Skip to main content

Showing 1–15 of 15 results for author: Chow, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.08194  [pdf, other

    cs.IT

    Distributionally Robust Degree Optimization for BATS Codes

    Authors: Hoover H. F. Yin, Jie Wang, Sherman S. M. Chow

    Abstract: Batched sparse (BATS) code is a network coding solution for multi-hop wireless networks with packet loss. Achieving a close-to-optimal rate relies on an optimal degree distribution. Technical challenges arise from the sensitivity of this distribution to the often empirically obtained rank distribution at the destination node. Specifically, if the empirical distribution overestimates the channel, B… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 8 pages, accepted by 2024 IEEE International Symposium on Information Theory

  2. DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass

    Authors: Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun

    Abstract: Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-tune large pre-trained language models (LMs).… ▽ More

    Submitted 19 September, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: To appear at ACM CCS '23. This is the full version. The first two authors contribute equally

  3. arXiv:2308.15736  [pdf, ps, other

    cs.CR eess.SY

    Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review

    Authors: Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen

    Abstract: Machine learning (ML) sees an increasing prevalence of being used in the internet-of-things (IoT)-based smart grid. However, the trustworthiness of ML is a severe issue that must be addressed to accommodate the trend of ML-based smart grid applications (MLsgAPPs). The adversarial distortion injected into the power signal will greatly affect the system's normal control and operation. Therefore, it… ▽ More

    Submitted 24 December, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  4. arXiv:2305.07593  [pdf, ps, other

    cs.CR cs.IT

    Unconditionally Secure Access Control Encryption

    Authors: Cheuk Ting Li, Sherman S. M. Chow

    Abstract: Access control encryption (ACE) enforces, through a sanitizer as the mediator, that only legitimate sender-receiver pairs can communicate, without the sanitizer knowing the communication metadata, including its sender and recipient identity, the policy over them, and the underlying plaintext. Any illegitimate transmission is indistinguishable from pure noise. Existing works focused on computationa… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: 10 pages. This is the long version of a paper to be presented at 2023 IEEE International Symposium on Information Theory

  5. arXiv:2304.03841  [pdf, other

    cs.CR

    Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning

    Authors: Rouzbeh Behnia, Mohammadreza Ebrahimi, Arman Riasi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang

    Abstract: Secure aggregation protocols ensure the privacy of users' data in the federated learning settings by preventing the disclosure of users' local gradients. Despite their merits, existing aggregation protocols often incur high communication and computation overheads on the participants and might not be optimized to handle the large update vectors for machine learning models efficiently. This paper pr… ▽ More

    Submitted 30 August, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

  6. arXiv:2210.10244  [pdf, other

    cs.CR

    Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

    Authors: Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng

    Abstract: Radio Frequency Identification (RFID) is a key technology used in many applications. In the past decades, plenty of secure and privacy-preserving RFID tag/mutual authentication protocols as well as formal frameworks for evaluating them have been proposed. However, we notice that a property, namely proof of possession (PoP), has not been rigorously studied till now, despite it has significant value… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

  7. arXiv:2108.08495  [pdf, ps, other

    cs.RO eess.SY

    Can a Tesla Turbine be Utilised as a Non-Magnetic Actuator for MRI-Guided Robotic Interventions?

    Authors: David Navarro-Alarcon, Luiza Labazanova, Man Kiu Chow, Kwun Wang Ng, Derek Kwok

    Abstract: This paper introduces a new type of nonmagnetic actuator for MRI interventions. Ultrasonic and piezoelectric motors are one the most commonly used actuators in MRI applications. However, most of these actuators are only MRI-safe, which means they cannot be operated while imaging as they cause significant visual artifacts. To cope with this issue, we developed a new pneumatic rotary servo-motor (ba… ▽ More

    Submitted 19 August, 2021; originally announced August 2021.

  8. arXiv:2106.01221  [pdf, other

    cs.CL cs.CR

    Differential Privacy for Text Analytics via Natural Text Sanitization

    Authors: Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow

    Abstract: Texts convey sophisticated knowledge. However, texts also convey sensitive information. Despite the success of general-purpose language models and domain-specific mechanisms with differential privacy (DP), existing text sanitization mechanisms still provide low utility, as cursed by the high-dimensional text representation. The companion issue of utilizing sanitized texts for downstream analytics… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: ACL-ICJNLP'21 Findings; The first two authors contributed equally

  9. arXiv:2104.12076  [pdf, other

    cs.CV cs.AI

    Parallel Scale-wise Attention Network for Effective Scene Text Recognition

    Authors: Usman Sajid, Michael Chow, ** Zhang, Taejoon Kim, Guanghui Wang

    Abstract: The paper proposes a new text recognition network for scene-text images. Many state-of-the-art methods employ the attention mechanism either in the text encoder or decoder for the text alignment. Although the encoder-based attention yields promising results, these schemes inherit noticeable limitations. They perform the feature extraction (FE) and visual attention (VA) sequentially, which bounds t… ▽ More

    Submitted 25 April, 2021; originally announced April 2021.

  10. arXiv:2104.05810  [pdf, other

    cs.MA cs.GT eess.SY

    A Distributed and Resilient Bargaining Game for Weather-Predictive Microgrid Energy Cooperation

    Authors: Lu An, Jie Duan, Mo-Yuen Chow, Alexandra Duel-Hallen

    Abstract: A bargaining game is investigated for cooperative energy management in microgrids. This game incorporates a fully distributed and realistic cooperative power scheduling algorithm (CoDES) as well as a distributed Nash Bargaining Solution (NBS)-based method of allocating the overall power bill resulting from CoDES. A novel weather-based stochastic renewable generation (RG) prediction method is incor… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

    Comments: 9 pages, 8 figures, published in IEEE Transactions on Industrial Informatics

    Journal ref: IEEE Transactions on Industrial Informatics 15 (8), 4721-4730, 2019

  11. arXiv:2002.10944  [pdf, other

    cs.CR cs.LG

    Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions

    Authors: Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yue**g Yan, Chao Shen, Qian Wang

    Abstract: Convolutional neural network is a machine-learning model widely applied in various prediction tasks, such as computer vision and medical image analysis. Their great predictive power requires extensive computation, which encourages model owners to host the prediction service in a cloud platform. Recent researches focus on the privacy of the query and results, but they do not provide model privacy a… ▽ More

    Submitted 29 June, 2020; v1 submitted 22 February, 2020; originally announced February 2020.

  12. arXiv:1809.03452  [pdf, other

    quant-ph cs.ET

    Qiskit Backend Specifications for OpenQASM and OpenPulse Experiments

    Authors: David C. McKay, Thomas Alexander, Luciano Bello, Michael J. Biercuk, Lev Bishop, Jiayin Chen, Jerry M. Chow, Antonio D. Córcoles, Daniel Egger, Stefan Filipp, Juan Gomez, Michael Hush, Ali Javadi-Abhari, Diego Moreda, Paul Nation, Brent Paulovicks, Erick Winston, Christopher J. Wood, James Wootton, Jay M. Gambetta

    Abstract: As interest in quantum computing grows, there is a pressing need for standardized API's so that algorithm designers, circuit designers, and physicists can be provided a common reference frame for designing, executing, and optimizing experiments. There is also a need for a language specification that goes beyond gates and allows users to specify the time dynamics of a quantum experiment and recover… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

    Comments: 68 pages. More information and schemas can be found in the Qiskit repository https://github.com/Qiskit/

  13. arXiv:1608.06440  [pdf

    cs.RO cs.CV eess.SY

    A Delay-Tolerant Potential-Field-Based Network Implementation of an Integrated Navigation System

    Authors: Rachana Ashok Gupta, Ahmad A. Masoud, Mo-Yuen Chow

    Abstract: Network controllers (NCs) are devices that are capable of converting dynamic, spatially extended, and functionally specialized modules into a taskable goal-oriented group called networked control system. This paper examines the practical aspects of designing and building an NC that uses the Internet as a communication medium. It focuses on finding compatible controller components that can be integ… ▽ More

    Submitted 23 August, 2016; originally announced August 2016.

    Journal ref: The IEEE Transactions On Industrial Electronics, Vol. 57, No.2, February 2010, PP. 769-783

  14. arXiv:1603.06317  [pdf, other

    cs.RO

    DoraPicker: An Autonomous Picking System for General Objects

    Authors: Hao Zhang, Pinxin Long, Dandan Zhou, Zhongfeng Qian, Zheng Wang, Weiwei Wan, Dinesh Manocha, Chonhyon Park, Tommy Hu, Chao Cao, Yibo Chen, Marco Chow, Jia Pan

    Abstract: Robots that autonomously manipulate objects within warehouses have the potential to shorten the package delivery time and improve the efficiency of the e-commerce industry. In this paper, we present a robotic system that is capable of both picking and placing general objects in warehouse scenarios. Given a target object, the robot autonomously detects it from a shelf or a table and estimates its f… ▽ More

    Submitted 20 March, 2016; originally announced March 2016.

    Comments: 10 pages, 10 figures

  15. arXiv:1405.4951  [pdf, ps, other

    cs.CR cs.SI stat.ML

    Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection

    Authors: Pili Hu, Sherman S. M. Chow, Wing Cheong Lau

    Abstract: The problem of secure friend discovery on a social network has long been proposed and studied. The requirement is that a pair of nodes can make befriending decisions with minimum information exposed to the other party. In this paper, we propose to use community detection to tackle the problem of secure friend discovery. We formulate the first privacy-preserving and decentralized community detectio… ▽ More

    Submitted 20 May, 2014; originally announced May 2014.

    Comments: ICML 2014 Workshop on Learning, Security and Privacy