Skip to main content

Showing 1–50 of 126 results for author: Mittal, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16797  [pdf, other

    cs.CL cs.AI

    Lottery Ticket Adaptation: Mitigating Destructive Interference in LLMs

    Authors: Ashwinee Panda, Berivan Isik, Xiangyu Qi, Sanmi Koyejo, Tsachy Weissman, Prateek Mittal

    Abstract: Existing methods for adapting large language models (LLMs) to new tasks are not suited to multi-task adaptation because they modify all the model weights -- causing destructive interference between tasks. The resulting effects, such as catastrophic forgetting of earlier tasks, make it challenging to obtain good performance on multiple tasks at the same time. To mitigate this, we propose Lottery Ti… ▽ More

    Submitted 25 June, 2024; v1 submitted 24 June, 2024; originally announced June 2024.

  2. arXiv:2406.14861  [pdf, other

    eess.SY cs.ET

    Resilience of the Electric Grid through Trustable IoT-Coordinated Assets

    Authors: Vineet J. Nair, Venkatesh Venkataramanan, Priyank Srivastava, Partha S. Sarker, Anurag Srivastava, Laurentiu D. Marinovici, Jun Zha, Christopher Irwin, Prateek Mittal, John Williams, H. Vincent Poor, Anuradha M. Annaswamy

    Abstract: The electricity grid has evolved from a physical system to a cyber-physical system with digital devices that perform measurement, control, communication, computation, and actuation. The increased penetration of distributed energy resources (DERs) that include renewable generation, flexible loads, and storage provides extraordinary opportunities for improvements in efficiency and sustainability. Ho… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: Submitted to the Proceedings of the National Academy of Sciences (PNAS), under review

  3. arXiv:2406.14598  [pdf, other

    cs.AI

    SORRY-Bench: Systematically Evaluating Large Language Model Safety Refusal Behaviors

    Authors: Tinghao Xie, Xiangyu Qi, Yi Zeng, Yangsibo Huang, Udari Madhushani Sehwag, Kaixuan Huang, Luxi He, Boyi Wei, Dacheng Li, Ying Sheng, Ruoxi Jia, Bo Li, Kai Li, Danqi Chen, Peter Henderson, Prateek Mittal

    Abstract: Evaluating aligned large language models' (LLMs) ability to recognize and reject unsafe user requests is crucial for safe, policy-compliant deployments. Existing evaluation efforts, however, face three limitations that we address with SORRY-Bench, our proposed benchmark. First, existing methods often use coarse-grained taxonomies of unsafe topics, and are over-representing some fine-grained topics… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  4. arXiv:2406.11011  [pdf, other

    cs.LG cs.CL stat.ML

    Data Shapley in One Training Run

    Authors: Jiachen T. Wang, Prateek Mittal, Dawn Song, Ruoxi Jia

    Abstract: Data Shapley provides a principled framework for attributing data's contribution within machine learning contexts. However, existing approaches require re-training models on different data subsets, which is computationally intensive, foreclosing their application to large-scale models. Furthermore, they produce the same attribution score for any models produced by running the learning algorithm, m… ▽ More

    Submitted 29 June, 2024; v1 submitted 16 June, 2024; originally announced June 2024.

  5. arXiv:2406.05946  [pdf, other

    cs.CR cs.AI

    Safety Alignment Should Be Made More Than Just a Few Tokens Deep

    Authors: Xiangyu Qi, Ashwinee Panda, Kaifeng Lyu, Xiao Ma, Subhrajit Roy, Ahmad Beirami, Prateek Mittal, Peter Henderson

    Abstract: The safety alignment of current Large Language Models (LLMs) is vulnerable. Relatively simple attacks, or even benign fine-tuning, can jailbreak aligned models. We argue that many of these vulnerabilities are related to a shared underlying issue: safety alignment can take shortcuts, wherein the alignment adapts a model's generative distribution primarily over only its very first few output tokens.… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  6. arXiv:2405.19524  [pdf, other

    cs.CR cs.AI

    AI Risk Management Should Incorporate Both Safety and Security

    Authors: Xiangyu Qi, Yangsibo Huang, Yi Zeng, Edoardo Debenedetti, Jonas Gei**, Luxi He, Kaixuan Huang, Udari Madhushani, Vikash Sehwag, Weijia Shi, Boyi Wei, Tinghao Xie, Danqi Chen, Pin-Yu Chen, Jeffrey Ding, Ruoxi Jia, Jiaqi Ma, Arvind Narayanan, Weijie J Su, Mengdi Wang, Chaowei Xiao, Bo Li, Dawn Song, Peter Henderson, Prateek Mittal

    Abstract: The exposure of security vulnerabilities in safety-aligned language models, e.g., susceptibility to adversarial attacks, has shed light on the intricate interplay between AI safety and AI security. Although the two disciplines now come together under the overarching goal of AI risk management, they have historically evolved separately, giving rise to differing perspectives. Therefore, in this pape… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  7. arXiv:2405.15556  [pdf, other

    cs.LG cs.CL cs.CR

    Certifiably Robust RAG against Retrieval Corruption

    Authors: Chong Xiang, Tong Wu, Zexuan Zhong, David Wagner, Danqi Chen, Prateek Mittal

    Abstract: Retrieval-augmented generation (RAG) has been shown vulnerable to retrieval corruption attacks: an attacker can inject malicious passages into retrieval results to induce inaccurate responses. In this paper, we propose RobustRAG as the first defense framework against retrieval corruption attacks. The key insight of RobustRAG is an isolate-then-aggregate strategy: we get LLM responses from each pas… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  8. arXiv:2405.14835  [pdf, other

    cs.DS cs.CC

    Polynomial Pass Semi-Streaming Lower Bounds for K-Cores and Degeneracy

    Authors: Sepehr Assadi, Prantar Ghosh, Bruno Loff, Parth Mittal, Sagnik Mukhopadhyay

    Abstract: The following question arises naturally in the study of graph streaming algorithms: "Is there any graph problem which is "not too hard", in that it can be solved efficiently with total communication (nearly) linear in the number $n$ of vertices, and for which, nonetheless, any streaming algorithm with $\tilde{O}(n)$ space (i.e., a semi-streaming algorithm) needs a polynomial $n^{Ω(1)}$ number of… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: Accepted at CCC 2024

  9. arXiv:2405.01349  [pdf, other

    cs.LG cs.CR

    Position Paper: Beyond Robustness Against Single Attack Types

    Authors: Sihui Dai, Chong Xiang, Tong Wu, Prateek Mittal

    Abstract: Current research on defending against adversarial examples focuses primarily on achieving robustness against a single attack type such as $\ell_2$ or $\ell_{\infty}$-bounded attacks. However, the space of possible perturbations is much larger and currently cannot be modeled by a single attack type. The discrepancy between the focus of current defenses and the space of attacks of interest calls to… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  10. arXiv:2404.19081  [pdf, ps, other

    cs.DS

    $(Δ+ 1)$ Vertex Coloring in $O(n)$ Communication

    Authors: Maxime Flin, Parth Mittal

    Abstract: We study the communication complexity of $(Δ+ 1)$ vertex coloring, where the edges of an $n$-vertex graph of maximum degree $Δ$ are partitioned between two players. We provide a randomized protocol which uses $O(n)$ bits of communication and ends with both players knowing the coloring. Combining this with a folklore $Ω(n)$ lower bound, this settles the randomized communication complexity of… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

    Comments: 16 pages, 1 figure; full version of paper accepted to PODC '24

  11. arXiv:2403.00871  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    Teach LLMs to Phish: Stealing Private Information from Language Models

    Authors: Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal

    Abstract: When large language models are trained on private data, it can be a significant privacy risk for them to memorize and regurgitate sensitive information. In this work, we propose a new practical data extraction attack that we call "neural phishing". This attack enables an adversary to target and extract sensitive or personally identifiable information (PII), e.g., credit card numbers, from a model… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

    Comments: ICLR 2024

  12. arXiv:2402.05162  [pdf, other

    cs.LG cs.AI cs.CL

    Assessing the Brittleness of Safety Alignment via Pruning and Low-Rank Modifications

    Authors: Boyi Wei, Kaixuan Huang, Yangsibo Huang, Tinghao Xie, Xiangyu Qi, Mengzhou Xia, Prateek Mittal, Mengdi Wang, Peter Henderson

    Abstract: Large language models (LLMs) show inherent brittleness in their safety mechanisms, as evidenced by their susceptibility to jailbreaking and even non-malicious fine-tuning. This study explores this brittleness of safety alignment by leveraging pruning and low-rank modifications. We develop methods to identify critical regions that are vital for safety guardrails, and that are disentangled from util… ▽ More

    Submitted 1 July, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: 22 pages, 9 figures. Project page is available at https://boyiwei.com/alignment-attribution/

  13. arXiv:2401.11103  [pdf, other

    cs.DS cs.LG stat.ML

    Efficient Data Shapley for Weighted Nearest Neighbor Algorithms

    Authors: Jiachen T. Wang, Prateek Mittal, Ruoxi Jia

    Abstract: This work aims to address an open problem in data valuation literature concerning the efficient computation of Data Shapley for weighted $K$ nearest neighbor algorithm (WKNN-Shapley). By considering the accuracy of hard-label KNN with discretized weights as the utility function, we reframe the computation of WKNN-Shapley into a counting problem and introduce a quadratic-time algorithm, presenting… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: AISTATS 2024 Oral

  14. arXiv:2401.04343  [pdf, other

    cs.LG cs.CL cs.CR

    Private Fine-tuning of Large Language Models with Zeroth-order Optimization

    Authors: Xinyu Tang, Ashwinee Panda, Milad Nasr, Saeed Mahloujifar, Prateek Mittal

    Abstract: Fine-tuning large pretrained models on private datasets may run the risk of violating privacy. Differential privacy is a framework for mitigating privacy risks by enforcing algorithmic stability. DP-SGD enables training models with private data in a privacy-preserving manner, but raises new obstacles in the form of performance loss and significant engineering challenges. We introduce DP-ZO, a new… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

  15. arXiv:2310.13076  [pdf, other

    cs.CV cs.CR

    PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses

    Authors: Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal

    Abstract: State-of-the-art defenses against adversarial patch attacks can now achieve strong certifiable robustness with a marginal drop in model utility. However, this impressive performance typically comes at the cost of 10-100x more inference-time computation compared to undefended models -- the research community has witnessed an intense three-way trade-off between certifiable robustness, model utility,… ▽ More

    Submitted 2 April, 2024; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: USENIX Security 2024. (extended) technical report

  16. arXiv:2310.03693  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!

    Authors: Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson

    Abstract: Optimizing large language models (LLMs) for downstream use cases often involves the customization of pre-trained LLMs through further fine-tuning. Meta's open release of Llama models and OpenAI's APIs for fine-tuning GPT-3.5 Turbo on custom datasets also encourage this practice. But, what are the safety costs associated with such custom fine-tuning? We note that while existing safety alignment inf… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  17. arXiv:2308.15709  [pdf, other

    cs.LG cs.CR cs.GT stat.ML

    Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation

    Authors: Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal

    Abstract: Data valuation aims to quantify the usefulness of individual data sources in training machine learning (ML) models, and is a critical aspect of data-centric ML research. However, data valuation faces significant yet frequently overlooked privacy challenges despite its importance. This paper studies these challenges with a focus on KNN-Shapley, one of the most practical data valuation methods nowad… ▽ More

    Submitted 25 November, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

    Comments: NeurIPS 2023 Spotlight

  18. arXiv:2308.12439  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection

    Authors: Tinghao Xie, Xiangyu Qi, ** He, Yiming Li, Jiachen T. Wang, Prateek Mittal

    Abstract: We present a novel defense, against backdoor attacks on Deep Neural Networks (DNNs), wherein adversaries covertly implant malicious behaviors (backdoors) into DNNs. Our defense falls within the category of post-development defenses that operate independently of how the model was generated. The proposed defense is built upon a novel reverse engineering approach that can directly extract backdoor fu… ▽ More

    Submitted 5 October, 2023; v1 submitted 23 August, 2023; originally announced August 2023.

  19. arXiv:2308.02562   

    cs.CV cs.AI cs.CY cs.LG

    Food Classification using Joint Representation of Visual and Textual Data

    Authors: Prateek Mittal, Puneet Goyal, Joohi Chauhan

    Abstract: Food classification is an important task in health care. In this work, we propose a multimodal classification framework that uses the modified version of EfficientNet with the Mish activation function for image classification, and the traditional BERT transformer-based network is used for text classification. The proposed network and the other state-of-the-art methods are evaluated on a large open… ▽ More

    Submitted 30 August, 2023; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: Updated results and discussions to be posted and some sections needed to be expanded

  20. arXiv:2306.13213  [pdf, other

    cs.CR cs.CL cs.LG

    Visual Adversarial Examples Jailbreak Aligned Large Language Models

    Authors: Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Peter Henderson, Mengdi Wang, Prateek Mittal

    Abstract: Recently, there has been a surge of interest in integrating vision into Large Language Models (LLMs), exemplified by Visual Language Models (VLMs) such as Flamingo and GPT-4. This paper sheds light on the security and safety implications of this trend. First, we underscore that the continuous and high-dimensional nature of the visual input makes it a weak link against adversarial attacks, represen… ▽ More

    Submitted 16 August, 2023; v1 submitted 22 June, 2023; originally announced June 2023.

  21. arXiv:2306.06076  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    Differentially Private Image Classification by Learning Priors from Random Processes

    Authors: Xinyu Tang, Ashwinee Panda, Vikash Sehwag, Prateek Mittal

    Abstract: In privacy-preserving machine learning, differentially private stochastic gradient descent (DP-SGD) performs worse than SGD due to per-sample gradient clip** and noise addition. A recent focus in private learning research is improving the performance of DP-SGD on private data by incorporating priors that are learned on real-world public data. In this work, we explore how we can improve the priva… ▽ More

    Submitted 31 October, 2023; v1 submitted 8 June, 2023; originally announced June 2023.

  22. arXiv:2305.01639  [pdf, other

    cs.LG cs.AI cs.CR

    Privacy-Preserving In-Context Learning for Large Language Models

    Authors: Tong Wu, Ashwinee Panda, Jiachen T. Wang, Prateek Mittal

    Abstract: In-context learning (ICL) is an important capability of Large Language Models (LLMs), enabling these models to dynamically adapt based on specific, in-context exemplars, thereby improving accuracy and relevance. However, LLM's responses may leak the sensitive private information contained in in-context exemplars. To address this challenge, we propose Differentially Private In-context Learning (DP-… ▽ More

    Submitted 30 September, 2023; v1 submitted 2 May, 2023; originally announced May 2023.

  23. arXiv:2304.07927  [pdf, other

    cs.CR cs.DS cs.LG

    A Randomized Approach for Tight Privacy Accounting

    Authors: Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal

    Abstract: Bounding privacy leakage over compositions, i.e., privacy accounting, is a key challenge in differential privacy (DP). The privacy parameter ($\eps$ or $δ$) is often easy to estimate but hard to bound. In this paper, we propose a new differential privacy paradigm called estimate-verify-release (EVR), which addresses the challenges of providing a strict upper bound for privacy parameter in DP compo… ▽ More

    Submitted 20 November, 2023; v1 submitted 16 April, 2023; originally announced April 2023.

    Comments: NeurIPS 2023

  24. arXiv:2304.01073  [pdf, other

    cs.CR cs.NI

    QUICstep: Circumventing QUIC-based Censorship

    Authors: Watson Jia, Mona Wang, Liang Wang, Prateek Mittal

    Abstract: Governments around the world limit free and open communication on the Internet through censorship. To reliably identify and block access to certain web domains, censors inspect the plaintext TLS SNI field sent in TLS handshakes. With QUIC rapidly displacing TCP as the dominant transport-layer protocol on the web, censorship regimes have already begun prosecuting network traffic delivered over QUIC… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

  25. arXiv:2302.10980  [pdf, other

    cs.LG cs.CR

    MultiRobustBench: Benchmarking Robustness Against Multiple Attacks

    Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal

    Abstract: The bulk of existing research in defending against adversarial examples focuses on defending against a single (typically bounded Lp-norm) attack, but for a practical setting, machine learning (ML) models should be robust to a wide variety of attacks. In this paper, we present the first unified framework for considering multiple attacks against ML models. Our framework is able to model different le… ▽ More

    Submitted 19 July, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

    Comments: ICML 2023

  26. arXiv:2302.10722  [pdf, other

    cs.LG cs.CR

    Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker

    Authors: Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Ben Y. Zhao, Haitao Zheng, Prateek Mittal

    Abstract: Finding classifiers robust to adversarial examples is critical for their safe deployment. Determining the robustness of the best possible classifier under a given threat model for a given data distribution and comparing it to that achieved by state-of-the-art training methods is thus an important diagnostic tool. In this paper, we find achievable information-theoretic lower bounds on loss in the p… ▽ More

    Submitted 6 December, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

    Comments: NeurIPS 2023 Spotlight

  27. arXiv:2302.08000  [pdf, other

    cs.CR

    How Effective is Multiple-Vantage-Point Domain Control Validation?

    Authors: Grace Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal

    Abstract: Multiple-vantage-point domain control validation (multiVA) is an emerging defense for mitigating BGP hijacking attacks against certificate authorities. While the adoption of multiVA is on the rise, little work has quantified its effectiveness against BGP hijacks in the wild. We bridge the gap by presenting the first analysis framework that measures the security of a multiVA deployment under real-w… ▽ More

    Submitted 17 February, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: 17 pages, 7 figures

  28. arXiv:2302.02031  [pdf, other

    cs.LG cs.AI cs.CY cs.NI

    Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning

    Authors: Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran

    Abstract: The proliferation of global censorship has led to the development of a plethora of measurement platforms to monitor and expose it. Censorship of the domain name system (DNS) is a key mechanism used across different countries. It is currently detected by applying heuristics to samples of DNS queries and responses (probes) for specific destinations. These heuristics, however, are both platform-speci… ▽ More

    Submitted 15 June, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: To appear in Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD '23)

  29. arXiv:2301.12576  [pdf, other

    cs.LG cs.CR

    Uncovering Adversarial Risks of Test-Time Adaptation

    Authors: Tong Wu, Feiran Jia, Xiangyu Qi, Jiachen T. Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal

    Abstract: Recently, test-time adaptation (TTA) has been proposed as a promising solution for addressing distribution shifts. It allows a base model to adapt to an unforeseen distribution during inference by leveraging the information from the batch of (unlabeled) test data. However, we uncover a novel security vulnerability of TTA based on the insight that predictions on benign samples can be impacted by ma… ▽ More

    Submitted 4 February, 2023; v1 submitted 29 January, 2023; originally announced January 2023.

  30. arXiv:2212.04486  [pdf, other

    cs.LG cs.AI cs.CR

    A New Linear Scaling Rule for Private Adaptive Hyperparameter Optimization

    Authors: Ashwinee Panda, Xinyu Tang, Saeed Mahloujifar, Vikash Sehwag, Prateek Mittal

    Abstract: An open problem in differentially private deep learning is hyperparameter optimization (HPO). DP-SGD introduces new hyperparameters and complicates existing ones, forcing researchers to painstakingly tune hyperparameters with hundreds of trials, which in turn makes it impossible to account for the privacy cost of HPO without destroying the utility. We propose an adaptive HPO method that uses cheap… ▽ More

    Submitted 5 May, 2024; v1 submitted 8 December, 2022; originally announced December 2022.

    Comments: ICML 2024

  31. arXiv:2209.07716  [pdf, other

    cs.CR cs.LG

    Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning

    Authors: Jiachen T. Wang, Saeed Mahloujifar, Shouda Wang, Ruoxi Jia, Prateek Mittal

    Abstract: Propose-Test-Release (PTR) is a differential privacy framework that works with local sensitivity of functions, instead of their global sensitivity. This framework is typically used for releasing robust statistics such as median or trimmed mean in a differentially private manner. While PTR is a common framework introduced over a decade ago, using it in applications such as robust SGD where we need… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

    Comments: NeurIPS 2022

  32. arXiv:2209.07399  [pdf, other

    cs.CV cs.LG

    A Light Recipe to Train Robust Vision Transformers

    Authors: Edoardo Debenedetti, Vikash Sehwag, Prateek Mittal

    Abstract: In this paper, we ask whether Vision Transformers (ViTs) can serve as an underlying architecture for improving the adversarial robustness of machine learning models against evasion attacks. While earlier works have focused on improving Convolutional Neural Networks, we show that also ViTs are highly suitable for adversarial training to achieve competitive performance. We achieve this objective usi… ▽ More

    Submitted 2 February, 2023; v1 submitted 15 September, 2022; originally announced September 2022.

    Comments: Camera-ready version for SaTML 2023, code available at https://github.com/dedeswim/vits-robustness-torch

  33. arXiv:2207.10825  [pdf, other

    cs.CV cs.CR cs.LG

    Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation

    Authors: Tong Wu, Tianhao Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal

    Abstract: Recent works have demonstrated that deep learning models are vulnerable to backdoor poisoning attacks, where these attacks instill spurious correlations to external trigger patterns or objects (e.g., stickers, sunglasses, etc.). We find that such external trigger signals are unnecessary, as highly effective backdoors can be easily inserted using rotation-based image transformation. Our method cons… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Comments: 25 pages

  34. arXiv:2206.10341  [pdf, other

    cs.CR cs.AI cs.LG

    Neurotoxin: Durable Backdoors in Federated Learning

    Authors: Zhengming Zhang, Ashwinee Panda, Linyue Song, Yaoqing Yang, Michael W. Mahoney, Joseph E. Gonzalez, Kannan Ramchandran, Prateek Mittal

    Abstract: Due to their decentralized nature, federated learning (FL) systems have an inherent vulnerability during their training to adversarial backdoor attacks. In this type of attack, the goal of the attacker is to use poisoned updates to implant so-called backdoors into the learned model such that, at test time, the model's outputs can be fixed to a given target for certain inputs. (As a simple toy exam… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

    Comments: Appears in ICML 2022

  35. arXiv:2206.09868  [pdf, other

    cs.LG cs.CR cs.CV

    Understanding Robust Learning through the Lens of Representation Similarities

    Authors: Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Prateek Mittal, Haitao Zheng

    Abstract: Representation learning, i.e. the generation of representations useful for downstream applications, is a task of fundamental importance that underlies much of the success of deep neural networks (DNNs). Recently, robustness to adversarial examples has emerged as a desirable property for DNNs, spurring the development of robust training methods that account for adversarial examples. In this paper,… ▽ More

    Submitted 15 September, 2022; v1 submitted 20 June, 2022; originally announced June 2022.

    Comments: 35 pages, 29 figures; Accepted to Neurips 2022

  36. arXiv:2206.06879  [pdf, other

    cs.NI

    Creating a Secure Underlay for the Internet

    Authors: Henry Birge-Lee, Joel Wanner, Grace Cimaszewski, Jonghoon Kwon, Liang Wang, Francois Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun

    Abstract: Adversaries can exploit inter-domain routing vulnerabilities to intercept communication and compromise the security of critical Internet applications. Meanwhile the deployment of secure routing solutions such as Border Gateway Protocol Security (BGPsec) and Scalability, Control and Isolation On Next-generation networks (SCION) are still limited. How can we leverage emerging secure routing backbone… ▽ More

    Submitted 15 June, 2022; v1 submitted 14 June, 2022; originally announced June 2022.

    Comments: Usenix Security 2022

  37. arXiv:2205.13616  [pdf, other

    cs.LG cs.CR cs.CV

    Towards A Proactive ML Approach for Detecting Backdoor Poison Samples

    Authors: Xiangyu Qi, Tinghao Xie, Jiachen T. Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal

    Abstract: Adversaries can embed backdoors in deep learning models by introducing backdoor poison samples into training datasets. In this work, we investigate how to detect such poison samples to mitigate the threat of backdoor attacks. First, we uncover a post-hoc workflow underlying most prior work, where defenders passively allow the attack to proceed and then leverage the characteristics of the post-atta… ▽ More

    Submitted 17 June, 2023; v1 submitted 26 May, 2022; originally announced May 2022.

    Comments: USENIX Security 2023

  38. arXiv:2205.13613  [pdf, other

    cs.LG cs.CR cs.CV

    Circumventing Backdoor Defenses That Are Based on Latent Separability

    Authors: Xiangyu Qi, Tinghao Xie, Yiming Li, Saeed Mahloujifar, Prateek Mittal

    Abstract: Recent studies revealed that deep learning is susceptible to backdoor poisoning attacks. An adversary can embed a hidden backdoor into a model to manipulate its predictions by only modifying a few training data, without controlling the training process. Currently, a tangible signature has been widely observed across a diverse set of backdoor poisoning attacks -- models trained on a poisoned datase… ▽ More

    Submitted 3 March, 2023; v1 submitted 26 May, 2022; originally announced May 2022.

  39. Leveraging strategic connection migration-powered traffic splitting for privacy

    Authors: Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal

    Abstract: Network-level adversaries have developed increasingly sophisticated techniques to surveil and control users' network traffic. In this paper, we exploit our observation that many encrypted protocol connections are no longer tied to device IP address (e.g., the connection migration feature in QUIC, or IP roaming in WireGuard and Mosh), due to the need for performance in a mobile-first world. We desi… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

  40. arXiv:2204.13779  [pdf, other

    cs.LG

    Formulating Robustness Against Unforeseen Attacks

    Authors: Sihui Dai, Saeed Mahloujifar, Prateek Mittal

    Abstract: Existing defenses against adversarial examples such as adversarial training typically assume that the adversary will conform to a specific or known threat model, such as $\ell_p$ perturbations within a fixed budget. In this paper, we focus on the scenario where there is a mismatch in the threat model assumed by the defense during training, and the actual capabilities of the adversary at test time.… ▽ More

    Submitted 29 September, 2022; v1 submitted 28 April, 2022; originally announced April 2022.

    Comments: NeurIPS 2022

  41. arXiv:2203.12410  [pdf, other

    cs.NI cs.CR

    Towards Reproducible Network Traffic Analysis

    Authors: Jordan Holland, Paul Schmitt, Prateek Mittal, Nick Feamster

    Abstract: Analysis techniques are critical for gaining insight into network traffic given both the higher proportion of encrypted traffic and increasing data rates. Unfortunately, the domain of network traffic analysis suffers from a lack of standardization, leading to incomparable results and barriers to reproducibility. Unlike other disciplines, no standard dataset format exists, forcing researchers and p… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: 14 Pages, 7 Table, 3 Figures, 7 Listings

  42. Brooks' Theorem in Graph Streams: A Single-Pass Semi-Streaming Algorithm for $Δ$-Coloring

    Authors: Sepehr Assadi, Pankaj Kumar, Parth Mittal

    Abstract: Every graph with maximum degree $Δ$ can be colored with $(Δ+1)$ colors using a simple greedy algorithm. Remarkably, recent work has shown that one can find such a coloring even in the semi-streaming model. But, in reality, one almost never needs $(Δ+1)$ colors to properly color a graph. Indeed, the celebrated \Brooks' theorem states that every (connected) graph beside cliques and odd cycles can be… ▽ More

    Submitted 3 August, 2023; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: Journal version in TheoretiCS. An extended abstract appeared in STOC 2022. 66 pages, 10 figures

    ACM Class: F.2

    Journal ref: TheoretiCS, Volume 2 (August 25, 2023) theoretics:9739

  43. arXiv:2203.09516  [pdf, other

    cs.CV cs.LG

    AutoSDF: Shape Priors for 3D Completion, Reconstruction and Generation

    Authors: Paritosh Mittal, Yen-Chi Cheng, Maneesh Singh, Shubham Tulsiani

    Abstract: Powerful priors allow us to perform inference with insufficient information. In this paper, we propose an autoregressive prior for 3D shapes to solve multimodal 3D tasks such as shape completion, reconstruction, and generation. We model the distribution over 3D shapes as a non-sequential autoregressive distribution over a discretized, low-dimensional, symbolic grid-like latent representation of 3D… ▽ More

    Submitted 29 March, 2023; v1 submitted 17 March, 2022; originally announced March 2022.

    Comments: In CVPR 2022. The first two authors contributed equally to this work. Project: https://yccyenchicheng.github.io/AutoSDF/. Add Supp

  44. arXiv:2202.09005  [pdf, other

    cs.CY

    Reviews in motion: a large scale, longitudinal study of review recommendations on Yelp

    Authors: Ryan Amos, Roland Maio, Prateek Mittal

    Abstract: The United Nations Consumer Protection Guidelines lists "access ... to adequate information ... to make informed choices" as a core consumer protection right. However, problematic online reviews and imperfections in algorithms that detect those reviews pose obstacles to the fulfillment of this right. Research on reviews and review platforms often derives insights from a single web crawl, but the d… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

    Comments: 12 pages, 10 figures

  45. arXiv:2202.01811  [pdf, other

    cs.CV

    ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking

    Authors: Chong Xiang, Alexander Valtchanov, Saeed Mahloujifar, Prateek Mittal

    Abstract: Object detectors, which are widely deployed in security-critical systems such as autonomous vehicles, have been found vulnerable to patch hiding attacks. An attacker can use a single physically-realizable adversarial patch to make the object detector miss the detection of victim objects and undermine the functionality of object detection applications. In this paper, we propose ObjectSeeker for cer… ▽ More

    Submitted 28 December, 2022; v1 submitted 3 February, 2022; originally announced February 2022.

    Comments: IEEE Symposium on Security and Privacy 2023; extended version

  46. arXiv:2112.06274  [pdf, other

    cs.LG cs.AI cs.CR

    SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification

    Authors: Ashwinee Panda, Saeed Mahloujifar, Arjun N. Bhagoji, Supriyo Chakraborty, Prateek Mittal

    Abstract: Federated learning is inherently vulnerable to model poisoning attacks because its decentralized nature allows attackers to participate with compromised devices. In model poisoning attacks, the attacker reduces the model's performance on targeted sub-tasks (e.g. classifying planes as birds) by uploading "poisoned" updates. In this report we introduce \algoname{}, a novel defense that uses global t… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

  47. arXiv:2111.02268  [pdf

    cs.CR cs.NI

    Data-Plane Security Applications in Adversarial Settings

    Authors: Liang Wang, Prateek Mittal, Jennifer Rexford

    Abstract: High-speed programmable switches have emerged as a promising building block for develo** performant data-plane applications. In this paper, we argue that the resource constraints and programming model in hardware switches has led to developers adopting problematic design patterns, whose security implications are not widely understood. We bridge the gap by identifying the major challenges and com… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: Under submission

  48. arXiv:2110.08324  [pdf, other

    cs.CR cs.LG

    Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture

    Authors: Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal

    Abstract: Membership inference attacks are a key measure to evaluate privacy leakage in machine learning (ML) models. These attacks aim to distinguish training members from non-members by exploiting differential behavior of the models on member and non-member inputs. The goal of this work is to train ML models that have high membership privacy while largely preserving their utility; we therefore aim for an… ▽ More

    Submitted 15 October, 2021; originally announced October 2021.

  49. arXiv:2110.05626  [pdf, other

    cs.LG cs.CV

    Parameterizing Activation Functions for Adversarial Robustness

    Authors: Sihui Dai, Saeed Mahloujifar, Prateek Mittal

    Abstract: Deep neural networks are known to be vulnerable to adversarially perturbed inputs. A commonly used defense is adversarial training, whose performance is influenced by model capacity. While previous works have studied the impact of varying model width and depth on robustness, the impact of increasing capacity by using learnable parametric activation functions (PAFs) has not been studied. We study h… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

  50. arXiv:2108.09135  [pdf, other

    cs.CV cs.CR

    PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier

    Authors: Chong Xiang, Saeed Mahloujifar, Prateek Mittal

    Abstract: The adversarial patch attack against image classification models aims to inject adversarially crafted pixels within a restricted image region (i.e., a patch) for inducing model misclassification. This attack can be realized in the physical world by printing and attaching the patch to the victim object; thus, it imposes a real-world threat to computer vision systems. To counter this threat, we desi… ▽ More

    Submitted 8 April, 2022; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: USENIX Security Symposium 2022; extended technical report