Skip to main content

Showing 1–14 of 14 results for author: Ghodsi, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.06779  [pdf, other

    cs.CR

    ZKROWNN: Zero Knowledge Right of Ownership for Neural Networks

    Authors: Nojan Sheybani, Zahra Ghodsi, Ritvik Kapila, Farinaz Koushanfar

    Abstract: Training contemporary AI models requires investment in procuring learning data and computing resources, making the models intellectual property of the owners. Popular model watermarking solutions rely on key input triggers for detection; the keys have to be kept private to prevent discovery, forging, and removal of the hidden signatures. We present ZKROWNN, the first automated end-to-end framework… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: Published and presented at DAC 2023

  2. arXiv:2306.06825  [pdf, other

    cs.CR cs.LG

    AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning

    Authors: Ghada Almashaqbeh, Zahra Ghodsi

    Abstract: Federated learning enables users to collaboratively train a machine learning model over their private datasets. Secure aggregation protocols are employed to mitigate information leakage about the local datasets. This setup, however, still leaks the participation of a user in a training iteration, which can also be sensitive. Protecting user anonymity is even more challenging in dynamic environment… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

  3. Characterizing and Optimizing End-to-End Systems for Private Inference

    Authors: Karthik Garimella, Zahra Ghodsi, Nandan Kumar Jha, Siddharth Garg, Brandon Reagen

    Abstract: In two-party machine learning prediction services, the client's goal is to query a remote server's trained machine learning model to perform neural network inference in some application domain. However, sensitive information can be obtained during this process by either the client or the server, leading to potential collection, unauthorized secondary use, and inappropriate access to personal infor… ▽ More

    Submitted 16 February, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

    Comments: Accepted to the 28th edition of the Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2023 Conference

  4. arXiv:2206.12100  [pdf, other

    cs.LG cs.CR

    zPROBE: Zero Peek Robustness Checks for Federated Learning

    Authors: Zahra Ghodsi, Mojan Javaheripi, Nojan Sheybani, Xinqiao Zhang, Ke Huang, Farinaz Koushanfar

    Abstract: Privacy-preserving federated learning allows multiple users to jointly train a model with coordination of a central server. The server only learns the final aggregation result, thus the users' (private) training data is not leaked from the individual model updates. However, kee** the individual updates private allows malicious users to perform Byzantine attacks and degrade the accuracy without b… ▽ More

    Submitted 5 September, 2023; v1 submitted 24 June, 2022; originally announced June 2022.

    Comments: ICCV 2023

  5. arXiv:2111.02583  [pdf, other

    cs.CR

    CryptoNite: Revealing the Pitfalls of End-to-End Private Inference at Scale

    Authors: Karthik Garimella, Nandan Kumar Jha, Zahra Ghodsi, Siddharth Garg, Brandon Reagen

    Abstract: The privacy concerns of providing deep learning inference as a service have underscored the need for private inference (PI) protocols that protect users' data and the service provider's model using cryptographic methods. Recently proposed PI protocols have achieved significant reductions in PI latency by moving the computationally heavy homomorphic encryption (HE) parts to an offline/pre-compute p… ▽ More

    Submitted 18 July, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: 4 Figures and 3 Tables

  6. Sphynx: ReLU-Efficient Network Design for Private Inference

    Authors: Minsu Cho, Zahra Ghodsi, Brandon Reagen, Siddharth Garg, Chinmay Hegde

    Abstract: The emergence of deep learning has been accompanied by privacy concerns surrounding users' data and service providers' models. We focus on private inference (PI), where the goal is to perform inference on a user's data sample using a service provider's model. Existing PI methods for deep networks enable cryptographically secure inference with little drop in functionality; however, they incur sever… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

    Journal ref: IEEE Security & Privacy, vol. 20, no. 05, pp. 22-34, 2022

  7. arXiv:2106.08475  [pdf, other

    cs.LG cs.CR

    Circa: Stochastic ReLUs for Private Deep Learning

    Authors: Zahra Ghodsi, Nandan Kumar Jha, Brandon Reagen, Siddharth Garg

    Abstract: The simultaneous rise of machine learning as a service and concerns over user privacy have increasingly motivated the need for private inference (PI). While recent work demonstrates PI is possible using cryptographic primitives, the computational overheads render it impractical. The community is largely unprepared to address these overheads, as the source of slowdown in PI stems from the ReLU oper… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

  8. arXiv:2103.07403  [pdf, other

    cs.RO cs.AI eess.SY

    Generating and Characterizing Scenarios for Safety Testing of Autonomous Vehicles

    Authors: Zahra Ghodsi, Siva Kumar Sastry Hari, Iuri Frosio, Timothy Tsai, Alejandro Troccoli, Stephen W. Keckler, Siddharth Garg, Anima Anandkumar

    Abstract: Extracting interesting scenarios from real-world data as well as generating failure cases is important for the development and testing of autonomous systems. We propose efficient mechanisms to both characterize and generate testing scenarios using a state-of-the-art driving simulator. For any scenario, our method generates a set of possible driving paths and identifies all the possible safe drivin… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

  9. arXiv:2103.01396  [pdf, other

    cs.LG cs.CR

    DeepReDuce: ReLU Reduction for Fast Private Inference

    Authors: Nandan Kumar Jha, Zahra Ghodsi, Siddharth Garg, Brandon Reagen

    Abstract: The recent rise of privacy concerns has led researchers to devise methods for private neural inference -- where inferences are made directly on encrypted data, never seeing inputs. The primary challenge facing private inference is that computing on encrypted data levies an impractically-high latency penalty, stemming mostly from non-linear operators like ReLU. Enabling practical and private infere… ▽ More

    Submitted 22 June, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: ICML 2021

    ACM Class: I.2.m

  10. arXiv:2006.08733  [pdf, other

    cs.LG cs.CR stat.ML

    CryptoNAS: Private Inference on a ReLU Budget

    Authors: Zahra Ghodsi, Akshaj Veldanda, Brandon Reagen, Siddharth Garg

    Abstract: Machine learning as a service has given raise to privacy concerns surrounding clients' data and providers' models and has catalyzed research in private inference (PI): methods to process inferences without disclosing inputs. Recently, researchers have adapted cryptographic techniques to show PI is possible, however all solutions increase inference latency beyond practical limits. This paper makes… ▽ More

    Submitted 13 May, 2021; v1 submitted 15 June, 2020; originally announced June 2020.

  11. arXiv:1812.01372  [pdf, other

    cs.CR

    Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation

    Authors: Siddharth Garg, Zahra Ghodsi, Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam

    Abstract: In several settings of practical interest, two parties seek to collaboratively perform inference on their private data using a public machine learning model. For instance, several hospitals might wish to share patient medical records for enhanced diagnostics and disease prediction, but may not be able to share data in the clear because of privacy concerns. In this work, we propose an actively secu… ▽ More

    Submitted 4 December, 2018; originally announced December 2018.

  12. arXiv:1802.03806  [pdf, other

    cs.NE cs.AR cs.LG

    ThUnderVolt: Enabling Aggressive Voltage Underscaling and Timing Error Resilience for Energy Efficient Deep Neural Network Accelerators

    Authors: Jeff Zhang, Kartheek Rangineni, Zahra Ghodsi, Siddharth Garg

    Abstract: Hardware accelerators are being increasingly deployed to boost the performance and energy efficiency of deep neural network (DNN) inference. In this paper we propose Thundervolt, a new framework that enables aggressive voltage underscaling of high-performance DNN accelerators without compromising classification accuracy even in the presence of high timing error rates. Using post-synthesis timing s… ▽ More

    Submitted 13 March, 2018; v1 submitted 11 February, 2018; originally announced February 2018.

  13. arXiv:1711.01454  [pdf, other

    cs.DC

    Optimal Checkpointing for Secure Intermittently-Powered IoT Devices

    Authors: Zahra Ghodsi, Siddharth Garg, Ramesh Karri

    Abstract: Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution. Prior work has advocated for checkpointing the intermediate state to off-chip non-volatile memory (NVM). Encrypting checkpoints addresses the security concern, but significantly increases the checkpo… ▽ More

    Submitted 4 November, 2017; originally announced November 2017.

    Comments: ICCAD 2017

  14. arXiv:1706.10268  [pdf, other

    cs.LG cs.CR

    SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud

    Authors: Zahra Ghodsi, Tianyu Gu, Siddharth Garg

    Abstract: Inference using deep neural networks is often outsourced to the cloud since it is a computationally demanding task. However, this raises a fundamental issue of trust. How can a client be sure that the cloud has performed inference correctly? A lazy cloud provider might use a simpler but less accurate model to reduce its own computational load, or worse, maliciously modify the inference results sen… ▽ More

    Submitted 30 June, 2017; originally announced June 2017.

    Journal ref: Advances in Neural Information Processing Systems 2017