Skip to main content

Showing 1–12 of 12 results for author: Aung, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.08165  [pdf, other

    cs.SE cs.AI

    I Can Find You in Seconds! Leveraging Large Language Models for Code Authorship Attribution

    Authors: Soohyeon Choi, Yong Kiam Tan, Mark Huasong Meng, Mohamed Ragab, Soumik Mondal, David Mohaisen, Khin Mi Mi Aung

    Abstract: Source code authorship attribution is important in software forensics, plagiarism detection, and protecting software patch integrity. Existing techniques often rely on supervised machine learning, which struggles with generalization across different programming languages and coding styles due to the need for large labeled datasets. Inspired by recent advances in natural language authorship analysi… ▽ More

    Submitted 14 January, 2025; originally announced January 2025.

    Comments: 12 pages, 5 figures,

  2. arXiv:2409.18636  [pdf, other

    cs.CV

    Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models

    Authors: Hailin Li, Raghavendra Ramachandra, Mohamed Ragab, Soumik Mondal, Yong Kiam Tan, Khin Mi Mi Aung

    Abstract: Smartphone-based contactless fingerphoto authentication has become a reliable alternative to traditional contact-based fingerprint biometric systems owing to rapid advances in smartphone camera technology. Despite its convenience, fingerprint authentication through fingerphotos is more vulnerable to presentation attacks, which has motivated recent research efforts towards developing fingerphoto Pr… ▽ More

    Submitted 27 September, 2024; originally announced September 2024.

    Comments: Accepted by IJCB 2024

  3. arXiv:2305.05187  [pdf, other

    cs.NE cs.AI cs.AR

    DeepFire2: A Convolutional Spiking Neural Network Accelerator on FPGAs

    Authors: Myat Thu Linn Aung, Daniel Gerlinghoff, Chuping Qu, Liwei Yang, Tian Huang, Rick Siow Mong Goh, Tao Luo, Weng-Fai Wong

    Abstract: Brain-inspired spiking neural networks (SNNs) replace the multiply-accumulate operations of traditional neural networks by integrate-and-fire neurons, with the goal of achieving greater energy efficiency. Specialized hardware implementations of those neurons clearly have advantages over general-purpose devices in terms of power and performance, but exhibit poor scalability when it comes to acceler… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  4. arXiv:2212.04371  [pdf

    cs.LG cs.CR

    Skellam Mixture Mechanism: a Novel Approach to Federated Learning with Differential Privacy

    Authors: Ergute Bao, Yizheng Zhu, Xiaokui Xiao, Yin Yang, Beng Chin Ooi, Benjamin Hong Meng Tan, Khin Mi Mi Aung

    Abstract: Deep neural networks have strong capabilities of memorizing the underlying training data, which can be a serious privacy concern. An effective solution to this problem is to train models with differential privacy, which provides rigorous privacy guarantees by injecting random noise to the gradients. This paper focuses on the scenario where sensitive data are distributed among multiple participants… ▽ More

    Submitted 2 July, 2024; v1 submitted 8 December, 2022; originally announced December 2022.

  5. arXiv:2107.01786  [pdf, other

    cs.CR

    Popcorn: Paillier Meets Compression For Efficient Oblivious Neural Network Inference

    Authors: Jun Wang, Chao Jin, Souhail Meftah, Khin Mi Mi Aung

    Abstract: Oblivious inference enables the cloud to provide neural network inference-as-a-service (NN-IaaS), whilst neither disclosing the client data nor revealing the server's model. However, the privacy guarantee under oblivious inference usually comes with a heavy cost of efficiency and accuracy. We propose Popcorn, a concise oblivious inference framework entirely built on the Paillier homomorphic encr… ▽ More

    Submitted 12 July, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

    Comments: This version corrects a naive but significant typo in Table 8 in our previous version. Previously, we mistakenly indicated the communication cost in COM(g), i.e., communication bandwidth in gigabyte. In fact, it should be COM as in this version, and COM presents the communication bandwidth in megabyte. It is megabyte, not gigabyte

  6. arXiv:2102.03494  [pdf, other

    cs.CR cs.AI

    FFConv: Fast Factorized Convolutional Neural Network Inference on Encrypted Data

    Authors: Yuxiao Lu, Jie Lin, Chao Jin, Zhe Wang, Min Wu, Khin Mi Mi Aung, Xiaoli Li

    Abstract: Homomorphic Encryption (HE), allowing computations on encrypted data (ciphertext) without decrypting it first, enables secure but prohibitively slow Convolutional Neural Network (CNN) inference for privacy-preserving applications in clouds. To reduce the inference latency, one approach is to pack multiple messages into a single ciphertext in order to reduce the number of ciphertexts and support ma… ▽ More

    Submitted 21 June, 2022; v1 submitted 5 February, 2021; originally announced February 2021.

    Comments: 12 pages, 6 figures

  7. arXiv:2001.07739  [pdf, ps, other

    cs.CV cs.LG eess.IV

    EMOPAIN Challenge 2020: Multimodal Pain Evaluation from Facial and Bodily Expressions

    Authors: Joy O. Egede, Siyang Song, Temitayo A. Olugbade, Chongyang Wang, Amanda Williams, Hongying Meng, Min Aung, Nicholas D. Lane, Michel Valstar, Nadia Bianchi-Berthouze

    Abstract: The EmoPain 2020 Challenge is the first international competition aimed at creating a uniform platform for the comparison of machine learning and multimedia processing methods of automatic chronic pain assessment from human expressive behaviour, and also the identification of pain-related behaviours. The objective of the challenge is to promote research in the development of assistive technologies… ▽ More

    Submitted 9 March, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

    Comments: 8 pages

  8. PrivFT: Private and Fast Text Classification with Homomorphic Encryption

    Authors: Ahmad Al Badawi, Luong Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung

    Abstract: The need for privacy-preserving analytics is higher than ever due to the severity of privacy risks and to comply with new privacy regulations leading to an amplified interest in privacy-preserving techniques that try to balance between privacy and utility. In this work, we present an efficient method for Text Classification while preserving the privacy of the content using Fully Homomorphic Encryp… ▽ More

    Submitted 18 November, 2019; v1 submitted 18 August, 2019; originally announced August 2019.

    Comments: 13 pages, 3 figures, 4 tables, 5 Algorithms

    Report number: 2169-3536

    Journal ref: IEEE Access, 2020

  9. arXiv:1902.04303  [pdf, other

    stat.AP cs.CR q-bio.GN

    Achieving GWAS with Homomorphic Encryption

    Authors: Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung

    Abstract: One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide polymorphism (SNP), are used in GWAS. This raises privacy and security concerns as these genetic markers can be used to identify individuals uniquely. This problem is further exacerbated by a large number of SNPs needed, which produce reliable res… ▽ More

    Submitted 1 August, 2019; v1 submitted 12 February, 2019; originally announced February 2019.

  10. arXiv:1901.10074  [pdf, other

    cs.CR

    CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images

    Authors: Jin Chao, Ahmad Al Badawi, Balagopal Unnikrishnan, Jie Lin, Chan Fook Mun, James M. Brown, J. Peter Campbell, Michael Chiang, Jayashree Kalpathy-Cramer, Vijay Ramaseshan Chandrasekhar, Pavitra Krishnaswamy, Khin Mi Mi Aung

    Abstract: Convolutional neural networks (CNNs) have enabled significant performance leaps in medical image classification tasks. However, translating neural network models for clinical applications remains challenging due to data privacy issues. Fully Homomorphic Encryption (FHE) has the potential to address this challenge as it enables the use of CNNs on encrypted images. However, current HE technology pos… ▽ More

    Submitted 28 January, 2019; originally announced January 2019.

  11. arXiv:1811.00778  [pdf, other

    cs.CR cs.LG

    Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs

    Authors: Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Jun Jie Sim, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar

    Abstract: Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model. The biggest concern with DLaaS is user privacy if the input samples are sensitive data. We provide here an efficient privacy-preserving system by employing high-end technologies… ▽ More

    Submitted 18 August, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

  12. arXiv:1712.09327  [pdf, other

    cs.LG cs.AI stat.ML

    Building Robust Deep Neural Networks for Road Sign Detection

    Authors: Arkar Min Aung, Yousef Fadila, Radian Gondokaryono, Luis Gonzalez

    Abstract: Deep Neural Networks are built to generalize outside of training set in mind by using techniques such as regularization, early stopping and dropout. But considerations to make them more resilient to adversarial examples are rarely taken. As deep neural networks become more prevalent in mission-critical and real-time systems, miscreants start to attack them by intentionally making deep neural netwo… ▽ More

    Submitted 26 December, 2017; originally announced December 2017.