Skip to main content

Showing 1–8 of 8 results for author: Chow, S S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.08194  [pdf, other

    cs.IT

    Distributionally Robust Degree Optimization for BATS Codes

    Authors: Hoover H. F. Yin, Jie Wang, Sherman S. M. Chow

    Abstract: Batched sparse (BATS) code is a network coding solution for multi-hop wireless networks with packet loss. Achieving a close-to-optimal rate relies on an optimal degree distribution. Technical challenges arise from the sensitivity of this distribution to the often empirically obtained rank distribution at the destination node. Specifically, if the empirical distribution overestimates the channel, B… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 8 pages, accepted by 2024 IEEE International Symposium on Information Theory

  2. DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass

    Authors: Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun

    Abstract: Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-tune large pre-trained language models (LMs).… ▽ More

    Submitted 19 September, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: To appear at ACM CCS '23. This is the full version. The first two authors contribute equally

  3. arXiv:2305.07593  [pdf, ps, other

    cs.CR cs.IT

    Unconditionally Secure Access Control Encryption

    Authors: Cheuk Ting Li, Sherman S. M. Chow

    Abstract: Access control encryption (ACE) enforces, through a sanitizer as the mediator, that only legitimate sender-receiver pairs can communicate, without the sanitizer knowing the communication metadata, including its sender and recipient identity, the policy over them, and the underlying plaintext. Any illegitimate transmission is indistinguishable from pure noise. Existing works focused on computationa… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: 10 pages. This is the long version of a paper to be presented at 2023 IEEE International Symposium on Information Theory

  4. arXiv:2304.03841  [pdf, other

    cs.CR

    Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning

    Authors: Rouzbeh Behnia, Mohammadreza Ebrahimi, Arman Riasi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang

    Abstract: Secure aggregation protocols ensure the privacy of users' data in the federated learning settings by preventing the disclosure of users' local gradients. Despite their merits, existing aggregation protocols often incur high communication and computation overheads on the participants and might not be optimized to handle the large update vectors for machine learning models efficiently. This paper pr… ▽ More

    Submitted 30 August, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

  5. arXiv:2210.10244  [pdf, other

    cs.CR

    Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

    Authors: Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng

    Abstract: Radio Frequency Identification (RFID) is a key technology used in many applications. In the past decades, plenty of secure and privacy-preserving RFID tag/mutual authentication protocols as well as formal frameworks for evaluating them have been proposed. However, we notice that a property, namely proof of possession (PoP), has not been rigorously studied till now, despite it has significant value… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

  6. arXiv:2106.01221  [pdf, other

    cs.CL cs.CR

    Differential Privacy for Text Analytics via Natural Text Sanitization

    Authors: Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow

    Abstract: Texts convey sophisticated knowledge. However, texts also convey sensitive information. Despite the success of general-purpose language models and domain-specific mechanisms with differential privacy (DP), existing text sanitization mechanisms still provide low utility, as cursed by the high-dimensional text representation. The companion issue of utilizing sanitized texts for downstream analytics… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: ACL-ICJNLP'21 Findings; The first two authors contributed equally

  7. arXiv:2002.10944  [pdf, other

    cs.CR cs.LG

    Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions

    Authors: Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yue**g Yan, Chao Shen, Qian Wang

    Abstract: Convolutional neural network is a machine-learning model widely applied in various prediction tasks, such as computer vision and medical image analysis. Their great predictive power requires extensive computation, which encourages model owners to host the prediction service in a cloud platform. Recent researches focus on the privacy of the query and results, but they do not provide model privacy a… ▽ More

    Submitted 29 June, 2020; v1 submitted 22 February, 2020; originally announced February 2020.

  8. arXiv:1405.4951  [pdf, ps, other

    cs.CR cs.SI stat.ML

    Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection

    Authors: Pili Hu, Sherman S. M. Chow, Wing Cheong Lau

    Abstract: The problem of secure friend discovery on a social network has long been proposed and studied. The requirement is that a pair of nodes can make befriending decisions with minimum information exposed to the other party. In this paper, we propose to use community detection to tackle the problem of secure friend discovery. We formulate the first privacy-preserving and decentralized community detectio… ▽ More

    Submitted 20 May, 2014; originally announced May 2014.

    Comments: ICML 2014 Workshop on Learning, Security and Privacy