Skip to main content

Showing 1–12 of 12 results for author: Marchal, S

.
  1. A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions

    Authors: Thulitha Senevirathna, Vinh Hoa La, Samuel Marchal, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang

    Abstract: With the advent of 5G commercialization, the need for more reliable, faster, and intelligent telecommunication systems is envisaged for the next generation beyond 5G (B5G) radio access technologies. Artificial Intelligence (AI) and Machine Learning (ML) are immensely popular in service layer applications and have been proposed as essential enablers in many aspects of 5G and beyond networks, from I… ▽ More

    Submitted 30 September, 2024; v1 submitted 27 April, 2022; originally announced April 2022.

    Comments: 34 pages, 12 Figures

  2. arXiv:2106.08746  [pdf, other

    cs.LG cs.AI cs.CR

    Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses

    Authors: Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan

    Abstract: Deep reinforcement learning (DRL) is vulnerable to adversarial perturbations. Adversaries can mislead the policies of DRL agents by perturbing the state of the environment observed by the agents. Existing attacks are feasible in principle, but face challenges in practice, either by being too slow to fool DRL policies in real time or by modifying past observations stored in the agent's memory. We s… ▽ More

    Submitted 23 September, 2022; v1 submitted 16 June, 2021; originally announced June 2021.

    Comments: Will appear in the proceedings of ESORICS 2022; 13 pages, 6 figures, 6 tables

  3. arXiv:2101.02281  [pdf, other

    cs.CR

    FLAME: Taming Backdoors in Federated Learning (Extended Version 1)

    Authors: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider

    Abstract: Federated Learning (FL) is a collaborative machine learning approach allowing participants to jointly train a model without having to share their private, potentially sensitive local datasets with others. Despite its benefits, FL is vulnerable to backdoor attacks, in which an adversary injects manipulated model updates into the model aggregation process so that the resulting model will provide tar… ▽ More

    Submitted 5 August, 2023; v1 submitted 6 January, 2021; originally announced January 2021.

    Comments: This extended version incorporates a novel section (Section 10) that provides a comprehensive analysis of recent proposed attacks, notably "3DFed: Adaptive and extensible framework for covert backdoor attack in federated learning" by Li et al. This new section addresses flawed assertions made in the papers that aim to bypass FLAME or misinterpreted its fundamental design principles

  4. arXiv:2008.07298  [pdf, other

    cs.CR cs.DC cs.LG stat.ML

    WAFFLE: Watermarking in Federated Learning

    Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan

    Abstract: Federated learning is a distributed learning technique where machine learning models are trained on client devices in which the local training data resides. The training is coordinated via a central server which is, typically, controlled by the intended owner of the resulting model. By avoiding the need to transport the training data to the central server, federated learning improves privacy and e… ▽ More

    Submitted 22 July, 2021; v1 submitted 17 August, 2020; originally announced August 2020.

    Comments: Will appear in the proceedings of SRDS 2021; 14 pages, 11 figures, 10 tables

  5. arXiv:1910.05429  [pdf, other

    cs.LG cs.CR stat.ML

    Extraction of Complex DNN Models: Real Threat or Boogeyman?

    Authors: Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan

    Abstract: Recently, machine learning (ML) has introduced advanced solutions to many domains. Since ML models provide business advantage to model owners, protecting intellectual property of ML models has emerged as an important consideration. Confidentiality of ML models can be protected by exposing them to clients only via prediction APIs. However, model extraction attacks can steal the functionality of ML… ▽ More

    Submitted 27 May, 2020; v1 submitted 11 October, 2019; originally announced October 2019.

    Comments: 16 pages, 1 figure, Accepted for publication in AAAI-20 Workshop on Engineering Dependable and Secure Machine Learning Systems (AAAI-EDSMLS 2020)

  6. arXiv:1910.04514  [pdf, other

    stat.ML cs.CR cs.LG

    Detecting organized eCommerce fraud using scalable categorical clustering

    Authors: Samuel Marchal, Sebastian Szyller

    Abstract: Online retail, eCommerce, frequently falls victim to fraud conducted by malicious customers (fraudsters) who obtain goods or services through deception. Fraud coordinated by groups of professional fraudsters that place several fraudulent orders to maximize their gain is referred to as organized fraud. Existing approaches to fraud detection typically analyze orders in isolation and they are not eff… ▽ More

    Submitted 10 October, 2019; originally announced October 2019.

    Comments: 14 pages, 6 figures, Annual Computer Security Applications Conference (ACSAC 2019)

  7. arXiv:1906.00830  [pdf, other

    cs.CR stat.ML

    DAWN: Dynamic Adversarial Watermarking of Neural Networks

    Authors: Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan

    Abstract: Training machine learning (ML) models is expensive in terms of computational power, amounts of labeled data and human expertise. Thus, ML models constitute intellectual property (IP) and business value for their owners. Embedding digital watermarks during model training allows a model owner to later identify their models in case of theft or misuse. However, model functionality can also be stolen v… ▽ More

    Submitted 16 July, 2021; v1 submitted 3 June, 2019; originally announced June 2019.

    Comments: Shorter version of this work to appear in Proceedings of the ACM Multimedia 2021; 16 pages, 3 figures

  8. arXiv:1805.02628  [pdf, other

    cs.CR

    PRADA: Protecting against DNN Model Stealing Attacks

    Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan

    Abstract: Machine learning (ML) applications are increasingly prevalent. Protecting the confidentiality of ML models becomes paramount for two reasons: (a) a model can be a business advantage to its owner, and (b) an adversary may use a stolen model to find transferable adversarial examples that can evade classification by the original model. Access to the model can be restricted to be only via well-defined… ▽ More

    Submitted 31 March, 2019; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: 17 pages, 7 figures, 9 tables. Accepted for publication in the 4th IEEE European Symposium on Security and Privacy (EuroS&P 2019)

  9. arXiv:1804.07474  [pdf, other

    cs.CR

    DÏoT: A Federated Self-learning Anomaly Detection System for IoT

    Authors: Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi

    Abstract: IoT devices are increasingly deployed in daily life. Many of these devices are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have vulnerable IoT devices that are easy to compromise. This has led to a new category of malware specifically targeting IoT devices. However, existing intrusion detection techniques are not effective in d… ▽ More

    Submitted 10 May, 2019; v1 submitted 20 April, 2018; originally announced April 2018.

    Comments: Accepted version of paper to appear at ICDCS 2019, Dallas, TX, USA, July 2019

    Journal ref: Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS), 2019

  10. arXiv:1703.09745  [pdf, ps, other

    cs.CR

    Profiling Users by Modeling Web Transactions

    Authors: Radek Tomsu, Samuel Marchal, N. Asokan

    Abstract: Users of electronic devices, e.g., laptop, smartphone, etc. have characteristic behaviors while surfing the Web. Profiling this behavior can help identify the person using a given device. In this paper, we introduce a technique to profile users based on their web transactions. We compute several features extracted from a sequence of web transactions and use them with one-class classification techn… ▽ More

    Submitted 3 April, 2017; v1 submitted 28 March, 2017; originally announced March 2017.

    Comments: Extended technical report of an IEEE ICDCS 2017 publication

  11. IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Authors: Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma

    Abstract: With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing… ▽ More

    Submitted 13 December, 2016; v1 submitted 15 November, 2016; originally announced November 2016.

  12. arXiv:1510.06501  [pdf, other

    cs.CR

    Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets

    Authors: Samuel Marchal, Kalle Saari, Nidhi Singh, N. Asokan

    Abstract: Phishing is a major problem on the Web. Despite the significant attention it has received over the years, there has been no definitive solution. While the state-of-the-art solutions have reasonably good performance, they require a large amount of training data and are not adept at detecting phishing attacks against new targets. In this paper, we begin with two core observations: (a) although phish… ▽ More

    Submitted 25 April, 2016; v1 submitted 22 October, 2015; originally announced October 2015.

    Comments: 13 pages