Skip to main content

Showing 1–3 of 3 results for author: Tajalli, B

.
  1. arXiv:2311.07550  [pdf, other

    cs.CR cs.LG

    Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data

    Authors: Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek

    Abstract: Deep Neural Networks (DNNs) have shown great promise in various domains. Alongside these developments, vulnerabilities associated with DNN training, such as backdoor attacks, are a significant concern. These attacks involve the subtle insertion of triggers during model training, allowing for manipulated predictions. More recently, DNNs for tabular data have gained increasing attention due to the r… ▽ More

    Submitted 25 April, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  2. arXiv:2302.09578  [pdf, other

    cs.CR cs.AI

    On Feasibility of Server-side Backdoor Attacks on Split Learning

    Authors: Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek

    Abstract: Split learning is a collaborative learning design that allows several participants (clients) to train a shared model while keeping their datasets private. Recent studies demonstrate that collaborative learning models, specifically federated learning, are vulnerable to security and privacy attacks such as model inference and backdoor attacks. Backdoor attacks are a group of poisoning attacks in whi… ▽ More

    Submitted 26 May, 2023; v1 submitted 19 February, 2023; originally announced February 2023.

  3. arXiv:2302.01740  [pdf, other

    cs.CV cs.CR cs.LG

    SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

    Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti

    Abstract: Deep learning achieves outstanding results in many machine learning tasks. Nevertheless, it is vulnerable to backdoor attacks that modify the training set to embed a secret functionality in the trained model. The modified training samples have a secret property, i. e., a trigger. At inference time, the secret functionality is activated when the input contains the trigger, while the model functions… ▽ More

    Submitted 21 April, 2023; v1 submitted 3 February, 2023; originally announced February 2023.