Skip to main content

Showing 1–8 of 8 results for author: Juuti, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2009.12344  [pdf, other

    cs.CL

    A little goes a long way: Improving toxic language classification despite data scarcity

    Authors: Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan

    Abstract: Detection of some types of toxic language is hampered by extreme scarcity of labeled training data. Data augmentation - generating new synthetic data from a labeled seed dataset - can help. The efficacy of data augmentation on toxic language classification has not been fully explored. We present the first systematic study on how data augmentation techniques impact performance across toxic language… ▽ More

    Submitted 24 October, 2020; v1 submitted 25 September, 2020; originally announced September 2020.

    Comments: To appear in Findings of ACL: EMNLP 2020

  2. arXiv:1910.05429  [pdf, other

    cs.LG cs.CR stat.ML

    Extraction of Complex DNN Models: Real Threat or Boogeyman?

    Authors: Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan

    Abstract: Recently, machine learning (ML) has introduced advanced solutions to many domains. Since ML models provide business advantage to model owners, protecting intellectual property of ML models has emerged as an important consideration. Confidentiality of ML models can be protected by exposing them to clients only via prediction APIs. However, model extraction attacks can steal the functionality of ML… ▽ More

    Submitted 27 May, 2020; v1 submitted 11 October, 2019; originally announced October 2019.

    Comments: 16 pages, 1 figure, Accepted for publication in AAAI-20 Workshop on Engineering Dependable and Secure Machine Learning Systems (AAAI-EDSMLS 2020)

  3. arXiv:1906.03397  [pdf, other

    cs.LG cs.CR stat.ML

    Making targeted black-box evasion attacks effective and efficient

    Authors: Mika Juuti, Buse Gul Atli, N. Asokan

    Abstract: We investigate how an adversary can optimally use its query budget for targeted evasion attacks against deep neural networks in a black-box setting. We formalize the problem setting and systematically evaluate what benefits the adversary can gain by using substitute models. We show that there is an exploration-exploitation tradeoff in that query efficiency comes at the cost of effectiveness. We pr… ▽ More

    Submitted 8 June, 2019; originally announced June 2019.

    Comments: 12 pages, 10 figures

    Journal ref: AISec 2019: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security

  4. arXiv:1808.09115  [pdf, ps, other

    cs.CL

    All You Need is "Love": Evading Hate-speech Detection

    Authors: Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan

    Abstract: With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem. In this paper, we reproduce seven state-of-the-art hate speech detection models from prior work, and show that they perform well only when tested on the same type of data they were trained on. Based on these results, we argue that for successful hate speech… ▽ More

    Submitted 5 November, 2018; v1 submitted 28 August, 2018; originally announced August 2018.

    Comments: 11 pages, Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security (AISec) 2018

  5. arXiv:1805.02628  [pdf, other

    cs.CR

    PRADA: Protecting against DNN Model Stealing Attacks

    Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan

    Abstract: Machine learning (ML) applications are increasingly prevalent. Protecting the confidentiality of ML models becomes paramount for two reasons: (a) a model can be a business advantage to its owner, and (b) an adversary may use a stolen model to find transferable adversarial examples that can evade classification by the original model. Access to the model can be restricted to be only via well-defined… ▽ More

    Submitted 31 March, 2019; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: 17 pages, 7 figures, 9 tables. Accepted for publication in the 4th IEEE European Symposium on Security and Privacy (EuroS&P 2019)

  6. arXiv:1805.02400  [pdf, other

    cs.CR cs.CL

    Stay On-Topic: Generating Context-specific Fake Restaurant Reviews

    Authors: Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan

    Abstract: Automatically generated fake restaurant reviews are a threat to online review systems. Recent research has shown that users have difficulties in detecting machine-generated fake reviews hiding among real restaurant reviews. The method used in this work (char-LSTM ) has one drawback: it has difficulties staying in context, i.e. when it generates a review for specific target entity, the resulting re… ▽ More

    Submitted 28 June, 2018; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: 21 pages, 5 figures, 6 tables. Accepted for publication in the European Symposium on Research in Computer Security (ESORICS) 2018

  7. arXiv:1610.02801  [pdf, other

    cs.CR

    STASH: Securing transparent authentication schemes using prover-side proximity verification

    Authors: Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan, Ivan Martinovic

    Abstract: Transparent authentication (TA) schemes are those in which a user is authenticated by a verifier without requiring explicit user interaction. By doing so, those schemes promise high usability and security simultaneously. The majority of TA implementations rely on the received signal strength as an indicator for the proximity of a user device (prover). However, such implicit proximity verification… ▽ More

    Submitted 29 March, 2017; v1 submitted 10 October, 2016; originally announced October 2016.

    Comments: Updated name of paper. Paper accepted to IEEE SECON'17

  8. arXiv:1505.05779  [pdf, ps, other

    cs.CR

    Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks

    Authors: O. Huhta, P. Shrestha, S. Udar, M. Juuti, N. Saxena, N. Asokan

    Abstract: Deauthentication is an important component of any authentication system. The widespread use of computing devices in daily life has underscored the need for zero-effort deauthentication schemes. However, the quest for eliminating user effort may lead to hidden security flaws in the authentication schemes. As a case in point, we investigate a prominent zero-effort deauthentication scheme, called ZEB… ▽ More

    Submitted 14 February, 2016; v1 submitted 21 May, 2015; originally announced May 2015.

    ACM Class: K.6.5