Skip to main content

Showing 1–29 of 29 results for author: Alouani, I

.
  1. arXiv:2503.21793  [pdf, other

    cs.NE cs.AI

    Input-Triggered Hardware Trojan Attack on Spiking Neural Networks

    Authors: Spyridon Raptis, Paul Kling, Ioannis Kaskampas, Ihsen Alouani, Haralampos-G. Stratigopoulos

    Abstract: Neuromorphic computing based on spiking neural networks (SNNs) is emerging as a promising alternative to traditional artificial neural networks (ANNs), offering unique advantages in terms of low power consumption. However, the security aspect of SNNs is under-explored compared to their ANN counterparts. As the increasing reliance on AI systems comes with unique security risks and challenges, under… ▽ More

    Submitted 20 March, 2025; originally announced March 2025.

  2. arXiv:2503.02986  [pdf, other

    cs.CR

    Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis

    Authors: Jeonghwan Park, Niall McLaughlin, Ihsen Alouani

    Abstract: Adversarial attacks remain a significant threat that can jeopardize the integrity of Machine Learning (ML) models. In particular, query-based black-box attacks can generate malicious noise without having access to the victim model's architecture, making them practical in real-world contexts. The community has proposed several defenses against adversarial attacks, only to be broken by more advanced… ▽ More

    Submitted 16 March, 2025; v1 submitted 4 March, 2025; originally announced March 2025.

    Comments: 14 pages

    Journal ref: IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

  3. arXiv:2502.15334  [pdf, other

    cs.CR cs.AI cs.LG

    Attention Eclipse: Manipulating Attention to Bypass LLM Safety-Alignment

    Authors: Pedram Zaree, Md Abdullah Al Mamun, Quazi Mishkatul Alam, Yue Dong, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: Recent research has shown that carefully crafted jailbreak inputs can induce large language models to produce harmful outputs, despite safety measures such as alignment. It is important to anticipate the range of potential Jailbreak attacks to guide effective defenses and accurate assessment of model safety. In this paper, we present a new approach for generating highly effective Jailbreak attacks… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

  4. arXiv:2411.06613  [pdf, other

    cs.LG cs.CR cs.NE

    Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study

    Authors: Ayana Moshruba, Ihsen Alouani, Maryam Parsa

    Abstract: While machine learning (ML) models are becoming mainstream, especially in sensitive application areas, the risk of data leakage has become a growing concern. Attacks like membership inference (MIA) have shown that trained models can reveal sensitive data, jeopardizing confidentiality. While traditional Artificial Neural Networks (ANNs) dominate ML applications, neuromorphic architectures, specific… ▽ More

    Submitted 21 February, 2025; v1 submitted 10 November, 2024; originally announced November 2024.

  5. arXiv:2406.01708  [pdf, other

    cs.CR cs.CV cs.LG

    SnatchML: Hijacking ML models without Training Access

    Authors: Mahmoud Ghorbel, Halima Bouzidi, Ioan Marius Bilasco, Ihsen Alouani

    Abstract: Model hijacking can cause significant accountability and security risks since the owner of a hijacked model can be framed for having their model offer illegal or unethical services. Prior works consider model hijacking as a training time attack, whereby an adversary requires full access to the ML model training. In this paper, we consider a stronger threat model for an inference-time hijacking att… ▽ More

    Submitted 14 April, 2025; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: 17 pages, 14 figures, 7 tables

  6. Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks

    Authors: Hamed Poursiami, Ihsen Alouani, Maryam Parsa

    Abstract: As spiking neural networks (SNNs) gain traction in deploying neuromorphic computing solutions, protecting their intellectual property (IP) has become crucial. Without adequate safeguards, proprietary SNN architectures are at risk of theft, replication, or misuse, which could lead to significant financial losses for the owners. While IP protection techniques have been extensively explored for artif… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 7 pages, 7 figures

    Journal ref: 2024 International Conference on Neuromorphic Systems (ICONS), 2024, pp. 287-294

  7. arXiv:2403.11515  [pdf, other

    cs.CV cs.RO

    SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Bassem Ouni, Muhammad Shafique

    Abstract: Monocular depth estimation (MDE) has advanced significantly, primarily through the integration of convolutional neural networks (CNNs) and more recently, Transformers. However, concerns about their susceptibility to adversarial attacks have emerged, especially in safety-critical domains like autonomous driving and robotic navigation. Existing approaches for assessing CNN-based depth prediction met… ▽ More

    Submitted 5 August, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: text overlap with arXiv:2303.01351

  8. BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks

    Authors: Hamed Poursiami, Ihsen Alouani, Maryam Parsa

    Abstract: With the mainstream integration of machine learning into security-sensitive domains such as healthcare and finance, concerns about data privacy have intensified. Conventional artificial neural networks (ANNs) have been found vulnerable to several attacks that can leak sensitive data. Particularly, model inversion (MI) attacks enable the reconstruction of data samples that have been used to train t… ▽ More

    Submitted 7 May, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

    Comments: 7 pages, 4 figures, 4 tables

    Journal ref: 2024 International Conference on Machine Learning and Applications (ICMLA), 2024, pp. 705-712

  9. arXiv:2401.02342  [pdf, other

    cs.CR cs.AR cs.LG

    Evasive Hardware Trojan through Adversarial Power Trace

    Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani

    Abstract: The globalization of the Integrated Circuit (IC) supply chain, driven by time-to-market and cost considerations, has made ICs vulnerable to hardware Trojans (HTs). Against this threat, a promising approach is to use Machine Learning (ML)-based side-channel analysis, which has the advantage of being a non-intrusive method, along with efficiently detecting HTs under golden chip-free settings. In thi… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

  10. arXiv:2312.08877  [pdf, other

    cs.LG cs.CR cs.CV

    May the Noise be with you: Adversarial Training without Adversarial Examples

    Authors: Ayoub Arous, Andres F Lopez-Lopera, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: In this paper, we investigate the following question: Can we obtain adversarially-trained models without training on adversarial examples? Our intuition is that training a model with inherent stochasticity, i.e., optimizing the parameters by minimizing a stochastic loss function, yields a robust expectation function that is non-stochastic. In contrast to related methods that introduce noise at the… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  11. arXiv:2312.00173  [pdf, other

    cs.CV cs.CR

    Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

    Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Adversarial patches exemplify the tangible manifestation of the threat posed by adversarial attacks on Machine Learning (ML) models in real-world scenarios. Robustness against these attacks is of the utmost importance when designing computer vision applications, especially for safety-critical domains such as CCTV systems. In most practical situations, monitoring open spaces requires multi-view sys… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

  12. arXiv:2311.12914  [pdf, other

    cs.CV cs.CR

    Attention Deficit is Ordered! Fooling Deformable Vision Transformers with Collaborative Adversarial Patches

    Authors: Quazi Mishkatul Alam, Bilel Tarchoun, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: The latest generation of transformer-based vision models has proven to be superior to Convolutional Neural Network (CNN)-based models across several vision tasks, largely attributed to their remarkable prowess in relation modeling. Deformable vision transformers significantly reduce the quadratic complexity of attention modeling by using sparse attention structures, enabling them to incorporate fe… ▽ More

    Submitted 25 December, 2023; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: 12 pages, 14 figures

    ACM Class: I.4

  13. arXiv:2307.08811  [pdf, other

    cs.LG cs.IT

    Co(ve)rtex: ML Models as storage channels and their (mis-)applications

    Authors: Md Abdullah Al Mamun, Quazi Mishkatul Alam, Erfan Shayegani, Pedram Zaree, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: Machine learning (ML) models are overparameterized to support generality and avoid overfitting. The state of these parameters is essentially a "don't-care" with respect to the primary model provided that this state does not interfere with the primary model. In both hardware and software systems, don't-care states and undefined behavior have been shown to be sources of significant vulnerabilities.… ▽ More

    Submitted 11 May, 2024; v1 submitted 17 July, 2023; originally announced July 2023.

  14. arXiv:2305.11618  [pdf, other

    cs.CR cs.CV

    DAP: A Dynamic Adversarial Patch for Evading Person Detectors

    Authors: Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Patch-based adversarial attacks were proven to compromise the robustness and reliability of computer vision systems. However, their conspicuous and easily detectable nature challenge their practicality in real-world setting. To address this, recent work has proposed using Generative Adversarial Networks (GANs) to generate naturalistic patches that may not attract human attention. However, such app… ▽ More

    Submitted 20 November, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

  15. arXiv:2304.10029  [pdf, other

    cs.CR cs.CV cs.LG

    Jedi: Entropy-based Localization and Removal of Adversarial Patches

    Authors: Bilel Tarchoun, Anouar Ben Khalifa, Mohamed Ali Mahjoub, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Real-world adversarial physical patches were shown to be successful in compromising state-of-the-art models in a variety of computer vision applications. Existing defenses that are based on either input gradient or features analysis have been compromised by recent GAN-based attacks that generate naturalistic patches. In this paper, we propose Jedi, a new defense against adversarial patches that is… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: 9 pages, 11 figures. To appear in CVPR 2023

  16. arXiv:2303.01819  [pdf, other

    cs.LG cs.CR cs.CV

    Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens

    Authors: Ayoub Arous, Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: Machine Learning (ML) architectures have been applied to several applications that involve sensitive data, where a guarantee of users' data privacy is required. Differentially Private Stochastic Gradient Descent (DPSGD) is the state-of-the-art method to train privacy-preserving models. However, DPSGD comes at a considerable accuracy loss leading to sub-optimal privacy/utility trade-offs. Towards i… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  17. arXiv:2303.01734  [pdf, other

    cs.CV cs.CR

    AdvART: Adversarial Art for Camouflaged Object Detection Attacks

    Authors: Amira Guesmi, Ioan Marius Bilasco, Muhammad Shafique, Ihsen Alouani

    Abstract: Physical adversarial attacks pose a significant practical threat as it deceives deep learning systems operating in the real world by producing prominent and maliciously designed physical perturbations. Emphasizing the evaluation of naturalness is crucial in such attacks, as humans can readily detect and eliminate unnatural manipulations. To overcome this limitation, recent work has proposed levera… ▽ More

    Submitted 9 February, 2024; v1 submitted 3 March, 2023; originally announced March 2023.

  18. arXiv:2303.01351  [pdf, other

    cs.CV cs.RO

    APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation

    Authors: Amira Guesmi, Muhammad Abdullah Hanif, Ihsen Alouani, Muhammad Shafique

    Abstract: In recent times, monocular depth estimation (MDE) has experienced significant advancements in performance, largely attributed to the integration of innovative architectures, i.e., convolutional neural networks (CNNs) and Transformers. Nevertheless, the susceptibility of these models to adversarial attacks has emerged as a noteworthy concern, especially in domains where safety and security are para… ▽ More

    Submitted 5 August, 2024; v1 submitted 2 March, 2023; originally announced March 2023.

  19. arXiv:2211.01182  [pdf, other

    cs.CR

    Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks

    Authors: Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: Machine-learning architectures, such as Convolutional Neural Networks (CNNs) are vulnerable to adversarial attacks: inputs crafted carefully to force the system output to a wrong label. Since machine-learning is being deployed in safety-critical and security-sensitive domains, such attacks may have catastrophic security and safety consequences. In this paper, we propose for the first time to use h… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2006.07700

  20. arXiv:2211.01112  [pdf, other

    cs.CR

    Adversarial Attack on Radar-based Environment Perception Systems

    Authors: Amira Guesmi, Ihsen Alouani

    Abstract: Due to their robustness to degraded capturing conditions, radars are widely used for environment perception, which is a critical task in applications like autonomous vehicles. More specifically, Ultra-Wide Band (UWB) radars are particularly efficient for short range settings as they carry rich information on the environment. Recent UWB-based systems rely on Machine Learning (ML) to exploit the ric… ▽ More

    Submitted 28 November, 2022; v1 submitted 2 November, 2022; originally announced November 2022.

  21. arXiv:2204.09514  [pdf, other

    cs.AR cs.CR cs.CV cs.DC cs.LG

    Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

    Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique

    Abstract: The real-world use cases of Machine Learning (ML) have exploded over the past few years. However, the current computing infrastructure is insufficient to support all real-world applications and scenarios. Apart from high efficiency requirements, modern ML systems are expected to be highly reliable against hardware failures as well as secure against adversarial and IP stealing attacks. Privacy conc… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: Appears at 40th IEEE VLSI Test Symposium (VTS 2022), 14 pages

  22. arXiv:2201.01621  [pdf, other

    cs.CR cs.LG

    ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

    Authors: Amira Guesmi, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Ihsen Alouani

    Abstract: Advances in deep learning have enabled a wide range of promising applications. However, these systems are vulnerable to Adversarial Machine Learning (AML) attacks; adversarially crafted perturbations to their inputs could cause them to misclassify. Several state-of-the-art adversarial attacks have demonstrated that they can reliably fool classifiers making these attacks a significant threat. Adver… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

    Comments: 12 pages

  23. arXiv:2110.04887  [pdf, other

    cs.CR cs.LG

    Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

    Authors: Bilel Tarchoun, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub

    Abstract: While machine learning applications are getting mainstream owing to a demonstrated efficiency in solving complex problems, they suffer from inherent vulnerability to adversarial attacks. Adversarial attacks consist of additive noise to an input which can fool a detector. Recently, successful real-world printable adversarial patches were proven efficient against state-of-the-art neural networks. In… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

    Comments: To appear in the 20th CyberWorlds Conference

  24. arXiv:2107.12873  [pdf, other

    cs.CR cs.AI

    PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

    Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani

    Abstract: In the recent years, Portable Document Format, commonly known as PDF, has become a democratized standard for document exchange and dissemination. This trend has been due to its characteristics such as its flexibility and portability across platforms. The widespread use of PDF has installed a false impression of inherent safety among benign users. However, the characteristics of PDF motivated hacke… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

  25. arXiv:2103.06936  [pdf, other

    cs.CR cs.LG

    Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

    Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh

    Abstract: Machine learning-based hardware malware detectors (HMDs) offer a potential game changing advantage in defending systems against malware. However, HMDs suffer from adversarial attacks, can be effectively reverse-engineered and subsequently be evaded, allowing malware to hide from detection. We address this issue by proposing a novel HMDs (Stochastic-HMDs) through approximate computing, which makes… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Comments: 13 pages, 13 figures

  26. arXiv:2101.01416  [pdf, other

    cs.AR

    An Investigation on Inherent Robustness of Posit Data Representation

    Authors: Ihsen Alouani, Anouar Ben Khalifa, Farhad Merchant, Rainer Leupers

    Abstract: As the dimensions and operating voltages of computer electronics shrink to cope with consumers' demand for higher performance and lower power consumption, circuit sensitivity to soft errors increases dramatically. Recently, a new data-type is proposed in the literature called posit data type. Posit arithmetic has absolute advantages such as higher numerical accuracy, speed, and simpler hardware de… ▽ More

    Submitted 5 January, 2021; originally announced January 2021.

    Comments: To appear in VLSID 2021

  27. arXiv:2012.05321  [pdf, other

    cs.LG

    Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters

    Authors: Rida El-Allami, Alberto Marchisio, Muhammad Shafique, Ihsen Alouani

    Abstract: Deep Learning (DL) algorithms have gained popularity owing to their practical problem-solving capacity. However, they suffer from a serious integrity threat, i.e., their vulnerability to adversarial attacks. In the quest for DL trustworthiness, recent works claimed the inherent robustness of Spiking Neural Networks (SNNs) to these attacks, without considering the variability in their structural sp… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Comments: Accepted for publication at the 24th Design, Automation and Test in Europe (DATE'21), February, 2021

  28. Defensive Approximation: Securing CNNs using Approximate Computing

    Authors: Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh

    Abstract: In the past few years, an increasing number of machine-learning and deep learning structures, such as Convolutional Neural Networks (CNNs), have been applied to solving a wide range of real-life problems. However, these architectures are vulnerable to adversarial attacks. In this paper, we propose for the first time to use hardware-supported approximate computing to improve the robustness of machi… ▽ More

    Submitted 29 July, 2021; v1 submitted 13 June, 2020; originally announced June 2020.

    Comments: ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2021)

  29. NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips

    Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique

    Abstract: Due to their proven efficiency, machine-learning systems are deployed in a wide range of complex real-life problems. More specifically, Spiking Neural Networks (SNNs) emerged as a promising solution to the accuracy, resource-utilization, and energy-efficiency challenges in machine-learning systems. While these systems are going mainstream, they have inherent security and reliability issues. In thi… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: Accepted for publication at the 2020 International Joint Conference on Neural Networks (IJCNN)