Skip to main content

Showing 1–16 of 16 results for author: Kupcu, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.06230  [pdf, ps, other

    cs.LG cs.CR cs.DC

    Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning

    Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz

    Abstract: Federated learning (FL) has been introduced to enable a large number of clients, possibly mobile devices, to collaborate on generating a generalized machine learning model thanks to utilizing a larger number of local samples without sharing to offer certain privacy to collaborating clients. However, due to the participation of a large number of clients, it is often difficult to profile and verify… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  2. arXiv:2403.19130  [pdf, ps, other

    cs.GT

    Gamu Blue: A Practical Tool for Game Theory Security Equilibria

    Authors: Ameer Taweel, Burcu Yıldız, Alptekin Küpçü

    Abstract: The application of game theory in cybersecurity enables strategic analysis, adversarial modeling, and optimal decision-making to address security threats' complex and dynamic nature. Previous studies by Abraham et al. and Biçer et al. presented various definitions of equilibria to examine the security aspects of games involving multiple parties. Nonetheless, these definitions lack practical and ea… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  3. arXiv:2302.08618  [pdf, other

    cs.LG cs.CR

    SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier Detection

    Authors: Ege Erdogan, Unat Teksen, Mehmet Salih Celiktenyildiz, Alptekin Kupcu, A. Ercument Cicek

    Abstract: Split learning enables efficient and privacy-aware training of a deep neural network by splitting a neural network so that the clients (data holders) compute the first layers and only share the intermediate output with the central compute-heavy server. This paradigm introduces a new attack medium in which the server has full control over what the client models learn, which has already been exploit… ▽ More

    Submitted 7 July, 2024; v1 submitted 16 February, 2023; originally announced February 2023.

    Comments: International Conference on Cryptology And Network Security (CANS '24)

  4. arXiv:2208.09894  [pdf, ps, other

    cs.LG cs.AI cs.CR cs.DC stat.ML

    Byzantines can also Learn from History: Fall of Centered Clip** in Federated Learning

    Authors: Kerem Ozfatura, Emre Ozfatura, Alptekin Kupcu, Deniz Gunduz

    Abstract: The increasing popularity of the federated learning (FL) framework due to its success in a wide range of collaborative learning tasks also induces certain security concerns. Among many vulnerabilities, the risk of Byzantine attacks is of particular concern, which refers to the possibility of malicious clients participating in the learning process. Hence, a crucial objective in FL is to neutralize… ▽ More

    Submitted 1 January, 2024; v1 submitted 21 August, 2022; originally announced August 2022.

    Comments: IEEE Transactions on Information Forensics and Security 2023

  5. LightChain: Scalable DHT-Based Blockchain

    Authors: Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap

    Abstract: As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT). The existing blockchain solutions show downsides in communication and storage scalability, as well as decentralization. In this article, we propose LightChain , which is the first blockchain architecture that operates over a Distributed Hash Ta… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1904.00375

    Journal ref: IEEE Transactions on Parallel and Distributed Systems (2021)

  6. SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning

    Authors: Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek

    Abstract: Distributed deep learning frameworks such as split learning provide great benefits with regards to the computational cost of training deep neural networks and the privacy-aware utilization of the collective data of a group of data-holders. Split learning, in particular, achieves this goal by dividing a neural network between a client and a server so that the client computes the initial set of laye… ▽ More

    Submitted 16 September, 2022; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES '22), November 7, 2022, Los Angeles, CA, USA

  7. UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning

    Authors: Ege Erdogan, Alptekin Kupcu, A. Ercument Cicek

    Abstract: Training deep neural networks often forces users to work in a distributed or outsourced setting, accompanied with privacy concerns. Split learning aims to address this concern by distributing the model among a client and a server. The scheme supposedly provides privacy, since the server cannot see the clients' models and inputs. We show that this is not true via two novel attacks. (1) We show that… ▽ More

    Submitted 16 September, 2022; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES '22), November 7, 2022, Los Angeles, CA, USA

  8. arXiv:2102.09429  [pdf, other

    cs.CR

    AggFT: Low-Cost Fault-Tolerant Smart Meter Aggregation with Proven Termination and Privacy

    Authors: Günther Eibl, Sanaz Taheri-Boshrooyeh, Alptekin Küpçü

    Abstract: Smart meter data aggregation protocols have been developed to address rising privacy threats against customers' consumption data. However, these protocols do not work satisfactorily in the presence of failures of smart meters or network communication links. In this paper, we propose a lightweight and fault-tolerant aggregation algorithm that can serve as a solid foundation for further research. We… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

    Comments: This work is the long preprint indluding full proofs of a paper that will be submitted to the IEEE for possible publication. It is intended for reviewers that would like to check the proofs in detail. Copyright may be transferred without notice, after which this version may no longer be accessible

  9. arXiv:2011.03241  [pdf

    cs.CR

    BlockSim-Net: A Network Based Blockchain Simulator

    Authors: Nandini Agrawal, R Prashanthi, Osman Biçer, Alptekin Küpçü

    Abstract: Since its proposal by Eyal and Sirer (CACM '13), selfish mining attack on proof-of-work blockchains has been studied extensively in terms of both improving its impact and defending against it. Before any defense is deployed in a real world blockchain system, it needs to be tested for security and dependability. However, real blockchain systems are too complex to conduct any test on or benchmark th… ▽ More

    Submitted 27 November, 2020; v1 submitted 6 November, 2020; originally announced November 2020.

  10. arXiv:2007.13203  [pdf, other

    cs.DC

    A containerized proof-of-concept implementation of LightChain system

    Authors: Yahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Öznur Özkasap, Alptekin Küpçü

    Abstract: LightChain is the first Distributed Hash Table (DHT)-based blockchain with a logarithmic asymptotic message and memory complexity. In this demo paper, we present the software architecture of our open-source implementation of LightChain, as well as a novel deployment scenario of the entire LightChain system on a single machine aiming at results reproducibility.

    Submitted 26 July, 2020; originally announced July 2020.

  11. arXiv:2007.13200  [pdf, other

    cs.DC

    SkipSim: Scalable Skip Graph Simulator

    Authors: Yahya Hassanzadeh-Nazarabadi, Ali Utkan Şahin, Öznur Özkasap, Alptekin Küpçü

    Abstract: SkipSim is an offline Skip Graph simulator that enables Skip Graph-based algorithms including blockchains and P2P cloud storage to be simulated while preserving their scalability and decentralized nature. To the best of our knowledge, it is the first Skip Graph simulator that provides several features for experimentation on Skip Graph-based overlay networks. In this demo paper, we present SkipSim… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

  12. arXiv:2001.00747  [pdf, other

    cs.CR cs.DC

    Improving PKI, BGP, and DNS Using Blockchain: A Systematic Review

    Authors: Faizan Safdar Ali, Alptekin Kupcu

    Abstract: The Internet has many backbone components on top of which the whole world is connected. It is important to make these components, like Border Gateway Protocol (BGP), Domain Name System (DNS), and Public Key Infrastructure (PKI), secure and work without any interruption. All of the aforementioned components have vulnerabilities, mainly because of their dependence on the centralized parties, that sh… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

    Comments: 6 Pages, 2 Figures, ISC Turkey

    Journal ref: https://www.iscturkey.org/, 2019

  13. arXiv:1907.11997  [pdf, ps, other

    cs.DC

    Decentralized utility- and locality-aware replication for heterogeneous DHT-based P2P cloud storage systems

    Authors: Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap

    Abstract: As a Distributed Hash Table (DHT), Skip Graph routing overlays are exploited in several peer-to-peer (P2P) services, including P2P cloud storage. The fully decentralized replication algorithms that are applicable to the Skip Graph-based P2P cloud storage fail on improving the performance of the system with respect to both the availability of replicas as well as their response time. Additionally, t… ▽ More

    Submitted 27 July, 2019; originally announced July 2019.

  14. arXiv:1904.00375  [pdf, other

    cs.DC

    LightChain: A DHT-based Blockchain for Resource Constrained Environments

    Authors: Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap

    Abstract: As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT). The existing blockchain solutions have downsides in communication and storage efficiency, convergence to centralization, and consistency problems. In this paper, we propose LightChain, which is the first blockchain architecture that operates ov… ▽ More

    Submitted 20 December, 2020; v1 submitted 31 March, 2019; originally announced April 2019.

  15. arXiv:1903.07289  [pdf, other

    cs.DC

    Interlaced: Fully decentralized churn stabilization for Skip Graph-based DHTs

    Authors: Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap

    Abstract: As a distributed hash table (DHT) routing overlay, Skip Graph is used in a variety of peer-to-peer (P2P) systems including cloud storage, social networks, and search engines. The overlay connectivity of P2P systems is negatively affected by the arrivals and departures of nodes to and from the system that is known as churn. Preserving connectivity of the overlay network (i.e., the reachability of e… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  16. arXiv:1710.00208  [pdf, other

    cs.CR

    Efficient Dynamic Searchable Encryption with Forward Privacy

    Authors: Mohammad Etemad, Alptekin Küpçü, Charalampos Papamanthou, David Evans

    Abstract: Searchable symmetric encryption (SSE) enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes. For dynamic schemes, forward privacy requires that a newly added file cannot be linked to previous searches. We present a new dynamic SSE sch… ▽ More

    Submitted 30 September, 2017; originally announced October 2017.