Skip to main content

Showing 1–4 of 4 results for author: Dickinson, P

Searching in archive cs. Search in all archives.
.
  1. A Differentially Private Framework for Deep Learning with Convexified Loss Functions

    Authors: Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

    Abstract: Differential privacy (DP) has been applied in deep learning for preserving privacy of the underlying training sets. Existing DP practice falls into three categories - objective perturbation, gradient perturbation and output perturbation. They suffer from three main problems. First, conditions on objective functions limit objective perturbation in general deep learning tasks. Second, gradient pertu… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

    Comments: This paper has been accepted by the IEEE Transactions on Information Forensics & Security. Early access of IEEE Explore will be available soon

  2. arXiv:2103.07101  [pdf, other

    cs.LG cs.CR

    On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models

    Authors: Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

    Abstract: With an increase in low-cost machine learning APIs, advanced machine learning models may be trained on private datasets and monetized by providing them as a service. However, privacy researchers have demonstrated that these models may leak information about records in the training dataset via membership inference attacks. In this paper, we take a closer look at another inference attack reported in… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: 20 pages, accepted at IEEE EuroS&P 2021

  3. arXiv:2006.13065  [pdf, other

    cs.CV

    DCNNs: A Transfer Learning comparison of Full Weapon Family threat detection for Dual-Energy X-Ray Baggage Imagery

    Authors: A. Williamson, P. Dickinson, T. Lambrou, J. C. Murray

    Abstract: Recent advancements in Convolutional Neural Networks have yielded super-human levels of performance in image recognition tasks [13, 25]; however, with increasing volumes of parcels crossing UK borders each year, classification of threats becomes integral to the smooth operation of UK borders. In this work we propose the first pipeline to effectively process Dual-Energy X-Ray scanner output, and pe… ▽ More

    Submitted 24 June, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: Submitted to BMVC 2019 Workshop on "Object Detection and Recognition for Security Screening"

  4. Approximate Randomization of Quantum States With Fewer Bits of Key

    Authors: Paul A. Dickinson, Ashwin Nayak

    Abstract: Randomization of quantum states is the quantum analogue of the classical one-time pad. We present an improved, efficient construction of an approximately randomizing map that uses O(d/epsilon^2) Pauli operators to map any d-dimensional state to a state that is within trace distance epsilon of the completely mixed state. Our bound is a log d factor smaller than that of Hayden, Leung, Shor, and Wi… ▽ More

    Submitted 2 November, 2006; originally announced November 2006.

    Comments: 18 pages, Quantum Computing Back Action, IIT Kanpur, March 2006, volume 864 of AIP Conference Proceedings, pages 18--36. Springer, New York