Skip to main content

Showing 1–8 of 8 results for author: Kireev, K

.
  1. arXiv:2406.08084  [pdf, other

    cs.SI cs.CR

    Characterizing and Detecting Propaganda-Spreading Accounts on Telegram

    Authors: Klim Kireev, Yevhen Mykhno, Carmela Troncoso, Rebekah Overdorf

    Abstract: Information-based attacks on social media, such as disinformation campaigns and propaganda, are emerging cybersecurity threats. The security community has focused on countering these threats on social media platforms like X and Reddit. However, they also appear in instant-messaging social media platforms such as WhatsApp, Telegram, and Signal. In these platforms information-based attacks primarily… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  2. arXiv:2306.04064  [pdf, other

    cs.LG

    Transferable Adversarial Robustness for Categorical Data via Universal Robust Embeddings

    Authors: Klim Kireev, Maksym Andriushchenko, Carmela Troncoso, Nicolas Flammarion

    Abstract: Research on adversarial robustness is primarily focused on image and text data. Yet, many scenarios in which lack of robustness can result in serious risks, such as fraud detection, medical diagnosis, or recommender systems often do not rely on images or text but instead on tabular data. Adversarial robustness in tabular data poses two serious challenges. First, tabular datasets often contain cate… ▽ More

    Submitted 13 December, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

  3. arXiv:2208.13058  [pdf, other

    cs.LG cs.CR

    Adversarial Robustness for Tabular Data through Cost and Utility Awareness

    Authors: Klim Kireev, Bogdan Kulynych, Carmela Troncoso

    Abstract: Many safety-critical applications of machine learning, such as fraud or abuse detection, use data in tabular domains. Adversarial examples can be particularly damaging for these applications. Yet, existing works on adversarial robustness primarily focus on machine-learning models in image and text domains. We argue that, due to the differences between tabular data and images or text, existing thre… ▽ More

    Submitted 24 February, 2023; v1 submitted 27 August, 2022; originally announced August 2022.

    Comments: The first two authors contributed equally. To appear in the proceedings of NDSS 2023

  4. arXiv:2106.14290  [pdf, other

    cs.CV

    Darker than Black-Box: Face Reconstruction from Similarity Queries

    Authors: Anton Razzhigaev, Klim Kireev, Igor Udovichenko, Aleksandr Petiushko

    Abstract: Several methods for inversion of face recognition models were recently presented, attempting to reconstruct a face from deep templates. Although some of these approaches work in a black-box setup using only face embeddings, usually, on the end-user side, only similarity scores are provided. Therefore, these algorithms are inapplicable in such scenarios. We propose a novel approach that allows reco… ▽ More

    Submitted 2 July, 2021; v1 submitted 27 June, 2021; originally announced June 2021.

  5. arXiv:2103.02325  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    On the effectiveness of adversarial training against common corruptions

    Authors: Klim Kireev, Maksym Andriushchenko, Nicolas Flammarion

    Abstract: The literature on robustness towards common corruptions shows no consensus on whether adversarial training can improve the performance in this setting. First, we show that, when used with an appropriately selected perturbation radius, $\ell_p$ adversarial training can serve as a strong baseline against common corruptions improving both accuracy and calibration. Then we explain why adversarial trai… ▽ More

    Submitted 4 January, 2022; v1 submitted 3 March, 2021; originally announced March 2021.

    Comments: New calibration results, more comprehensive experimental evaluation (e.g., new results with AugMix+JSD and DeepAugment)

  6. Black-Box Face Recovery from Identity Features

    Authors: Anton Razzhigaev, Klim Kireev, Edgar Kaziakhmedov, Nurislam Tursynbek, Aleksandr Petiushko

    Abstract: In this work, we present a novel algorithm based on an it-erative sampling of random Gaussian blobs for black-box face recovery, given only an output feature vector of deep face recognition systems. We attack the state-of-the-art face recognition system (ArcFace) to test our algorithm. Another network with different architecture (FaceNet) is used as an independent critic showing that the target pe… ▽ More

    Submitted 30 July, 2020; v1 submitted 27 July, 2020; originally announced July 2020.

    Journal ref: ECCV Workshops (5) 2020: 462-475

  7. On adversarial patches: real-world attack on ArcFace-100 face recognition system

    Authors: Mikhail Pautov, Grigorii Melnikov, Edgar Kaziakhmedov, Klim Kireev, Aleksandr Petiushko

    Abstract: Recent works showed the vulnerability of image classifiers to adversarial attacks in the digital domain. However, the majority of attacks involve adding small perturbation to an image to fool the classifier. Unfortunately, such procedures can not be used to conduct a real-world attack, where adding an adversarial attribute to the photo is a more practical approach. In this paper, we study the prob… ▽ More

    Submitted 1 April, 2020; v1 submitted 15 October, 2019; originally announced October 2019.

    Journal ref: 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)

  8. Real-world adversarial attack on MTCNN face detection system

    Authors: Edgar Kaziakhmedov, Klim Kireev, Grigorii Melnikov, Mikhail Pautov, Aleksandr Petiushko

    Abstract: Recent studies proved that deep learning approaches achieve remarkable results on face detection task. On the other hand, the advances gave rise to a new problem associated with the security of the deep convolutional neural network models unveiling potential risks of DCNNs based applications. Even minor input changes in the digital domain can result in the network being fooled. It was shown then t… ▽ More

    Submitted 2 April, 2020; v1 submitted 14 October, 2019; originally announced October 2019.

    Journal ref: 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)