Skip to main content

Showing 1–10 of 10 results for author: Naseri, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.03650  [pdf, other

    cs.CV cs.LG

    Generated Contents Enrichment

    Authors: Mahdi Naseri, Jiayan Qiu, Zhou Wang

    Abstract: In this paper, we investigate a novel artificial intelligence generation task, termed as generated contents enrichment (GCE). Different from conventional artificial intelligence contents generation task that enriches the given textual description implicitly with limited semantics for generating visually real content, our proposed GCE strives to perform content enrichment explicitly on both the vis… ▽ More

    Submitted 11 June, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  2. arXiv:2402.06737  [pdf, other

    cs.LG cs.AI

    ExGRG: Explicitly-Generated Relation Graph for Self-Supervised Representation Learning

    Authors: Mahdi Naseri, Mahdi Biparva

    Abstract: Self-supervised Learning (SSL) has emerged as a powerful technique in pre-training deep learning models without relying on expensive annotated labels, instead leveraging embedded signals in unlabeled data. While SSL has shown remarkable success in computer vision tasks through intuitive data augmentation, its application to graph-structured data poses challenges due to the semantic-altering and co… ▽ More

    Submitted 4 June, 2024; v1 submitted 9 February, 2024; originally announced February 2024.

  3. arXiv:2401.10765  [pdf, other

    cs.LG cs.CR

    Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection

    Authors: Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller

    Abstract: Federated Learning (FL) is a data-minimization approach enabling collaborative model training across diverse clients with local data, avoiding direct data exchange. However, state-of-the-art FL solutions to identify fraudulent financial transactions exhibit a subset of the following limitations. They (1) lack a formal security definition and proof, (2) assume prior freezing of suspicious customers… ▽ More

    Submitted 22 January, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

  4. arXiv:2304.08847  [pdf, other

    cs.LG cs.CR

    BadVFL: Backdoor Attacks in Vertical Federated Learning

    Authors: Mohammad Naseri, Yufei Han, Emiliano De Cristofaro

    Abstract: Federated learning (FL) enables multiple parties to collaboratively train a machine learning model without sharing their data; rather, they train their own model locally and send updates to a central server for aggregation. Depending on how the data is distributed among the participants, FL can be classified into Horizontal (HFL) and Vertical (VFL). In VFL, the participants share the same set of t… ▽ More

    Submitted 23 August, 2023; v1 submitted 18 April, 2023; originally announced April 2023.

    Comments: Accepted for publication at the 45th IEEE Symposium on Security & Privacy (S&P 2024). Please cite accordingly

  5. arXiv:2303.04931  [pdf, ps, other

    eess.SY cs.CR cs.RO

    An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots

    Authors: Amir Mohammad Naseri, Walter Lucia, Amr Youssef

    Abstract: Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different control schemes that have been proposed to secure such systems against sophisticated cyber-attacks require the exchange of secret messages between the… ▽ More

    Submitted 23 October, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: This preprint has been submitted to the 2023 IFAC World Congress

  6. arXiv:2209.03050  [pdf, other

    cs.CR cs.AI

    Cerberus: Exploring Federated Prediction of Security Events

    Authors: Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro

    Abstract: Modern defenses against cyberattacks increasingly rely on proactive approaches, e.g., to predict the adversary's next actions based on past events. Building accurate prediction models requires knowledge from many organizations; alas, this entails disclosing sensitive information, such as network structures, security postures, and policies, which might often be undesirable or outright impossible. I… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 29th ACM Conference on Computer and Communications Security (ACM CCS 2022)

  7. arXiv:2206.05199  [pdf, other

    cs.LG cs.CR

    Bayesian Estimation of Differential Privacy

    Authors: Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Ahmed Salem, Victor Rühle, Andrew Paverd, Mohammad Naseri, Boris Köpf, Daniel Jones

    Abstract: Algorithms such as Differentially Private SGD enable training machine learning models with formal privacy guarantees. However, there is a discrepancy between the protection that such algorithms guarantee in theory and the protection they afford in practice. An emerging strand of work empirically estimates the protection afforded by differentially private training as a confidence interval for the p… ▽ More

    Submitted 15 June, 2022; v1 submitted 10 June, 2022; originally announced June 2022.

    Comments: 17 pages, 8 figures. Joint main authors: Santiago Zanella-Béguelin, Lukas Wutschitz, and Shruti Tople

  8. arXiv:2104.01011  [pdf, ps, other

    cs.CR eess.SY

    On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments

    Authors: Amir Mohammad Naseri, Walter Lucia, Mohammad Mannan, Amr Youssef

    Abstract: Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their li… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

  9. arXiv:2009.03561  [pdf, other

    cs.CR cs.AI

    Local and Central Differential Privacy for Robustness and Privacy in Federated Learning

    Authors: Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro

    Abstract: Federated Learning (FL) allows multiple participants to train machine learning models collaboratively by kee** their datasets local while only exchanging model updates. Alas, this is not necessarily free from privacy and robustness vulnerabilities, e.g., via membership, property, and backdoor attacks. This paper investigates whether and to what extent one can use differential Privacy (DP) to pro… ▽ More

    Submitted 27 May, 2022; v1 submitted 8 September, 2020; originally announced September 2020.

    Journal ref: Published in the Proceedings of the 29th Network and Distributed System Security Symposium (NDSS 2022)

  10. arXiv:1810.02171  [pdf, ps, other

    cs.IT

    Ergodic Capacity of Triple-Hop All-Optical Amplify-and-Forward Relaying over Free-Space Optical Channels

    Authors: Mohsen Naseri, Mohammad Taghi Dabiri, Seyed Mohammad Sajad Sadough

    Abstract: In this paper, we propose a comprehensive research over triple hop all-optical relaying free-space optical (FSO) systems in the presence of all main noise sources including background, thermal and amplified spontaneous emission (ASE) noise and by considering the effect of the optical degree-of- freedom (DoF). Using full CSI relaying, we derive the exact expressions for the noise variance at the de… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.

    Comments: I have not any comments

    MSC Class: 14J60 (Primary) 14F05; 14J26 (Secondary)