Skip to main content

Showing 1–15 of 15 results for author: Vivek, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.18916  [pdf, other

    cs.DC cs.AI

    UnifyFL: Enabling Decentralized Cross-Silo Federated Learning

    Authors: Sarang S, Druva Dhakshinamoorthy, Aditya Shiva Sharma, Yuvraj Singh Bhadauria, Siddharth Chaitra Vivek, Arihant Bansal, Arnab K. Paul

    Abstract: Federated Learning (FL) is a decentralized machine learning (ML) paradigm in which models are trained on private data across several devices called clients and combined at a single node called an aggregator rather than aggregating the data itself. Many organizations employ FL to have better privacy-aware ML-driven decision-making capabilities. However, organizations often operate independently rat… ▽ More

    Submitted 5 May, 2025; v1 submitted 26 April, 2025; originally announced April 2025.

    Comments: 12 pages, 7 figures, 7 tables. Accepted at the 26th ACM/IFIP International Middleware Conference (MIDDLEWARE 2025)

  2. When Less is More: Achieving Faster Convergence in Distributed Edge Machine Learning

    Authors: Advik Raj Basani, Siddharth Chaitra Vivek, Advaith Krishna, Arnab K. Paul

    Abstract: Distributed Machine Learning (DML) on resource-constrained edge devices holds immense potential for real-world applications. However, achieving fast convergence in DML in these heterogeneous environments remains a significant challenge. Traditional frameworks like Bulk Synchronous Parallel and Asynchronous Stochastic Parallel rely on frequent, small updates that incur substantial communication ove… ▽ More

    Submitted 27 October, 2024; originally announced October 2024.

    Comments: 11 pages, 19 figures, 3 tables; code: https://github.com/DaSH-Lab-CSIS/Hermes

  3. arXiv:2408.08002  [pdf, other

    cs.CR

    Practical Privacy-Preserving Identity Verification using Third-Party Cloud Services and FHE (Role of Data Encoding in Circuit Depth Management)

    Authors: Deep Inder Mohan, Srinivas Vivek

    Abstract: National digital identity verification systems have played a critical role in the effective distribution of goods and services, particularly, in developing countries. Due to the cost involved in deploying and maintaining such systems, combined with a lack of in-house technical expertise, governments seek to outsource this service to third-party cloud service providers to the extent possible. This… ▽ More

    Submitted 27 September, 2024; v1 submitted 15 August, 2024; originally announced August 2024.

    Comments: A preliminary version of this work was presented (without proceedings) at the Turing Trustworthy Digital Identity International Conference 2022 at The Alan Turing Institute, London, UK, on Sep. 16, 2022. The recently updated version now contains a detailed security analysis

  4. arXiv:2403.09080  [pdf, other

    cs.CR

    Ciphertext-Only Attack on a Secure $k$-NN Computation on Cloud

    Authors: Shyam Murthy, Santosh Kumar Upadhyaya, Srinivas Vivek

    Abstract: The rise of cloud computing has spurred a trend of transferring data storage and computational tasks to the cloud. To protect confidential information such as customer data and business details, it is essential to encrypt this sensitive data before cloud storage. Implementing encryption can prevent unauthorized access, data breaches, and the resultant financial loss, reputation damage, and legal i… ▽ More

    Submitted 17 April, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

  5. Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing

    Authors: Santosh Kumar Upadhyaya, Srinivas Vivek

    Abstract: Location-based services are getting more popular day by day. Finding nearby stores, proximity-based marketing, on-road service assistance, etc., are some of the services that use location-based services. In location-based services, user information like user identity, user query, and location must be protected. Ma et al. (INFOCOM-BigSecurity 2019) proposed a privacy-preserving location-based servi… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Journal ref: ARES 2022: Proceedings of the 17th International Conference on Availability, Reliability and Security

  6. Driver Locations Harvesting Attack on pRide

    Authors: Shyam Murthy, Srinivas Vivek

    Abstract: Privacy preservation in Ride-Hailing Services (RHS) is intended to protect privacy of drivers and riders. pRide, published in IEEE Trans. Vehicular Technology 2021, is a prediction based privacy-preserving RHS protocol to match riders with an optimum driver. In the protocol, the Service Provider (SP) homomorphically computes Euclidean distances between encrypted locations of drivers and rider. Rid… ▽ More

    Submitted 4 January, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

  7. Passive Triangulation Attack on ORide

    Authors: Shyam Murthy, Srinivas Vivek

    Abstract: Privacy preservation in Ride Hailing Services is intended to protect privacy of drivers and riders. ORide is one of the early RHS proposals published at USENIX Security Symposium 2017. In the ORide protocol, riders and drivers, operating in a zone, encrypt their locations using a Somewhat Homomorphic Encryption scheme (SHE) and forward them to the Service Provider (SP). SP homomorphically computes… ▽ More

    Submitted 4 January, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

  8. arXiv:2112.06449  [pdf, ps, other

    cs.CR

    Comments on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server"

    Authors: Srinivas Vivek

    Abstract: Recently, Xie et al. (IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3068-3081, 2021) proposed a privacy-preserving Online Ride-Hailing (ORH) protocol that does not make use of a trusted third-party server. The primary goal of such privacy-preserving ORH protocols is to ensure the privacy of riders' and drivers' location data w.r.t. the ORH Service Provider (SP). In this not… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: 2 pages

  9. Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE

    Authors: Deepak Kumaraswamy, Srinivas Vivek

    Abstract: In a typical ride-hailing service, the service provider (RS) matches a customer (RC) with the closest vehicle (RV) registered to this service. TRACE is an efficient privacy-preserving ride-hailing service proposed by Wang et al. in 2018. TRACE uses masking along with other cryptographic techniques to ensure efficient and accurate ride-matching. The RS uses masked location information to match RCs… ▽ More

    Submitted 24 December, 2021; v1 submitted 9 November, 2021; originally announced November 2021.

  10. arXiv:2105.04351  [pdf, ps, other

    cs.CR

    Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service

    Authors: Srinivas Vivek

    Abstract: A privacy-preserving Context-Aware Publish-Subscribe System (CA-PSS) enables an intermediary (broker) to match the content from a publisher and the subscription by a subscriber based on the current context while preserving confidentiality of the subscriptions and notifications. While a privacy-preserving Ride-Hailing Service (RHS) enables an intermediary (service provider) to match a ride request… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    MSC Class: 68M25

  11. arXiv:2101.06419  [pdf, other

    cs.CR

    Revisiting Driver Anonymity in ORide

    Authors: Deepak Kumaraswamy, Shyam Murthy, Srinivas Vivek

    Abstract: Ride Hailing Services (RHS) have become a popular means of transportation, and with its popularity comes the concerns of privacy of riders and drivers. ORide is a privacy-preserving RHS proposed at the USENIX Security Symposium 2017 and uses Somewhat Homomorphic Encryption (SHE). In their protocol, a rider and all drivers in a zone send their encrypted coordinates to the RHS Service Provider (SP)… ▽ More

    Submitted 24 December, 2021; v1 submitted 16 January, 2021; originally announced January 2021.

  12. arXiv:2007.10231  [pdf, other

    cs.SI cs.LG stat.ML

    Integrating Network Embedding and Community Outlier Detection via Multiclass Graph Description

    Authors: Sambaran Bandyopadhyay, Saley Vishal Vivek, M. N. Murty

    Abstract: Network (or graph) embedding is the task to map the nodes of a graph to a lower dimensional vector space, such that it preserves the graph properties and facilitates the downstream network mining tasks. Real world networks often come with (community) outlier nodes, which behave differently from the regular nodes of the community. These outlier nodes can affect the embedding of the regular nodes, i… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: This work is accepted at the 24th European Conference on Artificial Intelligence (ECAI 2020) as a full research paper

  13. arXiv:2002.00614  [pdf, other

    cs.LG cs.CV

    Regularizers for Single-step Adversarial Training

    Authors: B. S. Vivek, R. Venkatesh Babu

    Abstract: The progress in the last decade has enabled machine learning models to achieve impressive performance across a wide range of tasks in Computer Vision. However, a plethora of works have demonstrated the susceptibility of these models to adversarial samples. Adversarial training procedure has been proposed to defend against such adversarial attacks. Adversarial training methods augment mini-batches… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  14. arXiv:1909.04385  [pdf, other

    cs.CV cs.AI cs.LG

    FDA: Feature Disruptive Attack

    Authors: Aditya Ganeshan, B. S. Vivek, R. Venkatesh Babu

    Abstract: Though Deep Neural Networks (DNN) show excellent performance across various computer vision tasks, several works show their vulnerability to adversarial samples, i.e., image samples with imperceptible noise engineered to manipulate the network's prediction. Adversarial sample generation methods range from simple to complex optimization techniques. Majority of these methods generate adversaries thr… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: Accepted in ICCV;19. Code Available at https://github.com/BardOfCodes/fda

  15. arXiv:1903.00059  [pdf, other

    cs.CR cs.NI physics.soc-ph

    Cyber-physical risks of hacked Internet-connected vehicles

    Authors: Skanda Vivek, David Yanni, Peter J. Yunker, Jesse L. Silverberg

    Abstract: The integration of automotive technology with Internet-connectivity promises to both dramatically improve transportation, while simultaneously introducing the potential for new unknown risks. Internet-connected vehicles are like digital data because they can be targeted for malicious hacking. Unlike digital data, however, Internet-connected vehicles are cyber-physical systems that physically inter… ▽ More

    Submitted 28 February, 2019; originally announced March 2019.

    Comments: 11 pages, 4 figures

    Journal ref: Phys. Rev. E 100, 012316 (2019)