Skip to main content

Showing 1–50 of 55 results for author: Shumailov, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.02551  [pdf, other

    cs.CR cs.AI cs.CY

    A False Sense of Safety: Unsafe Information Leakage in 'Safe' AI Responses

    Authors: David Glukhov, Ziwen Han, Ilia Shumailov, Vardan Papyan, Nicolas Papernot

    Abstract: Large Language Models (LLMs) are vulnerable to jailbreaks$\unicode{x2013}$methods to elicit harmful or generally impermissible outputs. Safety measures are developed and assessed on their effectiveness at defending against jailbreak attacks, indicating a belief that safety is equivalent to robustness. We assert that current defense mechanisms, such as output filters and alignment fine-tuning, are,… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  2. arXiv:2407.00106  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    UnUnlearning: Unlearning is not sufficient for content regulation in advanced generative AI

    Authors: Ilia Shumailov, Jamie Hayes, Eleni Triantafillou, Guillermo Ortiz-Jimenez, Nicolas Papernot, Matthew Jagielski, Itay Yona, Heidi Howard, Eugene Bagdasaryan

    Abstract: Exact unlearning was first introduced as a privacy mechanism that allowed a user to retract their data from machine learning models on request. Shortly after, inexact schemes were proposed to mitigate the impractical costs associated with exact unlearning. More recently unlearning is often discussed as an approach for removal of impermissible knowledge i.e. knowledge that the model should not poss… ▽ More

    Submitted 27 June, 2024; originally announced July 2024.

  3. arXiv:2406.11715  [pdf, other

    cs.LG cs.CL cs.SE

    Measuring memorization in RLHF for code completion

    Authors: Aneesh Pappu, Billy Porter, Ilia Shumailov, Jamie Hayes

    Abstract: Reinforcement learning with human feedback (RLHF) has become the dominant method to align large models to user preferences. Unlike fine-tuning, for which there are many studies regarding training data memorization, it is not clear how memorization is affected by or introduced in the RLHF alignment process. Understanding this relationship is important as real user data may be collected and used to… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  4. arXiv:2406.10011  [pdf, other

    cs.LG cs.AI cs.CR

    Beyond Slow Signs in High-fidelity Model Extraction

    Authors: Hanna Foerster, Robert Mullins, Ilia Shumailov, Jamie Hayes

    Abstract: Deep neural networks, costly to train and rich in intellectual property value, are increasingly threatened by model extraction attacks that compromise their confidentiality. Previous attacks have succeeded in reverse-engineering model parameters up to a precision of float64 for models trained on random data with at most three hidden layers using cryptanalytical techniques. However, the process was… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  5. arXiv:2405.20990  [pdf, other

    cs.CR cs.AI cs.LG

    Locking Machine Learning Models into Hardware

    Authors: Eleanor Clifford, Adhithya Saravanan, Harry Langford, Cheng Zhang, Yiren Zhao, Robert Mullins, Ilia Shumailov, Jamie Hayes

    Abstract: Modern Machine Learning models are expensive IP and business competitiveness often depends on kee** this IP confidential. This in turn restricts how these models are deployed -- for example it is unclear how to deploy a model on-device without inevitably leaking the underlying model. At the same time, confidential computing technologies such as Multi-Party Computation or Homomorphic encryption r… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

    Comments: 10 pages, 2 figures of main text; 14 pages, 16 figures of appendices

  6. arXiv:2403.07857  [pdf, other

    cs.LG

    Fairness Feedback Loops: Training on Synthetic Data Amplifies Bias

    Authors: Sierra Wyllie, Ilia Shumailov, Nicolas Papernot

    Abstract: Model-induced distribution shifts (MIDS) occur as previous model outputs pollute new model training sets over generations of models. This is known as model collapse in the case of generative models, and performative prediction or unfairness feedback loops for supervised models. When a model induces a distribution shift, it also encodes its mistakes, biases, and unfairnesses into the ground truth o… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  7. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1092 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 14 June, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  8. arXiv:2403.01218  [pdf, other

    cs.LG cs.CR

    Inexact Unlearning Needs More Careful Evaluations to Avoid a False Sense of Privacy

    Authors: Jamie Hayes, Ilia Shumailov, Eleni Triantafillou, Amr Khalifa, Nicolas Papernot

    Abstract: The high cost of model training makes it increasingly desirable to develop techniques for unlearning. These techniques seek to remove the influence of a training example without having to retrain the model from scratch. Intuitively, once a model has unlearned, an adversary that interacts with the model should no longer be able to tell whether the unlearned example was included in the model's train… ▽ More

    Submitted 21 May, 2024; v1 submitted 2 March, 2024; originally announced March 2024.

  9. arXiv:2402.06957  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Architectural Neural Backdoors from First Principles

    Authors: Harry Langford, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot

    Abstract: While previous research backdoored neural networks by changing their parameters, recent work uncovered a more insidious threat: backdoors embedded within the definition of the network's architecture. This involves injecting common architectural components, such as activation functions and pooling layers, to subtly introduce a backdoor behavior that persists even after (full re-)training. However,… ▽ More

    Submitted 10 February, 2024; originally announced February 2024.

  10. arXiv:2402.05526  [pdf, other

    cs.CR cs.LG

    Buffer Overflow in Mixture of Experts

    Authors: Jamie Hayes, Ilia Shumailov, Itay Yona

    Abstract: Mixture of Experts (MoE) has become a key ingredient for scaling large foundation models while kee** inference costs steady. We show that expert routing strategies that have cross-batch dependencies are vulnerable to attacks. Malicious queries can be sent to a model and can affect a model's output on other benign queries if they are grouped in the same batch. We demonstrate this via a proof-of-c… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  11. Revisiting Block-based Quantisation: What is Important for Sub-8-bit LLM Inference?

    Authors: Cheng Zhang, Jianyi Cheng, Ilia Shumailov, George A. Constantinides, Yiren Zhao

    Abstract: The inference of Large language models (LLMs) requires immense computation and memory resources. To curtail these costs, quantisation has merged as a promising solution, but existing LLM quantisation mainly focuses on 8-bit. In this work, we explore the statistical and learning properties of the LLM layer and attribute the bottleneck of LLM quantisation to numerical scaling offsets. To address thi… ▽ More

    Submitted 21 October, 2023; v1 submitted 8 October, 2023; originally announced October 2023.

    Comments: Accepted by EMNLP2023

  12. arXiv:2310.01959  [pdf, other

    cs.LG cs.CR

    Beyond Labeling Oracles: What does it mean to steal ML models?

    Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot

    Abstract: Model extraction attacks are designed to steal trained models with only query access, as is often provided through APIs that ML-as-a-Service providers offer. Machine Learning (ML) models are expensive to train, in part because data is hard to obtain, and a primary incentive for model extraction is to acquire a model while incurring less cost than training from scratch. Literature on model extracti… ▽ More

    Submitted 13 June, 2024; v1 submitted 3 October, 2023; originally announced October 2023.

  13. arXiv:2310.00438  [pdf, other

    cs.CV cs.LG

    Human-Producible Adversarial Examples

    Authors: David Khachaturov, Yue Gao, Ilia Shumailov, Robert Mullins, Ross Anderson, Kassem Fawaz

    Abstract: Visual adversarial examples have so far been restricted to pixel-level image manipulations in the digital world, or have required sophisticated equipment such as 2D or 3D printers to be produced in the physical real world. We present the first ever method of generating human-producible adversarial examples for the real world that requires nothing more complicated than a marker pen. We call them… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Comments: Submitted to ICLR 2024

  14. arXiv:2308.11845  [pdf, other

    cs.LG cs.CR

    SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks

    Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz

    Abstract: Machine Learning (ML) systems are vulnerable to adversarial examples, particularly those from query-based black-box attacks. Despite various efforts to detect and prevent such attacks, there is a need for a more comprehensive approach to logging, analyzing, and sharing evidence of attacks. While classic security benefits from well-established forensics and intelligence sharing, Machine Learning is… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

  15. arXiv:2307.10719  [pdf, other

    cs.AI cs.CL cs.CR cs.LG

    LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?

    Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan

    Abstract: Large language models (LLMs) have exhibited impressive capabilities in comprehending complex instructions. However, their blind adherence to provided instructions has led to concerns regarding risks of malicious use. Existing defence mechanisms, such as model fine-tuning or output censorship using LLMs, have proven to be fallible, as LLMs can still generate problematic responses. Commonly employed… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  16. arXiv:2307.00310  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD

    Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot

    Abstract: Differentially private stochastic gradient descent (DP-SGD) is the canonical approach to private deep learning. While the current privacy analysis of DP-SGD is known to be tight in some settings, several empirical results suggest that models trained on common benchmark datasets leak significantly less privacy for many datapoints. Yet, despite past attempts, a rigorous explanation for why this is t… ▽ More

    Submitted 15 November, 2023; v1 submitted 1 July, 2023; originally announced July 2023.

  17. arXiv:2306.14043  [pdf, other

    cs.LG cs.AI cs.CR

    Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks

    Authors: Pranav Dahiya, Ilia Shumailov, Ross Anderson

    Abstract: Randomness supports many critical functions in the field of machine learning (ML) including optimisation, data selection, privacy, and security. ML systems outsource the task of generating or harvesting randomness to the compiler, the cloud service provider or elsewhere in the toolchain. Yet there is a long history of attackers exploiting poor randomness, or even creating it -- as when the NSA put… ▽ More

    Submitted 10 February, 2024; v1 submitted 24 June, 2023; originally announced June 2023.

    Comments: USENIX Security 2024 (https://www.usenix.org/conference/usenixsecurity24/presentation/dahiya)

  18. arXiv:2306.07033  [pdf, other

    cs.CR cs.LG

    When Vision Fails: Text Attacks Against ViT and OCR

    Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot

    Abstract: While text-based machine learning models that operate on visual inputs of rendered text have become robust against a wide range of existing attacks, we show that they are still vulnerable to visual adversarial examples encoded as text. We use the Unicode functionality of combining diacritical marks to manipulate encoded text so that small visual perturbations appear when the text is rendered. We s… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

  19. arXiv:2305.17493  [pdf, other

    cs.LG cs.AI cs.CL cs.CR cs.CV

    The Curse of Recursion: Training on Generated Data Makes Models Forget

    Authors: Ilia Shumailov, Zakhar Shumaylov, Yiren Zhao, Yarin Gal, Nicolas Papernot, Ross Anderson

    Abstract: Stable Diffusion revolutionised image creation from descriptive text. GPT-2, GPT-3(.5) and GPT-4 demonstrated astonishing performance across a variety of language tasks. ChatGPT introduced such language models to the general public. It is now clear that large language models (LLMs) are here to stay, and will bring about drastic change in the whole ecosystem of online text and images. In this paper… ▽ More

    Submitted 14 April, 2024; v1 submitted 27 May, 2023; originally announced May 2023.

    Comments: Fixed typos in eqn 4,5

  20. Boosting Big Brother: Attacking Search Engines with Encodings

    Authors: Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross Anderson, Mauro Conti

    Abstract: Search engines are vulnerable to attacks against indexing and searching via text encoding manipulation. By imperceptibly perturbing text using uncommon encoded representations, adversaries can control results across search engines for specific search queries. We demonstrate that this attack is successful against two major commercial search engines - Google and Bing - and one open source search eng… ▽ More

    Submitted 27 July, 2023; v1 submitted 27 April, 2023; originally announced April 2023.

    Comments: To appear in the 26th Symposium on Research in Attacks, Intrusions and Defenses (RAID). Revisions: Adds table summarizing attacks

  21. arXiv:2304.03609  [pdf, other

    cs.CL cs.LG

    Revisiting Automated Prompting: Are We Actually Doing Better?

    Authors: Yulin Zhou, Yiren Zhao, Ilia Shumailov, Robert Mullins, Yarin Gal

    Abstract: Current literature demonstrates that Large Language Models (LLMs) are great few-shot learners, and prompting significantly increases their performance on a range of downstream tasks in a few-shot learning setting. An attempt to automate human-led prompting followed, with some progress achieved. In particular, subsequent work demonstrates automation can outperform fine-tuning in certain K-shot lear… ▽ More

    Submitted 22 June, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

  22. arXiv:2301.04017  [pdf, other

    cs.CR cs.LG

    Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation

    Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot

    Abstract: Federated learning (FL) is a framework for users to jointly train a machine learning model. FL is promoted as a privacy-enhancing technology (PET) that provides data minimization: data never "leaves" personal devices and users share only model updates with a server (e.g., a company) coordinating the distributed training. While prior work showed that in vanilla FL a malicious server can extract use… ▽ More

    Submitted 12 April, 2023; v1 submitted 9 January, 2023; originally announced January 2023.

  23. arXiv:2210.00641  [pdf, other

    cs.LG

    DARTFormer: Finding The Best Type Of Attention

    Authors: Jason Ross Brown, Yiren Zhao, Ilia Shumailov, Robert D Mullins

    Abstract: Given the wide and ever growing range of different efficient Transformer attention mechanisms, it is important to identify which attention is most effective when given a task. In this work, we are also interested in combining different attention types to build heterogeneous Transformers. We first propose a DARTS-like Neural Architecture Search (NAS) method to find the best attention for a given ta… ▽ More

    Submitted 2 October, 2022; originally announced October 2022.

    ACM Class: I.2.7; I.2.6

  24. arXiv:2210.00640  [pdf, other

    cs.LG

    Wide Attention Is The Way Forward For Transformers?

    Authors: Jason Ross Brown, Yiren Zhao, Ilia Shumailov, Robert D Mullins

    Abstract: The Transformer is an extremely powerful and prominent deep learning architecture. In this work, we challenge the commonly held belief in deep learning that going deeper is better, and show an alternative design approach that is building wider attention Transformers. We demonstrate that wide single layer Transformer models can compete with or outperform deeper ones in a variety of Natural Language… ▽ More

    Submitted 8 November, 2022; v1 submitted 2 October, 2022; originally announced October 2022.

    ACM Class: I.2.7

  25. ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks

    Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins

    Abstract: Early backdoor attacks against machine learning set off an arms race in attack and defence development. Defences have since appeared demonstrating some ability to detect backdoors in models or even remove them. These defences work by inspecting the training data, the model, or the integrity of the training procedure. In this work, we show that backdoors can be added during compilation, circumven… ▽ More

    Submitted 1 March, 2024; v1 submitted 30 September, 2022; originally announced October 2022.

    Comments: 10 pages, 7 figures, to be published in IEEE Secure and Trustworthy Machine Learning 2024. For website see https://ml.backdoors.uk . For source code, see https://sr.ht/~ecc/ImpNet

  26. arXiv:2209.15139  [pdf, other

    cs.LG cs.CR

    Augmentation Backdoors

    Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins

    Abstract: Data augmentation is used extensively to improve model generalisation. However, reliance on external libraries to implement augmentation methods introduces a vulnerability into the machine learning pipeline. It is well known that backdoors can be inserted into machine learning models through serving a modified dataset to train on. Augmentation therefore presents a perfect opportunity to perform th… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: 12 pages, 8 figures

  27. arXiv:2209.10732  [pdf, other

    cs.LG cs.CR

    In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning

    Authors: Jiaqi Wang, Roei Schuster, Ilia Shumailov, David Lie, Nicolas Papernot

    Abstract: When learning from sensitive data, care must be taken to ensure that training algorithms address privacy concerns. The canonical Private Aggregation of Teacher Ensembles, or PATE, computes output labels by aggregating the predictions of a (possibly distributed) collection of teacher models via a voting mechanism. The mechanism adds noise to attain a differential privacy guarantee with respect to t… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: To appear at NeurIPS 2022

  28. arXiv:2207.00694  [pdf, other

    cs.LG

    Efficient Adversarial Training With Data Pruning

    Authors: Maximilian Kaufmann, Yiren Zhao, Ilia Shumailov, Robert Mullins, Nicolas Papernot

    Abstract: Neural networks are susceptible to adversarial examples-small input perturbations that cause models to fail. Adversarial training is one of the solutions that stops adversarial examples; models are exposed to attacks during training and learn to be resilient to them. Yet, such a procedure is currently expensive-it takes a long time to produce and train models with adversarial samples, and, what is… ▽ More

    Submitted 1 July, 2022; originally announced July 2022.

  29. arXiv:2206.09491  [pdf, other

    cs.LG cs.CR

    On the Limitations of Stochastic Pre-processing Defenses

    Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz, Nicolas Papernot

    Abstract: Defending against adversarial examples remains an open problem. A common belief is that randomness at inference increases the cost of finding adversarial inputs. An example of such a defense is to apply a random transformation to inputs prior to feeding them to the model. In this paper, we empirically and theoretically investigate such stochastic pre-processing defenses and demonstrate that they a… ▽ More

    Submitted 11 October, 2022; v1 submitted 19 June, 2022; originally announced June 2022.

    Comments: Accepted by Proceedings of the 36th Conference on Neural Information Processing Systems

  30. arXiv:2206.07840  [pdf, other

    cs.LG cs.CR

    Architectural Backdoors in Neural Networks

    Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot

    Abstract: Machine learning is vulnerable to adversarial manipulation. Previous literature has demonstrated that at the training stage attackers can manipulate data and data sampling procedures to control model behaviour. A common attack goal is to plant backdoors i.e. force the victim model to learn to recognise a trigger known only by the adversary. In this paper, we introduce a new class of backdoor attac… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

  31. arXiv:2202.12232  [pdf, other

    cs.LG

    Bounding Membership Inference

    Authors: Anvith Thudi, Ilia Shumailov, Franziska Boenisch, Nicolas Papernot

    Abstract: Differential Privacy (DP) is the de facto standard for reasoning about the privacy guarantees of a training algorithm. Despite the empirical observation that DP reduces the vulnerability of models to existing membership inference (MI) attacks, a theoretical underpinning as to why this is the case is largely missing in the literature. In practice, this means that models need to be trained with DP g… ▽ More

    Submitted 17 December, 2022; v1 submitted 24 February, 2022; originally announced February 2022.

  32. arXiv:2202.04392  [pdf, other

    cs.LG cs.AI

    Model Architecture Adaption for Bayesian Neural Networks

    Authors: Duo Wang, Yiren Zhao, Ilia Shumailov, Robert Mullins

    Abstract: Bayesian Neural Networks (BNNs) offer a mathematically grounded framework to quantify the uncertainty of model predictions but come with a prohibitive computation cost for both training and inference. In this work, we show a novel network architecture search (NAS) that optimizes BNNs for both accuracy and uncertainty while having a reduced inference latency. Different from canonical NAS that optim… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

  33. arXiv:2202.02751  [pdf, other

    cs.LG cs.CR cs.SD eess.AS

    Tubes Among Us: Analog Attack on Automatic Speaker Identification

    Authors: Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz

    Abstract: Recent years have seen a surge in the popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be vulnerable to adversarial examples. A large number of modern systems protect themselves against such attacks by targeting artificiality, i.e., they deploy mechanisms to detect the lack of human involvement in generating the adversarial examples.… ▽ More

    Submitted 27 May, 2023; v1 submitted 6 February, 2022; originally announced February 2022.

    Comments: Published at USENIX Security 2023 https://www.usenix.org/conference/usenixsecurity23/presentation/ahmed

  34. arXiv:2112.02918  [pdf, other

    cs.LG cs.CR cs.DC

    When the Curious Abandon Honesty: Federated Learning Is Not Private

    Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot

    Abstract: In federated learning (FL), data does not leave personal devices when they are jointly training a machine learning model. Instead, these devices share gradients, parameters, or other model updates, with a central party (e.g., a company) coordinating the training. Because data never "leaves" personal devices, FL is often presented as privacy-preserving. Yet, recently it was shown that this protecti… ▽ More

    Submitted 12 April, 2023; v1 submitted 6 December, 2021; originally announced December 2021.

  35. arXiv:2111.04479  [pdf, other

    cs.SI cs.CY

    ExtremeBB: A Database for Large-Scale Research into Online Hate, Harassment, the Manosphere and Extremism

    Authors: Anh V. Vu, Lydia Wilson, Yi Ting Chua, Ilia Shumailov, Ross Anderson

    Abstract: We introduce ExtremeBB, a textual database of over 53.5M posts made by 38.5k users on 12 extremist bulletin board forums promoting online hate, harassment, the manosphere and other forms of extremism. It enables large-scale analyses of qualitative and quantitative historical trends going back two decades: measuring hate speech and toxicity; tracing the evolution of different strands of extremist i… ▽ More

    Submitted 20 August, 2023; v1 submitted 8 November, 2021; originally announced November 2021.

  36. arXiv:2110.11891  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning

    Authors: Anvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot

    Abstract: Machine unlearning, i.e. having a model forget about some of its training data, has become increasingly more important as privacy legislation promotes variants of the right-to-be-forgotten. In the context of deep learning, approaches for machine unlearning are broadly categorized into two classes: exact unlearning methods, where an entity has formally removed the data point's impact on the model b… ▽ More

    Submitted 19 February, 2022; v1 submitted 22 October, 2021; originally announced October 2021.

    Comments: published in 31st USENIX Security Symposium

  37. arXiv:2109.04925  [pdf, other

    cs.LG

    Rapid Model Architecture Adaption for Meta-Learning

    Authors: Yiren Zhao, Xitong Gao, Ilia Shumailov, Nicolo Fusi, Robert Mullins

    Abstract: Network Architecture Search (NAS) methods have recently gathered much attention. They design networks with better performance and use a much shorter search time compared to traditional manual tuning. Despite their efficiency in model deployments, most NAS algorithms target a single task on a fixed hardware system. However, real-life few-shot learning environments often cover a great number of task… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

  38. arXiv:2106.09898  [pdf, other

    cs.CL cs.CR cs.LG

    Bad Characters: Imperceptible NLP Attacks

    Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot

    Abstract: Several years of research have shown that machine-learning systems are vulnerable to adversarial examples, both in theory and in practice. Until now, such attacks have primarily targeted visual models, exploiting the gap between human and machine perception. Although text-based models have also been attacked with adversarial examples, such attacks struggled to preserve semantic meaning and indisti… ▽ More

    Submitted 10 December, 2021; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: To appear in the 43rd IEEE Symposium on Security and Privacy. Revisions: NER & sentiment analysis experiments, previous work comparison, defense evaluation

  39. arXiv:2106.00660  [pdf, other

    cs.LG cs.AI cs.CR cs.CV cs.CY

    Markpainting: Adversarial Machine Learning meets Inpainting

    Authors: David Khachaturov, Ilia Shumailov, Yiren Zhao, Nicolas Papernot, Ross Anderson

    Abstract: Inpainting is a learned interpolation technique that is based on generative modeling and used to populate masked or missing pieces in an image; it has wide applications in picture editing and retouching. Recently, inpainting started being used for watermark removal, raising concerns. In this paper we study how to manipulate it using our markpainting technique. First, we show how an image owner wit… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Proceedings of the 38th International Conference on Machine Learning (ICML 2021)

  40. arXiv:2104.09667  [pdf, other

    cs.LG cs.AI cs.CR cs.CV

    Manipulating SGD with Data Ordering Attacks

    Authors: Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A. Erdogdu, Ross Anderson

    Abstract: Machine learning is vulnerable to a wide variety of attacks. It is now well understood that by changing the underlying data distribution, an adversary can poison the model trained with it or introduce backdoors. In this paper we present a novel class of training-time attacks that require no changes to the underlying dataset or model architecture, but instead only change the order in which data are… ▽ More

    Submitted 5 June, 2021; v1 submitted 19 April, 2021; originally announced April 2021.

  41. arXiv:2104.08690  [pdf, other

    cs.LG cs.CR

    Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

    Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz

    Abstract: As real-world images come in varying sizes, the machine learning model is part of a larger system that includes an upstream image scaling algorithm. In this paper, we investigate the interplay between vulnerabilities of the image scaling procedure and machine learning models in the decision-based black-box setting. We propose a novel sampling strategy to make a black-box attack exploit vulnerabili… ▽ More

    Submitted 19 June, 2022; v1 submitted 17 April, 2021; originally announced April 2021.

    Comments: Accepted by Proceedings of the 39th International Conference on Machine Learning

  42. arXiv:2012.00687  [pdf, other

    cs.CR cs.LG

    Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant

    Authors: Almos Zarandy, Ilia Shumailov, Ross Anderson

    Abstract: Voice assistants are now ubiquitous and listen in on our everyday lives. Ever since they became commercially available, privacy advocates worried that the data they collect can be abused: might private conversations be extracted by third parties? In this paper we show that privacy threats go beyond spoken conversations and include sensitive data typed on nearby smartphones. Using two different sma… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

  43. arXiv:2011.11637  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Nudge Attacks on Point-Cloud DNNs

    Authors: Yiren Zhao, Ilia Shumailov, Robert Mullins, Ross Anderson

    Abstract: The wide adaption of 3D point-cloud data in safety-critical applications such as autonomous driving makes adversarial samples a real threat. Existing adversarial attacks on point clouds achieve high success rates but modify a large number of points, which is usually difficult to do in real-life scenarios. In this paper, we explore a family of attacks that only perturb a few points of an input poin… ▽ More

    Submitted 22 November, 2020; originally announced November 2020.

  44. arXiv:2008.09194  [pdf, other

    cs.LG cs.CR cs.CV cs.CY

    On Attribution of Deepfakes

    Authors: Baiwu Zhang, ** Peng Zhou, Ilia Shumailov, Nicolas Papernot

    Abstract: Progress in generative modelling, especially generative adversarial networks, have made it possible to efficiently synthesize and alter media at scale. Malicious individuals now rely on these machine-generated media, or deepfakes, to manipulate social discourse. In order to ensure media authenticity, existing research is focused on deepfake detection. Yet, the adversarial nature of frameworks used… ▽ More

    Submitted 3 March, 2021; v1 submitted 20 August, 2020; originally announced August 2020.

  45. arXiv:2008.00136  [pdf, other

    cs.CR cs.CY cs.NI cs.SD

    BatNet: Data transmission between smartphones over ultrasound

    Authors: Almos Zarandy, Ilia Shumailov, Ross Anderson

    Abstract: In this paper, we present BatNet, a data transmission mechanism using ultrasound signals over the built-in speakers and microphones of smartphones. Using phase shift keying with an 8-point constellation and frequencies between 20--24kHz, it can transmit data at over 600bit/s up to 6m. The target application is a censorship-resistant mesh network. We also evaluated it for Covid contact tracing but… ▽ More

    Submitted 31 July, 2020; originally announced August 2020.

  46. arXiv:2006.14407  [pdf, other

    cs.CY cs.GT cs.SI

    Snitches Get Stitches: On The Difficulty of Whistleblowing

    Authors: Mansoor Ahmed-Rengers, Ross Anderson, Darija Halatova, Ilia Shumailov

    Abstract: One of the most critical security protocol problems for humans is when you are betraying a trust, perhaps for some higher purpose, and the world can turn against you if you're caught. In this short paper, we report on efforts to enable whistleblowers to leak sensitive documents to journalists more safely. Following a survey of cases where whistleblowers were discovered due to operational or techno… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  47. arXiv:2006.03463  [pdf, other

    cs.LG cs.CL cs.CR stat.ML

    Sponge Examples: Energy-Latency Attacks on Neural Networks

    Authors: Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson

    Abstract: The high energy costs of neural network training and inference led to the use of acceleration hardware such as GPUs and TPUs. While this enabled us to train large-scale neural networks in datacenters and deploy them on edge devices, the focus so far is on average-case performance. In this work, we introduce a novel threat vector against neural networks whose energy consumption or decision latency… ▽ More

    Submitted 12 May, 2021; v1 submitted 5 June, 2020; originally announced June 2020.

    Comments: Accepted at 6th IEEE European Symposium on Security and Privacy (EuroS&P)

  48. arXiv:2002.08740  [pdf, other

    cs.LG cs.CR stat.ML

    Towards Certifiable Adversarial Sample Detection

    Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson

    Abstract: Convolutional Neural Networks (CNNs) are deployed in more and more classification systems, but adversarial samples can be maliciously crafted to trick them, and are becoming a real threat. There have been various proposals to improve CNNs' adversarial robustness but these all suffer performance penalties or other limitations. In this paper, we provide a new approach in the form of a certifiable ad… ▽ More

    Submitted 20 February, 2020; originally announced February 2020.

  49. arXiv:1909.02918  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information

    Authors: Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert Mullins, Ross Anderson

    Abstract: Recent research on reinforcement learning (RL) has suggested that trained agents are vulnerable to maliciously crafted adversarial samples. In this work, we show how such samples can be generalised from White-box and Grey-box attacks to a strong Black-box case, where the attacker has no knowledge of the agents, their training parameters and their training methods. We use sequence-to-sequence model… ▽ More

    Submitted 21 November, 2019; v1 submitted 6 September, 2019; originally announced September 2019.

  50. arXiv:1903.11137  [pdf, other

    cs.CR cs.AI

    Hearing your touch: A new acoustic side channel on smartphones

    Authors: Ilia Shumailov, Laurent Simon, Jeff Yan, Ross Anderson

    Abstract: We present the first acoustic side-channel attack that recovers what users type on the virtual keyboard of their touch-screen smartphone or tablet. When a user taps the screen with a finger, the tap generates a sound wave that propagates on the screen surface and in the air. We found the device's microphone(s) can recover this wave and "hear" the finger's touch, and the wave's distortions are char… ▽ More

    Submitted 26 March, 2019; originally announced March 2019.

    Comments: Paper built on the MPhil thesis of Ilia Shumailov. 2017