Skip to main content

Showing 1–5 of 5 results for author: Atli, B G

.
  1. arXiv:2008.07298  [pdf, other

    cs.CR cs.DC cs.LG stat.ML

    WAFFLE: Watermarking in Federated Learning

    Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan

    Abstract: Federated learning is a distributed learning technique where machine learning models are trained on client devices in which the local training data resides. The training is coordinated via a central server which is, typically, controlled by the intended owner of the resulting model. By avoiding the need to transport the training data to the central server, federated learning improves privacy and e… ▽ More

    Submitted 22 July, 2021; v1 submitted 17 August, 2020; originally announced August 2020.

    Comments: Will appear in the proceedings of SRDS 2021; 14 pages, 11 figures, 10 tables

  2. arXiv:1910.05429  [pdf, other

    cs.LG cs.CR stat.ML

    Extraction of Complex DNN Models: Real Threat or Boogeyman?

    Authors: Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan

    Abstract: Recently, machine learning (ML) has introduced advanced solutions to many domains. Since ML models provide business advantage to model owners, protecting intellectual property of ML models has emerged as an important consideration. Confidentiality of ML models can be protected by exposing them to clients only via prediction APIs. However, model extraction attacks can steal the functionality of ML… ▽ More

    Submitted 27 May, 2020; v1 submitted 11 October, 2019; originally announced October 2019.

    Comments: 16 pages, 1 figure, Accepted for publication in AAAI-20 Workshop on Engineering Dependable and Secure Machine Learning Systems (AAAI-EDSMLS 2020)

  3. arXiv:1906.03397  [pdf, other

    cs.LG cs.CR stat.ML

    Making targeted black-box evasion attacks effective and efficient

    Authors: Mika Juuti, Buse Gul Atli, N. Asokan

    Abstract: We investigate how an adversary can optimally use its query budget for targeted evasion attacks against deep neural networks in a black-box setting. We formalize the problem setting and systematically evaluate what benefits the adversary can gain by using substitute models. We show that there is an exploration-exploitation tradeoff in that query efficiency comes at the cost of effectiveness. We pr… ▽ More

    Submitted 8 June, 2019; originally announced June 2019.

    Comments: 12 pages, 10 figures

    Journal ref: AISec 2019: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security

  4. arXiv:1906.00830  [pdf, other

    cs.CR stat.ML

    DAWN: Dynamic Adversarial Watermarking of Neural Networks

    Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan

    Abstract: Training machine learning (ML) models is expensive in terms of computational power, amounts of labeled data and human expertise. Thus, ML models constitute intellectual property (IP) and business value for their owners. Embedding digital watermarks during model training allows a model owner to later identify their models in case of theft or misuse. However, model functionality can also be stolen v… ▽ More

    Submitted 16 July, 2021; v1 submitted 3 June, 2019; originally announced June 2019.

    Comments: Shorter version of this work to appear in Proceedings of the ACM Multimedia 2021; 16 pages, 3 figures

  5. arXiv:1803.00530  [pdf, other

    cs.CR cs.LG cs.NI stat.ML

    Online Feature Ranking for Intrusion Detection Systems

    Authors: Buse Gul Atli, Alexander Jung

    Abstract: Many current approaches to the design of intrusion detection systems apply feature selection in a static, non-adaptive fashion. These methods often neglect the dynamic nature of network data which requires to use adaptive feature selection techniques. In this paper, we present a simple technique based on incremental learning of support vector machines in order to rank the features in real time wit… ▽ More

    Submitted 15 June, 2018; v1 submitted 1 March, 2018; originally announced March 2018.

    Comments: Feature selection, streaming data, SVM, SGD, intrusion detection