no code implementations • 27 Apr 2022 • Thulitha Senevirathna, Vinh Hoa La, Samuel Marchal, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang
With the advent of 5G commercialization, the need for more reliable, faster, and intelligent telecommunication systems are envisaged for the next generation beyond 5G (B5G) radio access technologies.
1 code implementation • 16 Jun 2021 • Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan
Via an extensive evaluation using three Atari 2600 games, we show that our attacks are effective, as they fully degrade the performance of three different DRL agents (up to 100%, even when the $l_\infty$ bound on the perturbation is as small as 0. 01).
no code implementations • 1 Jan 2021 • Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni
Recently, federated learning (FL) has been subject to both security and privacy attacks posing a dilemmatic challenge on the underlying algorithmic designs: On the one hand, FL is shown to be vulnerable to backdoor attacks that stealthily manipulate the global model output using malicious model updates, and on the other hand, FL is shown vulnerable to inference attacks by a malicious aggregator inferring information about clients’ data from their model updates.
1 code implementation • 17 Aug 2020 • Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan
In this paper, we present WAFFLE, the first approach to watermark DNN models trained using federated learning.
no code implementations • 11 Oct 2019 • Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan
However, model extraction attacks can steal the functionality of ML models using the information leaked to clients through the results returned via the API.
1 code implementation • 10 Oct 2019 • Samuel Marchal, Sebastian Szyller
Our approach is based on clustering and aims to group together fraudulent orders placed by the same group of fraudsters.
1 code implementation • 3 Jun 2019 • Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan
Existing watermarking schemes are ineffective against IP theft via model extraction since it is the adversary who trains the surrogate model.
2 code implementations • 7 May 2018 • Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan
Access to the model can be restricted to be only via well-defined prediction APIs.
Cryptography and Security
no code implementations • 20 Apr 2018 • Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, N. Asokan, Ahmad-Reza Sadeghi
Consequently, DIoT can cope with the emergence of new device types as well as new attacks.
Cryptography and Security
2 code implementations • 15 Nov 2016 • Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma
In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise.
Cryptography and Security