Skip to main content

Showing 1–50 of 70 results for author: Zhang, L Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.15115  [pdf, ps, other

    cs.LG

    Towards Reliable Forgetting: A Survey on Machine Unlearning Verification, Challenges, and Future Directions

    Authors: Lulu Xue, Shengshan Hu, Wei Lu, Yan Shen, Dongxu Li, Peijin Guo, Ziqi Zhou, Minghui Li, Yanjun Zhang, Leo Yu Zhang

    Abstract: With growing demands for privacy protection, security, and legal compliance (e.g., GDPR), machine unlearning has emerged as a critical technique for ensuring the controllability and regulatory alignment of machine learning models. However, a fundamental challenge in this field lies in effectively verifying whether unlearning operations have been successfully and thoroughly executed. Despite a grow… ▽ More

    Submitted 17 June, 2025; originally announced June 2025.

  2. arXiv:2506.10722  [pdf, ps, other

    cs.CR cs.AI

    TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks

    Authors: Xiaoxing Mo, Yuxuan Cheng, Nan Sun, Leo Yu Zhang, Wei Luo, Shang Gao

    Abstract: Deep Neural Networks (DNNs) are vulnerable to backdoor attacks, where attackers implant hidden triggers during training to maliciously control model behavior. Topological Evolution Dynamics (TED) has recently emerged as a powerful tool for detecting backdoor attacks in DNNs. However, TED can be vulnerable to backdoor attacks that adaptively distort topological representation distributions across n… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

  3. When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning

    Authors: Ruining Sun, Hongsheng Hu, Wei Luo, Zhaoxi Zhang, Yanjun Zhang, Haizhuan Yuan, Leo Yu Zhang

    Abstract: With the rapid advancement of deep learning technology, pre-trained encoder models have demonstrated exceptional feature extraction capabilities, playing a pivotal role in the research and application of deep learning. However, their widespread use has raised significant concerns about the risk of training data privacy leakage. This paper systematically investigates the privacy threats posed by me… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

    Comments: Accepted In ACM ASIA Conference on Computer and Communications Security (ASIA CCS '25), August 25-29, 2025, Ha Noi, Vietnam. For Code, see https://github.com/SeroneySun/LpLA_code

  4. arXiv:2506.00936  [pdf, ps, other

    cs.LG cs.AI q-bio.QM

    Uncertainty-Aware Metabolic Stability Prediction with Dual-View Contrastive Learning

    Authors: Peijin Guo, Minghui Li, Hewen Pan, Bowen Chen, Yang Wu, Zikang Guo, Leo Yu Zhang, Shengshan Hu, Shengqing Hu

    Abstract: Accurate prediction of molecular metabolic stability (MS) is critical for drug research and development but remains challenging due to the complex interplay of molecular interactions. Despite recent advances in graph neural networks (GNNs) for MS prediction, current approaches face two critical limitations: (1) incomplete molecular modeling due to atom-centric message-passing mechanisms that disre… ▽ More

    Submitted 1 June, 2025; originally announced June 2025.

    Comments: This manuscript has been accepted for publication at ECML-PKDD 2025. The final version will be published in the conference proceedings

  5. arXiv:2505.16403  [pdf, ps, other

    cs.LG eess.SY

    Performance Guaranteed Poisoning Attacks in Federated Learning: A Sliding Mode Approach

    Authors: Huazi Pan, Yanjun Zhang, Leo Yu Zhang, Scott Adams, Abbas Kouzani, Suiyang Khoo

    Abstract: Manipulation of local training data and local updates, i.e., the poisoning attack, is the main threat arising from the collaborative nature of the federated learning (FL) paradigm. Most existing poisoning attacks aim to manipulate local data/models in a way that causes denial-of-service (DoS) issues. In this paper, we introduce a novel attack method, named Federated Learning Sliding Attack (FedSA)… ▽ More

    Submitted 28 May, 2025; v1 submitted 22 May, 2025; originally announced May 2025.

    Comments: This paper is to appear in IJCAI 2025, code available at: https://github.com/Halsey777/FedSA

  6. arXiv:2504.11990  [pdf, other

    cs.LG cs.CR

    Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets

    Authors: Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang

    Abstract: Transfer learning from pre-trained encoders has become essential in modern machine learning, enabling efficient model adaptation across diverse tasks. However, this combination of pre-training and downstream adaptation creates an expanded attack surface, exposing models to sophisticated backdoor embeddings at both the encoder and dataset levels--an area often overlooked in prior research. Addition… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

    Comments: To appear at IEEE Symposium on Security and Privacy 2025, 20 pages

  7. arXiv:2504.08798  [pdf, other

    cs.CL cs.AI cs.LG

    Exploring Gradient-Guided Masked Language Model to Detect Textual Adversarial Attacks

    Authors: Xiaomei Zhang, Zhaoxi Zhang, Yanjun Zhang, Xufei Zheng, Leo Yu Zhang, Shengshan Hu, Shirui Pan

    Abstract: Textual adversarial examples pose serious threats to the reliability of natural language processing systems. Recent studies suggest that adversarial examples tend to deviate from the underlying manifold of normal texts, whereas pre-trained masked language models can approximate the manifold of normal data. These findings inspire the exploration of masked language models for detecting textual adver… ▽ More

    Submitted 8 April, 2025; originally announced April 2025.

  8. arXiv:2503.15293  [pdf, other

    cs.CV

    Test-Time Backdoor Detection for Object Detection Models

    Authors: Hangtao Zhang, Yichen Wang, Shihui Yan, Chenyu Zhu, Ziqi Zhou, Linshan Hou, Shengshan Hu, Minghui Li, Yanjun Zhang, Leo Yu Zhang

    Abstract: Object detection models are vulnerable to backdoor attacks, where attackers poison a small subset of training samples by embedding a predefined trigger to manipulate prediction. Detecting poisoned samples (i.e., those containing triggers) at test time can prevent backdoor activation. However, unlike image classification tasks, the unique characteristics of object detection -- particularly its outp… ▽ More

    Submitted 19 March, 2025; originally announced March 2025.

    Comments: Accepted to CVPR 2025

  9. arXiv:2503.12793  [pdf, other

    cs.LG cs.CV

    Improving Generalization of Universal Adversarial Perturbation via Dynamic Maximin Optimization

    Authors: Yechao Zhang, Yingzhe Xu, Junyu Shi, Leo Yu Zhang, Shengshan Hu, Minghui Li, Yanjun Zhang

    Abstract: Deep neural networks (DNNs) are susceptible to universal adversarial perturbations (UAPs). These perturbations are meticulously designed to fool the target model universally across all sample classes. Unlike instance-specific adversarial examples (AEs), generating UAPs is more complex because they must be generalized across a wide range of data samples and models. Our research reveals that existin… ▽ More

    Submitted 16 April, 2025; v1 submitted 17 March, 2025; originally announced March 2025.

    Comments: Accepted in AAAI 2025

  10. arXiv:2503.08976  [pdf, other

    cs.LG cs.CR cs.DC

    Not All Edges are Equally Robust: Evaluating the Robustness of Ranking-Based Federated Learning

    Authors: Zirui Gong, Yanjun Zhang, Leo Yu Zhang, Zhaoxi Zhang, Yong Xiang, Shirui Pan

    Abstract: Federated Ranking Learning (FRL) is a state-of-the-art FL framework that stands out for its communication efficiency and resilience to poisoning attacks. It diverges from the traditional FL framework in two ways: 1) it leverages discrete rankings instead of gradient updates, significantly reducing communication costs and limiting the potential space for malicious updates, and 2) it uses majority v… ▽ More

    Submitted 22 April, 2025; v1 submitted 11 March, 2025; originally announced March 2025.

    Comments: 18 pages. To appear in the IEEE Symposium on Security and Privacy 2025

  11. arXiv:2503.04825  [pdf, other

    cs.CR

    Adversarial Example Based Fingerprinting for Robust Copyright Protection in Split Learning

    Authors: Zhangting Lin, Mingfu Xue, Kewei Chen, Wenmao Liu, Xiang Gao, Leo Yu Zhang, Jian Wang, Yushu Zhang

    Abstract: Currently, deep learning models are easily exposed to data leakage risks. As a distributed model, Split Learning thus emerged as a solution to address this issue. The model is splitted to avoid data uploading to the server and reduce computing requirements while ensuring data privacy and security. However, the transmission of data between clients and server creates a potential vulnerability. In pa… ▽ More

    Submitted 5 March, 2025; originally announced March 2025.

  12. arXiv:2501.16671  [pdf, other

    cs.CR cs.AI

    Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI

    Authors: Dayong Ye, Tianqing Zhu, Shang Wang, Bo Liu, Leo Yu Zhang, Wanlei Zhou, Yang Zhang

    Abstract: Generative AI technology has become increasingly integrated into our daily lives, offering powerful capabilities to enhance productivity. However, these same capabilities can be exploited by adversaries for malicious purposes. While existing research on adversarial applications of generative AI predominantly focuses on cyberattacks, less attention has been given to attacks targeting deep learning… ▽ More

    Submitted 27 January, 2025; originally announced January 2025.

    Comments: Accepted at USENIX Security 2025

  13. arXiv:2501.16663  [pdf, other

    cs.CR cs.AI

    Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning

    Authors: Dayong Ye, Tianqing Zhu, Jiayang Li, Kun Gao, Bo Liu, Leo Yu Zhang, Wanlei Zhou, Yang Zhang

    Abstract: Duplication is a prevalent issue within datasets. Existing research has demonstrated that the presence of duplicated data in training datasets can significantly influence both model performance and data privacy. However, the impact of data duplication on the unlearning process remains largely unexplored. This paper addresses this gap by pioneering a comprehensive investigation into the role of dat… ▽ More

    Submitted 11 March, 2025; v1 submitted 27 January, 2025; originally announced January 2025.

    Comments: Accepted at USENIX Security 2025

  14. arXiv:2412.16955  [pdf, other

    cs.CV

    NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors

    Authors: Ziqi Zhou, Bowen Li, Yufei Song, Zhifei Yu, Shengshan Hu, Wei Wan, Leo Yu Zhang, Dezhong Yao, Hai Jin

    Abstract: With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have been focused on designing customized attacks targeting their specific structures (e.g., NMS and RPN), yielding some results but simultaneously constraining their scalability. Moreover,… ▽ More

    Submitted 22 December, 2024; originally announced December 2024.

    Comments: Accepted by AAAI 2025

  15. arXiv:2412.16651  [pdf, other

    cs.CV cs.AI

    PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation

    Authors: Yufei Song, Ziqi Zhou, Minghui Li, Xianlong Wang, Hangtao Zhang, Menghao Deng, Wei Wan, Shengshan Hu, Leo Yu Zhang

    Abstract: With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, \ie, adversarial attacks on deep neural networks. Existing works primarily focus on image classification tasks, aiming to alter the model's predicted labels. Due to the output complexity and deeper network architectures, research on adversarial examples for segmentation models is still limi… ▽ More

    Submitted 3 January, 2025; v1 submitted 21 December, 2024; originally announced December 2024.

    Comments: Accepted by ICASSP 2025

  16. arXiv:2411.19479  [pdf, ps, other

    cs.CR cs.AI cs.CV cs.LG

    FLARE: Towards Universal Dataset Purification against Backdoor Attacks

    Authors: Linshan Hou, Wei Luo, Zhongyun Hua, Songhua Chen, Leo Yu Zhang, Yiming Li

    Abstract: Deep neural networks (DNNs) are susceptible to backdoor attacks, where adversaries poison datasets with adversary-specified triggers to implant hidden backdoors, enabling malicious manipulation of model predictions. Dataset purification serves as a proactive defense by removing malicious training samples to prevent backdoor injection at its source. We first reveal that the current advanced purific… ▽ More

    Submitted 18 June, 2025; v1 submitted 29 November, 2024; originally announced November 2024.

    Comments: 15 pages, This paper is accepted and will appear in TIFS (CCF-A)

  17. arXiv:2411.11683  [pdf, other

    cs.RO cs.AI

    TrojanRobot: Physical-World Backdoor Attacks Against VLM-based Robotic Manipulation

    Authors: Xianlong Wang, Hewen Pan, Hangtao Zhang, Minghui Li, Shengshan Hu, Ziqi Zhou, Lulu Xue, Peijin Guo, Yichen Wang, Wei Wan, Aishan Liu, Leo Yu Zhang

    Abstract: Robotic manipulation in the physical world is increasingly empowered by \textit{large language models} (LLMs) and \textit{vision-language models} (VLMs), leveraging their understanding and perception capabilities. Recently, various attacks against such robotic policies have been proposed, with backdoor attacks drawing considerable attention for their high stealth and strong persistence capabilitie… ▽ More

    Submitted 23 January, 2025; v1 submitted 18 November, 2024; originally announced November 2024.

  18. arXiv:2409.17874  [pdf, other

    cs.AI

    DarkSAM: Fooling Segment Anything Model to Segment Nothing

    Authors: Ziqi Zhou, Yufei Song, Minghui Li, Shengshan Hu, Xianlong Wang, Leo Yu Zhang, Dezhong Yao, Hai Jin

    Abstract: Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversarial perturbation (UAP) have not been thoroughly investigated yet. In this paper, we propose DarkSAM, the first prompt-free universal attack framework against SAM, including a semantic… ▽ More

    Submitted 26 September, 2024; originally announced September 2024.

    Comments: This paper has been accepted by the 38th Annual Conference on Neural Information Processing Systems (NeurIPS'24)

  19. arXiv:2407.20242  [pdf, other

    cs.CY cs.AI cs.RO

    BadRobot: Jailbreaking Embodied LLMs in the Physical World

    Authors: Hangtao Zhang, Chenyu Zhu, Xianlong Wang, Ziqi Zhou, Changgan Yin, Minghui Li, Lulu Xue, Yichen Wang, Shengshan Hu, Aishan Liu, Peijin Guo, Leo Yu Zhang

    Abstract: Embodied AI represents systems where AI is integrated into physical entities. Large Language Model (LLM), which exhibits powerful language understanding abilities, has been extensively employed in embodied AI by facilitating sophisticated task planning. However, a critical safety issue remains overlooked: could these embodied LLMs perpetrate harmful behaviors? In response, we introduce BadRobot, a… ▽ More

    Submitted 4 February, 2025; v1 submitted 16 July, 2024; originally announced July 2024.

    Comments: Accepted to ICLR 2025. Project page: https://Embodied-LLMs-Safety.github.io

    Journal ref: International Conference on Learning Representations (ICLR) 2025

  20. arXiv:2406.15093  [pdf, other

    cs.CR cs.CV eess.IV

    ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification

    Authors: Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin

    Abstract: Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, some defense mechanisms have been proposed such as adversarial training, image transformation techniques, and image purification. However, these schemes are either susceptible to adaptive attacks, bui… ▽ More

    Submitted 24 June, 2024; v1 submitted 21 June, 2024; originally announced June 2024.

    Comments: Accepted by ESORICS 2024

  21. arXiv:2406.03880  [pdf, other

    cs.LG cs.AI

    Memorization in deep learning: A survey

    Authors: Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Ming Ding, Chao Chen, Kok-Leong Ong, Jun Zhang, Yang Xiang

    Abstract: Deep Learning (DL) powered by Deep Neural Networks (DNNs) has revolutionized various domains, yet understanding the intricacies of DNN decision-making and learning processes remains a significant challenge. Recent investigations have uncovered an interesting memorization phenomenon in which DNNs tend to memorize specific details from examples rather than learning general patterns, affecting model… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

  22. arXiv:2405.19677  [pdf, other

    cs.CR cs.AI

    Large Language Model Watermark Stealing With Mixed Integer Programming

    Authors: Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill, Shirui Pan

    Abstract: The Large Language Model (LLM) watermark is a newly emerging technique that shows promise in addressing concerns surrounding LLM copyright, monitoring AI-generated text, and preventing its misuse. The LLM watermark scheme commonly includes generating secret keys to partition the vocabulary into green and red lists, applying a perturbation to the logits of tokens in the green list to increase their… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 12 pages

  23. arXiv:2405.09786  [pdf, other

    cs.LG cs.CR

    IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency

    Authors: Linshan Hou, Ruili Feng, Zhongyun Hua, Wei Luo, Leo Yu Zhang, Yiming Li

    Abstract: Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries can maliciously trigger model misclassifications by implanting a hidden backdoor during model training. This paper proposes a simple yet effective input-level backdoor detection (dubbed IBD-PSC) as a `firewall' to filter out malicious testing images. Our method is motivated by an intriguing phenomenon, i.e., paramete… ▽ More

    Submitted 2 June, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: Accepted to ICML 2024, 31 pages

  24. arXiv:2405.09543  [pdf, other

    cs.CY cs.AI cs.IR cs.LG

    Algorithmic Fairness: A Tolerance Perspective

    Authors: Renqiang Luo, Tao Tang, Feng Xia, Jiaying Liu, Chengpei Xu, Leo Yu Zhang, Wei Xiang, Chengqi Zhang

    Abstract: Recent advancements in machine learning and deep learning have brought algorithmic fairness into sharp focus, illuminating concerns over discriminatory decision making that negatively impacts certain individuals or groups. These concerns have manifested in legal, ethical, and societal challenges, including the erosion of trust in intelligent systems. In response, this survey delves into the existi… ▽ More

    Submitted 26 April, 2024; originally announced May 2024.

    Comments: 33 pages, 4 figures

    MSC Class: 68T01; 68W40 ACM Class: I.2.6; K.4.2; H.1.2

  25. arXiv:2405.03299  [pdf, other

    cs.CR cs.DC

    DarkFed: A Data-Free Backdoor Attack in Federated Learning

    Authors: Minghui Li, Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Leo Yu Zhang, Yichen Wang

    Abstract: Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, which is impractical. In the context of real-world industrial scenarios, even the simplest defense suffices to defend against the state-of-the-art attack, 3DFed. A practical FL backdoor… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: This paper has been accepted by IJCAI 2024

  26. arXiv:2404.11357  [pdf, other

    cs.CV

    Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving

    Authors: Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen

    Abstract: Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor techniques have primarily been adapted from classification tasks, overlooking deeper vulnerabilities specific to object detection. This paper is dedicated to bridging this gap by introd… ▽ More

    Submitted 15 August, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to IJCAI 2024

  27. arXiv:2403.10801  [pdf, other

    cs.CV

    Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples

    Authors: Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin

    Abstract: With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as versatile feature extractors, enabling downstream users to harness the benefits of expansive models with minimal effort through fine-tuning. Nevertheless, recent works have exposed a… ▽ More

    Submitted 18 March, 2024; v1 submitted 16 March, 2024; originally announced March 2024.

  28. arXiv:2403.07673  [pdf, other

    cs.CR

    Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation

    Authors: Di Mi, Yanjun Zhang, Leo Yu Zhang, Shengshan Hu, Qi Zhong, Haizhuan Yuan, Shirui Pan

    Abstract: Model extraction attacks (MEAs) enable an attacker to replicate the functionality of a victim deep neural network (DNN) model by only querying its API service remotely, posing a severe threat to the security and integrity of pay-per-query DNN-based services. Although the majority of current research on MEAs has primarily concentrated on neural classifiers, there is a growing prevalence of image-to… ▽ More

    Submitted 19 March, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

    Comments: Accepted by AAAI 2024

  29. arXiv:2403.06143  [pdf, other

    cs.CR cs.AI

    Fluent: Round-efficient Secure Aggregation for Private Federated Learning

    Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang

    Abstract: Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their local datasets. However, FL remains susceptible to vulnerabilities such as privacy inference and inversion attacks. Single-server secure aggregation schemes were proposed to address these threats. Nonetheless, they encounter practical constra… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

  30. arXiv:2401.16687  [pdf, other

    cs.CR cs.LG

    Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks

    Authors: Lulu Xue, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun, Dezhong Yao

    Abstract: Collaborative learning (CL) is a distributed learning framework that aims to protect user privacy by allowing users to jointly train a model by sharing their gradient updates only. However, gradient inversion attacks (GIAs), which recover users' training data from shared gradients, impose severe privacy threats to CL. Existing defense methods adopt different techniques, e.g., differential privacy,… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  31. arXiv:2312.11026  [pdf, other

    cs.LG cs.CR cs.DC

    MISA: Unveiling the Vulnerabilities in Split Federated Learning

    Authors: Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin

    Abstract: \textit{Federated learning} (FL) and \textit{split learning} (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels in parallel execution capabilities, while the latter enjoys low dependence on edge computing resources and strong privacy protection. \textit{Split federated learning}… ▽ More

    Submitted 19 December, 2023; v1 submitted 18 December, 2023; originally announced December 2023.

    Comments: This paper has been accepted by the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2024)

  32. arXiv:2312.02673  [pdf, other

    cs.CR

    Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics

    Authors: Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang

    Abstract: A backdoor attack in deep learning inserts a hidden backdoor in the model to trigger malicious behavior upon specific input patterns. Existing detection approaches assume a metric space (for either the original inputs or their latent representations) in which normal samples and malicious samples are separable. We show that this assumption has a severe limitation by introducing a novel SSDT (Source… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Comments: 18 pages. To appear in IEEE Symposium on Security and Privacy 2024

  33. arXiv:2311.18403  [pdf, other

    cs.CV cs.AI

    Detecting and Corrupting Convolution-based Unlearnable Examples

    Authors: Minghui Li, Xianlong Wang, Zhifei Yu, Shengshan Hu, Ziqi Zhou, Longling Zhang, Leo Yu Zhang

    Abstract: Convolution-based unlearnable examples (UEs) employ class-wise multiplicative convolutional noise to training samples, severely compromising model performance. This fire-new type of UEs have successfully countered all defense mechanisms against UEs. The failure of such defenses can be attributed to the absence of norm constraints on convolutional noise, leading to severe blurring of image features… ▽ More

    Submitted 10 December, 2024; v1 submitted 30 November, 2023; originally announced November 2023.

    Comments: AAAI 2025

  34. AGRAMPLIFIER: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification

    Authors: Zirui Gong, Liyue Shen, Yanjun Zhang, Leo Yu Zhang, Jingwei Wang, Guangdong Bai, Yong Xiang

    Abstract: The collaborative nature of federated learning (FL) poses a major threat in the form of manipulation of local training data and local updates, known as the Byzantine poisoning attack. To address this issue, many Byzantine-robust aggregation rules (AGRs) have been proposed to filter out or moderate suspicious local updates uploaded by Byzantine participants. This paper introduces a novel approach… ▽ More

    Submitted 23 November, 2023; v1 submitted 12 November, 2023; originally announced November 2023.

    Comments: Accepted by IEEE TIFS, this is the complete version

  35. arXiv:2310.16520  [pdf, other

    cs.LG

    Towards Self-Interpretable Graph-Level Anomaly Detection

    Authors: Yixin Liu, Kaize Ding, Qinghua Lu, Fuyi Li, Leo Yu Zhang, Shirui Pan

    Abstract: Graph-level anomaly detection (GLAD) aims to identify graphs that exhibit notable dissimilarity compared to the majority in a collection. However, current works primarily focus on evaluating graph-level abnormality while failing to provide meaningful explanations for the predictions, which largely limits their reliability and application scope. In this paper, we investigate a new challenging probl… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: 23 pages; accepted to NeurIPS 2023

  36. arXiv:2310.09822  [pdf, other

    cs.CR cs.CV

    Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models

    Authors: Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu

    Abstract: The intellectual property protection of deep learning (DL) models has attracted increasing serious concerns. Many works on intellectual property protection for Deep Neural Networks (DNN) models have been proposed. The vast majority of existing work uses DNN watermarking to verify the ownership of the model after piracy occurs, which is referred to as passive verification. On the contrary, we focus… ▽ More

    Submitted 15 October, 2023; originally announced October 2023.

  37. arXiv:2309.07415  [pdf, other

    cs.CR cs.AI

    Client-side Gradient Inversion Against Federated Learning from Poisoning

    Authors: Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang

    Abstract: Federated Learning (FL) enables distributed participants (e.g., mobile devices) to train a global model without sharing data directly to a central server. Recent studies have revealed that FL is vulnerable to gradient inversion attack (GIA), which aims to reconstruct the original training samples and poses high risk against the privacy of clients in FL. However, most existing GIAs necessitate cont… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

  38. A Four-Pronged Defense Against Byzantine Attacks in Federated Learning

    Authors: Wei Wan, Shengshan Hu, Minghui Li, Jianrong Lu, Longling Zhang, Leo Yu Zhang, Hai Jin

    Abstract: \textit{Federated learning} (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious participants could independently or collusively upload well-crafted updates to deteriorate the performance of the global model. However, existing defenses could only mitigate par… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Comments: This paper has been accepted by the 31st ACM International Conference on Multimedia (MM '23)

  39. arXiv:2307.12280  [pdf, other

    cs.CV

    Downstream-agnostic Adversarial Examples

    Authors: Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin

    Abstract: Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning operations to enjoy the benefit of "large model". Despite this promising prospect, the security of pre-trained encoder has not been thoroughly investigated yet, especially when the pre-tr… ▽ More

    Submitted 14 August, 2023; v1 submitted 23 July, 2023; originally announced July 2023.

    Comments: This paper has been accepted by the International Conference on Computer Vision (ICCV '23, October 2--6, 2023, Paris, France)

  40. Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability

    Authors: Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin

    Abstract: Adversarial examples (AEs) for DNNs have been shown to be transferable: AEs that successfully fool white-box surrogate models can also deceive other black-box models with different architectures. Although a bunch of empirical studies have provided guidance on generating highly transferable AEs, many of these findings lack explanations and even lead to inconsistent advice. In this paper, we take a… ▽ More

    Submitted 1 June, 2025; v1 submitted 15 July, 2023; originally announced July 2023.

    Comments: IEEE Symposium on Security and Privacy (Oakland) 2024; Extended version; Fix an proof error of Theorem 1

  41. Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint

    Authors: Tianyang Cai, Yuqi Li, Tao Jia, Leo Yu Zhang, Zheng Yang

    Abstract: While collaborative systems provide convenience to our lives, they also face many security threats. One of them is the Low-rate Distributed Denial-of-Service (LDDoS) attack, which is a worthy concern. Unlike volumetric DDoS attacks that continuously send large volumes of traffic, LDDoS attacks are more stealthy and difficult to be detected owing to their low-volume feature. Due to its stealthiness… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  42. arXiv:2304.10783  [pdf, other

    cs.LG cs.CR cs.DC

    Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning

    Authors: Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Liew, Zhetao Li

    Abstract: Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude of malicious perturbations along certain prescribed directions to cause DoS, we propose a Flexible Model Poisoning Attack (FMPA) that can achieve versatile attack goals. We consider… ▽ More

    Submitted 25 September, 2024; v1 submitted 21 April, 2023; originally announced April 2023.

    Comments: Accepted by IJCAI 2024

  43. arXiv:2304.08767  [pdf, other

    cs.CR cs.AI

    Masked Language Model Based Textual Adversarial Example Detection

    Authors: Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang

    Abstract: Adversarial attacks are a serious threat to the reliable deployment of machine learning models in safety-critical applications. They can misguide current models to predict incorrectly by slightly modifying the inputs. Recently, substantial work has shown that adversarial examples tend to deviate from the underlying data manifold of normal examples, whereas pre-trained masked language models can fi… ▽ More

    Submitted 28 January, 2024; v1 submitted 18 April, 2023; originally announced April 2023.

    Comments: 13 pages,3 figures

  44. arXiv:2302.04457  [pdf, other

    cs.CR

    Imperceptible Sample-Specific Backdoor to DNN with Denoising Autoencoder

    Authors: Xiangqi Wang, Mingfu Xue, Kewei Chen, Jing Xu, Wenmao Liu, Leo Yu Zhang, Yushu Zhang

    Abstract: The backdoor attack poses a new security threat to deep neural networks. Existing backdoor often relies on visible universal trigger to make the backdoored model malfunction, which are not only usually visually suspicious to human but also catchable by mainstream countermeasures. We propose an imperceptible sample-specific backdoor that the trigger varies from sample to sample and invisible. Our t… ▽ More

    Submitted 20 December, 2024; v1 submitted 9 February, 2023; originally announced February 2023.

  45. arXiv:2211.12294  [pdf, other

    cs.CV cs.CR

    PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples

    Authors: Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun

    Abstract: Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models have demonstrated their powerful capabilities, their robustness against adversarial attacks, which have been proven to be fatally malicious towards deep neural networks, remains unkno… ▽ More

    Submitted 1 December, 2022; v1 submitted 22 November, 2022; originally announced November 2022.

    Comments: Accepted by the 37th AAAI Conference on Artificial Intelligence (AAAI-23)

  46. M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models

    Authors: Linshan Hou, Zhongyun Hua, Yuhong Li, Yifeng Zheng, Leo Yu Zhang

    Abstract: Deep neural networks (DNNs) are vulnerable to backdoor attacks, where a backdoored model behaves normally with clean inputs but exhibits attacker-specified behaviors upon the inputs containing triggers. Most previous backdoor attacks mainly focus on either the all-to-one or all-to-all paradigm, allowing attackers to manipulate an input to attack a single target class. Besides, the two paradigms re… ▽ More

    Submitted 1 July, 2024; v1 submitted 3 November, 2022; originally announced November 2022.

    Comments: 14 pages; Accepted to IEEE Transactions on Circuits and Systems for Video Technology (2024)

  47. arXiv:2210.01437  [pdf, other

    cs.DC

    Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints

    Authors: Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng

    Abstract: Federated learning is a newly emerging distributed learning framework that facilitates the collaborative training of a shared global model among distributed participants with their privacy preserved. However, federated learning systems are vulnerable to Byzantine attacks from malicious participants, who can upload carefully crafted local model updates to degrade the quality of the global model and… ▽ More

    Submitted 12 October, 2022; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: This paper has been accepted by the 18th International Conference on Mobility, Sensing and Networking (MSN 2022)

  48. arXiv:2207.00278  [pdf, other

    cs.CV

    BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label

    Authors: Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan HE, Hai Jin

    Abstract: Due to its powerful feature learning capability and high efficiency, deep hashing has achieved great success in large-scale image retrieval. Meanwhile, extensive works have demonstrated that deep neural networks (DNNs) are susceptible to adversarial examples, and exploring adversarial attack against deep hashing has attracted many research efforts. Nevertheless, backdoor attack, another famous thr… ▽ More

    Submitted 13 July, 2022; v1 submitted 1 July, 2022; originally announced July 2022.

    Comments: This paper has been accepted by the 30th ACM International Conference on Multimedia (MM '22, October 10--14, 2022, Lisboa, Portugal)

  49. arXiv:2205.06986  [pdf, other

    cs.CR cs.AI

    Evaluating Membership Inference Through Adversarial Robustness

    Authors: Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu

    Abstract: The usage of deep learning is being escalated in many applications. Due to its outstanding performance, it is being used in a variety of security and privacy-sensitive areas in addition to conventional applications. One of the key aspects of deep learning efficacy is to have abundant data. This trait leads to the usage of data which can be highly sensitive and private, which in turn causes warines… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

    Comments: Accepted by The Computer Journal. Pre-print version

  50. Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection

    Authors: Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He

    Abstract: Federated learning (FL) enables multiple clients to collaboratively train an accurate global model while protecting clients' data privacy. However, FL is susceptible to Byzantine attacks from malicious participants. Although the problem has gained significant attention, existing defenses have several flaws: the server irrationally chooses malicious clients for aggregation even after they have been… ▽ More

    Submitted 7 August, 2023; v1 submitted 27 April, 2022; originally announced April 2022.

    Comments: This paper has been published on the 31st International Joint Conference on Artificial Intelligence (IJCAI-22, Main Track, LONG Oral Presentation)