Skip to main content

Showing 1–3 of 3 results for author: DiValentin, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.04989  [pdf, other

    cs.SE cs.CR

    Profile of Vulnerability Remediations in Dependencies Using Graph Analysis

    Authors: Fernando Vera, Palina Pauliuchenka, Ethan Oh, Bai Chien Kao, Louis DiValentin, David A. Bader

    Abstract: This research introduces graph analysis methods and a modified Graph Attention Convolutional Neural Network (GAT) to the critical challenge of open source package vulnerability remediation by analyzing control flow graphs to profile breaking changes in applications occurring from dependency upgrades intended to remediate vulnerabilities. Our approach uniquely applies node centrality metrics -- deg… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

  2. arXiv:2209.03839  [pdf, other

    cs.LG

    FADE: Enabling Federated Adversarial Training on Heterogeneous Resource-Constrained Edge Devices

    Authors: Minxue Tang, Jianyi Zhang, Mingyuan Ma, Louis DiValentin, Aolin Ding, Amin Hassanzadeh, Hai Li, Yiran Chen

    Abstract: Federated adversarial training can effectively complement adversarial robustness into the privacy-preserving federated learning systems. However, the high demand for memory capacity and computing power makes large-scale federated adversarial training infeasible on resource-constrained edge devices. Few previous studies in federated adversarial training have tried to tackle both memory and computat… ▽ More

    Submitted 25 April, 2023; v1 submitted 8 September, 2022; originally announced September 2022.

    Comments: Preprint version

  3. arXiv:2110.13864  [pdf, other

    cs.LG cs.AI cs.CV cs.DC

    FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective

    Authors: **gwei Sun, Ang Li, Louis DiValentin, Amin Hassanzadeh, Yiran Chen, Hai Li

    Abstract: Federated learning (FL) is a popular distributed learning framework that trains a global model through iterative communications between a central server and edge devices. Recent works have demonstrated that FL is vulnerable to model poisoning attacks. Several server-based defense approaches (e.g. robust aggregation), have been proposed to mitigate such attacks. However, we empirically show that un… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

    Comments: To be appeared in NeurIPS 2021 conference