Skip to main content

Showing 1–11 of 11 results for author: Naveed, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.17296  [pdf, other

    cs.CR cs.LG

    Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation

    Authors: Hamza Saleem, Amir Ziashahabi, Muhammad Naveed, Salman Avestimehr

    Abstract: Training machine learning models on data from multiple entities without direct data sharing can unlock applications otherwise hindered by business, legal, or ethical constraints. In this work, we design and implement new privacy-preserving machine learning protocols for logistic regression and neural network models. We adopt a two-server model where data owners secret-share their data between two… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: Accepted at Privacy Enhancing Technologies Symposium (PETS) 2024

  2. arXiv:2305.11619  [pdf, other

    cs.SE cs.AI

    Towards Code Generation from BDD Test Case Specifications: A Vision

    Authors: Leon Chemnitz, David Reichenbach, Hani Aldebes, Mariam Naveed, Krishna Narasimhan, Mira Mezini

    Abstract: Automatic code generation has recently attracted large attention and is becoming more significant to the software development process. Solutions based on Machine Learning and Artificial Intelligence are being used to increase human and software efficiency in potent and innovative ways. In this paper, we aim to leverage these developments and introduce a novel approach to generating frontend compon… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

    Comments: Accepted for publication at the International Conference on AI Engineering (CAIN) 2023

  3. arXiv:2205.05249  [pdf, other

    cs.LG cs.CR cs.CV cs.DC

    Secure & Private Federated Neuroimaging

    Authors: Dimitris Stripelis, Umang Gupta, Hamza Saleem, Nikhil Dhinagar, Tanmay Ghai, Rafael Chrysovalantis Anastasiou, Armaghan Asghar, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite

    Abstract: The amount of biomedical data continues to grow rapidly. However, collecting data from multiple sites for joint analysis remains challenging due to security, privacy, and regulatory concerns. To overcome this challenge, we use Federated Learning, which enables distributed training of neural network models over multiple data sources without sharing data. Each site trains the neural network over its… ▽ More

    Submitted 28 August, 2023; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: 18 pages, 13 figures, 2 tables

    ACM Class: I.2; I.5.1; J.3

  4. arXiv:2201.02002  [pdf, other

    cs.DC

    Blizzard: a Distributed Consensus Protocol for Mobile Devices

    Authors: Mehrdad Kiamari, Bhaskar Krishnamachari, Muhammad Naveed, Seokgu Yun

    Abstract: We present Blizzard, a Byzantine Fault Tolerant (BFT) distributed ledger protocol that is aimed at making mobile devices first-class citizens in the consensus process. Blizzard introduces a novel two-tier architecture by having the mobile nodes communicate through online brokers, and includes a decentralized matching scheme to ensure each node connects to a certain number of random brokers. Throug… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

  5. Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services

    Authors: Sojhal Ismail Khan, Dominika Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed

    Abstract: Mobile crowdsourcing services (MCS), enable fast and economical data acquisition at scale and find applications in a variety of domains. Prior work has shown that Foursquare and Waze (a location-based and a navigation MCS) are vulnerable to different kinds of data poisoning attacks. Such attacks can be upsetting and even dangerous especially when they are used to inject improper inputs to mislead… ▽ More

    Submitted 18 October, 2021; v1 submitted 16 October, 2021; originally announced October 2021.

    Journal ref: Annual Computer Security Applications Conference (ACSAC '21), December 6--10, 2021, USA

  6. arXiv:2108.03437  [pdf, other

    cs.CR cs.LG

    Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption

    Authors: Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite

    Abstract: Federated learning (FL) enables distributed computation of machine learning models over various disparate, remote data sources, without requiring to transfer any individual data to a centralized location. This results in an improved generalizability of models and efficient scaling of computation as more sources and larger datasets are added to the federation. Nevertheless, recent membership attack… ▽ More

    Submitted 9 November, 2021; v1 submitted 7 August, 2021; originally announced August 2021.

    Comments: 9 pages, 3 figures, 1 algorithm

  7. arXiv:2104.02832  [pdf, other

    cs.CV

    ARC: A Vision-based Automatic Retail Checkout System

    Authors: Syed Talha Bukhari, Abdul Wahab Amin, Muhammad Abdullah Naveed, Muhammad Rzi Abbas

    Abstract: Retail checkout systems employed at supermarkets primarily rely on barcode scanners, with some utilizing QR codes, to identify the items being purchased. These methods are time-consuming in practice, require a certain level of human supervision, and involve waiting in long queues. In this regard, we propose a system, that we call ARC, which aims at making the process of check-out at retail store c… ▽ More

    Submitted 17 May, 2021; v1 submitted 6 April, 2021; originally announced April 2021.

    Comments: Work was done during the academic year 2017-2018 as a Senior Year (undergraduate) Project (thesis)

  8. arXiv:2012.08723  [pdf, other

    cs.LG cs.AI cs.CR

    Exacerbating Algorithmic Bias through Fairness Attacks

    Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan

    Abstract: Algorithmic fairness has attracted significant attention in recent years, with many quantitative measures suggested for characterizing the fairness of different machine learning algorithms. Despite this interest, the robustness of those fairness measures with respect to an intentional adversarial attack has not been properly addressed. Indeed, most adversarial machine learning has focused on the i… ▽ More

    Submitted 15 December, 2020; originally announced December 2020.

  9. A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace

    Authors: Kien Nguyen, Gabriel Ghinita, Muhammad Naveed, Cyrus Shahabi

    Abstract: Mobile devices with rich features can record videos, traffic parameters or air quality readings along user trajectories. Although such data may be valuable, users are seldom rewarded for collecting them. Emerging digital marketplaces allow owners to advertise their data to interested buyers. We focus on geo-marketplaces, where buyers search data based on geo-tags. Such marketplaces present signifi… ▽ More

    Submitted 30 September, 2019; v1 submitted 31 August, 2019; originally announced September 2019.

    Comments: SIGSPATIAL'19, 10 pages

  10. arXiv:1410.8869  [pdf, other

    cs.SI physics.soc-ph

    Resilience of Social Networks Under Different Attack Strategies

    Authors: Mohammad Ayub Latif, Muhammad Naveed, Faraz Zaidi

    Abstract: Recent years have seen the world become a closely connected society with the emergence of different types of social networks. Online social networks have provided a way to bridge long distances and establish numerous communication channels which were not possible earlier. These networks exhibit interesting behavior under intentional attacks and random failures where different structural properties… ▽ More

    Submitted 31 October, 2014; originally announced October 2014.

    Journal ref: Social Informatics. Springer International Publishing, 2013. 16-29

  11. arXiv:1405.1891  [pdf, other

    cs.CR

    Privacy in the Genomic Era

    Authors: Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang

    Abstract: Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has… ▽ More

    Submitted 17 June, 2015; v1 submitted 8 May, 2014; originally announced May 2014.

    ACM Class: K.6.5