Toyin Ajiboro Aremu, Yetunde Ajao Modupe

    Abstract: Cyber security threats to the payment and banking system have become a worldwide menace. The phenomenon has forced financial institutions to take risks as part of their business model. Hence, deliberate investment in sophisticated technologies and security measures has become imperative to safeguard against heavy financial losses and information breaches that may occur due to cyber-attacks. The pr… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  5. arXiv:2207.12850  [pdf, other

    cs.CV cs.AI

    SSIVD-Net: A Novel Salient Super Image Classification & Detection Technique for Weaponized Violence

    Authors: Toluwani Aremu, Li Zhiyuan, Reem Alameeri, Mustaqeem Khan, Abdulmotaleb El Saddik

    Abstract: Detection of violence and weaponized violence in closed-circuit television (CCTV) footage requires a comprehensive approach. In this work, we introduce the \emph{Smart-City CCTV Violence Detection (SCVD)} dataset, specifically designed to facilitate the learning of weapon distribution in surveillance videos. To tackle the complexities of analyzing 3D surveillance video for violence recognition tas… ▽ More

    Submitted 7 November, 2023; v1 submitted 26 July, 2022; originally announced July 2022.

    Comments: Contains 5 tables and 3 figures. Accepted at the 2024 SAI Computing Conference