Skip to main content

Showing 1–4 of 4 results for author: Shafran, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05870  [pdf, other

    cs.CR cs.CL cs.LG

    Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents

    Authors: Avital Shafran, Roei Schuster, Vitaly Shmatikov

    Abstract: Retrieval-augmented generation (RAG) systems respond to queries by retrieving relevant documents from a knowledge database, then generating an answer by applying an LLM to the retrieved documents. We demonstrate that RAG systems that operate on databases with potentially untrusted content are vulnerable to a new class of denial-of-service attacks we call jamming. An adversary can add a single ``… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  2. arXiv:2310.01959  [pdf, other

    cs.LG cs.CR

    Beyond Labeling Oracles: What does it mean to steal ML models?

    Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot

    Abstract: Model extraction attacks are designed to steal trained models with only query access, as is often provided through APIs that ML-as-a-Service providers offer. Machine Learning (ML) models are expensive to train, in part because data is hard to obtain, and a primary incentive for model extraction is to acquire a model while incurring less cost than training from scratch. Literature on model extracti… ▽ More

    Submitted 13 June, 2024; v1 submitted 3 October, 2023; originally announced October 2023.

  3. arXiv:2102.07762  [pdf, other

    cs.LG cs.CR

    Membership Inference Attacks are Easier on Difficult Problems

    Authors: Avital Shafran, Shmuel Peleg, Yedid Hoshen

    Abstract: Membership inference attacks (MIA) try to detect if data samples were used to train a neural network model, e.g. to detect copyright abuses. We show that models with higher dimensional input and output are more vulnerable to MIA, and address in more detail models for image translation and semantic segmentation, including medical image segmentation. We show that reconstruction-errors can lead to ve… ▽ More

    Submitted 18 August, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

  4. arXiv:1911.12322  [pdf, other

    cs.LG cs.CR stat.ML

    Crypto-Oriented Neural Architecture Design

    Authors: Avital Shafran, Gil Segev, Shmuel Peleg, Yedid Hoshen

    Abstract: As neural networks revolutionize many applications, significant privacy conflicts between model users and providers emerge. The cryptography community developed a variety of techniques for secure computation to address such privacy issues. As generic techniques for secure computation are typically prohibitively ineffective, many efforts focus on optimizing their underlying cryptographic tools. Dif… ▽ More

    Submitted 16 February, 2021; v1 submitted 27 November, 2019; originally announced November 2019.

    Comments: Full version (shorter version published in ICASSP'21)