Skip to main content

Showing 1–12 of 12 results for author: Onen, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.10307  [pdf, other

    cs.IT

    Chernoff Information as a Privacy Constraint for Adversarial Classification

    Authors: Ayşe Ünsal, Melek Önen

    Abstract: This work studies a privacy metric based on Chernoff information, \textit{Chernoff differential privacy}, due to its significance in characterization of classifier performance. Adversarial classification, as any other classification problem is built around minimization of the (average or correct detection) probability of error in deciding on either of the classes in the case of binary classificati… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  2. arXiv:2401.13754  [pdf, other

    math.NA cs.ET

    Multi-Function Multi-Way Analog Technology for Sustainable Machine Intelligence Computation

    Authors: Vassilis Kalantzis, Mark S. Squillante, Shashanka Ubaru, Tayfun Gokmen, Chai Wah Wu, Anshul Gupta, Haim Avron, Tomasz Nowicki, Malte Rasch, Murat Onen, Vanessa Lopez Marrero, Effendi Leobandung, Yasuteru Kohda, Wilfried Haensch, Lior Horesh

    Abstract: Numerical computation is essential to many areas of artificial intelligence (AI), whose computing demands continue to grow dramatically, yet their continued scaling is jeopardized by the slowdown in Moore's law. Multi-function multi-way analog (MFMWA) technology, a computing architecture comprising arrays of memristors supporting in-memory computation of matrix operations, can offer tremendous imp… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    MSC Class: 65F10; C3; G1 ACM Class: G.1.3

  3. arXiv:2307.13548  [pdf, other

    cs.CR cs.LG

    Node Injection Link Stealing Attack

    Authors: Oualid Zari, Javier Parra-Arnau, Ayşe Ünsal, Melek Önen

    Abstract: In this paper, we present a stealthy and effective attack that exposes privacy vulnerabilities in Graph Neural Networks (GNNs) by inferring private links within graph-structured data. Focusing on the inductive setting where new nodes join the graph and an API is used to query predictions, we investigate the potential leakage of private edge information. We also propose methods to preserve privacy… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

  4. arXiv:2304.12012  [pdf, other

    cs.LG cs.DC

    Fed-BioMed: Open, Transparent and Trusted Federated Learning for Real-world Healthcare Applications

    Authors: Francesco Cremonesi, Marc Vesin, Sergen Cansiz, Yannick Bouillard, Irene Balelli, Lucia Innocenti, Santiago Silva, Samy-Safwan Ayed, Riccardo Taiello, Laetita Kameni, Richard Vidal, Fanny Orlhac, Christophe Nioche, Nathan Lapel, Bastien Houis, Romain Modzelewski, Olivier Humbert, Melek Önen, Marco Lorenzi

    Abstract: The real-world implementation of federated learning is complex and requires research and development actions at the crossroad between different domains ranging from data science, to software programming, networking, and security. While today several FL libraries are proposed to data scientists and users, most of these frameworks are not designed to find seamless application in medical use-cases, d… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  5. arXiv:2205.10120  [pdf, other

    cs.CV cs.AI cs.CR eess.IV

    Privacy Preserving Image Registration

    Authors: Riccardo Taiello, Melek Önen, Francesco Capano, Olivier Humbert, Marco Lorenzi

    Abstract: Image registration is a key task in medical imaging applications, allowing to represent medical images in a common spatial reference frame. Current approaches to image registration are generally based on the assumption that the content of the images is usually accessible in clear form, from which the spatial transformation is subsequently estimated. This common assumption may not be met in practic… ▽ More

    Submitted 16 April, 2024; v1 submitted 17 May, 2022; originally announced May 2022.

    Comments: v4 Accepted at Medical Image Computing and Computer Assisted Intervention (2022) 130-140

    Journal ref: Medical Image Analysis Medical Image Analysis, Volume 94, May 2024, 103129

  6. arXiv:2203.11804  [pdf, other

    cs.IT

    Information-Theoretic Approaches to Differential Privacy

    Authors: Ayse Unsal, Melek Onen

    Abstract: This tutorial studies relationships between differential privacy and various information-theoretic measures by using several selective articles. In particular, we present how these connections can provide new interpretations for the privacy guarantee in systems that deploy differential privacy in an information-theoretic framework. To this end, the tutorial provides an extensive summary on the exi… ▽ More

    Submitted 28 March, 2023; v1 submitted 22 March, 2022; originally announced March 2022.

  7. arXiv:2201.13377  [pdf

    cs.LG cs.ET eess.SY

    Neural Network Training with Asymmetric Crosspoint Elements

    Authors: Murat Onen, Tayfun Gokmen, Teodor K. Todorov, Tomasz Nowicki, Jesus A. del Alamo, John Rozen, Wilfried Haensch, Seyoung Kim

    Abstract: Analog crossbar arrays comprising programmable nonvolatile resistors are under intense investigation for acceleration of deep neural network training. However, the ubiquitous asymmetric conductance modulation of practical resistive devices critically degrades the classification performance of networks trained with conventional algorithms. Here, we describe and experimentally demonstrate an alterna… ▽ More

    Submitted 31 January, 2022; originally announced January 2022.

  8. arXiv:2201.09751  [pdf, other

    cs.IT

    Adversarial Classification under Gaussian Mechanism: Calibrating the Attack to Sensitivity

    Authors: Ayse Unsal, Melek Onen

    Abstract: This work studies anomaly detection under differential privacy (DP) with Gaussian perturbation using both statistical and information-theoretic tools. In our setting, the adversary aims to modify the content of a statistical dataset by inserting additional data without being detected by using the DP guarantee to her own benefit. To this end, we characterize information-theoretic and statistical th… ▽ More

    Submitted 22 August, 2022; v1 submitted 24 January, 2022; originally announced January 2022.

  9. arXiv:2105.05610  [pdf, ps, other

    cs.IT

    A Statistical Threshold for Adversarial Classification in Laplace Mechanisms

    Authors: Ayşe Ünsal, Melek Önen

    Abstract: This paper studies the statistical characterization of detecting an adversary who wants to harm some computation such as machine learning models or aggregation by altering the output of a differentially private mechanism in addition to discovering some information about the underlying dataset. An adversary who is able to modify the published information from a differentially private mechanism aims… ▽ More

    Submitted 25 June, 2021; v1 submitted 12 May, 2021; originally announced May 2021.

  10. arXiv:2001.03418  [pdf, other

    cs.CR

    QSOR: Quantum-Safe Onion Routing

    Authors: Zsolt Tujner, Thomas Rooijakkers, Maran van Heesch, Melek Önen

    Abstract: In this work, we propose a study on the use of post-quantum cryptographic primitives for the Tor network in order to make it safe in a quantum world. With this aim, the underlying keying material has first been analysed. We observe that breaking the security of the algorithms/protocols that use long- and medium-term keys (usually RSA keys) have the highest impact in security. Therefore, we investi… ▽ More

    Submitted 10 January, 2020; originally announced January 2020.

  11. Design and Characterization of Superconducting Nanowire-Based Processors for Acceleration of Deep Neural Network Training

    Authors: Murat Onen, Brenden A. Butters, Emily Toomey, Tayfun Gokmen, Karl K. Berggren

    Abstract: Training of deep neural networks (DNNs) is a computationally intensive task and requires massive volumes of data transfer. Performing these operations with the conventional von Neumann architectures creates unmanageable time and power costs. Recent studies have shown that mixed-signal designs involving crossbar architectures are capable of achieving acceleration factors as high as 30,000x over the… ▽ More

    Submitted 5 July, 2019; originally announced July 2019.

  12. arXiv:1705.08014  [pdf

    cs.LG cs.NE stat.ML

    Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Authors: Tayfun Gokmen, O. Murat Onen, Wilfried Haensch

    Abstract: In a previous work we have detailed the requirements to obtain a maximal performance benefit by implementing fully connected deep neural networks (DNN) in form of arrays of resistive devices for deep learning. This concept of Resistive Processing Unit (RPU) devices we extend here towards convolutional neural networks (CNNs). We show how to map the convolutional layers to RPU arrays such that the p… ▽ More

    Submitted 22 May, 2017; originally announced May 2017.

    Comments: 22 pages, 6 figures, 2 tables