Skip to main content

Showing 1–6 of 6 results for author: Shamsabadi, A S

Searching in archive stat. Search in all archives.
.
  1. arXiv:2505.23968  [pdf, other

    cs.CR cs.AI cs.CY cs.LG stat.ML

    Confidential Guardian: Cryptographically Prohibiting the Abuse of Model Abstention

    Authors: Stephan Rabanser, Ali Shahin Shamsabadi, Olive Franzese, Xiao Wang, Adrian Weller, Nicolas Papernot

    Abstract: Cautious predictions -- where a machine learning model abstains when uncertain -- are crucial for limiting harmful errors in safety-critical applications. In this work, we identify a novel threat: a dishonest institution can exploit these mechanisms to discriminate or unjustly deny services under the guise of uncertainty. We demonstrate the practicality of this threat by introducing an uncertainty… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

    Comments: Proceedings of the 42nd International Conference on Machine Learning

  2. arXiv:2409.13745  [pdf, other

    cs.CL cs.AI cs.CR cs.LG stat.ML

    Context-Aware Membership Inference Attacks against Pre-trained Large Language Models

    Authors: Hongyan Chang, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Reza Shokri

    Abstract: Prior Membership Inference Attacks (MIAs) on pre-trained Large Language Models (LLMs), adapted from classification model attacks, fail due to ignoring the generative process of LLMs across token sequences. In this paper, we present a novel attack that adapts MIA statistical tests to the perplexity dynamics of subsequences within a data point. Our method significantly outperforms prior loss-based a… ▽ More

    Submitted 10 September, 2024; originally announced September 2024.

  3. arXiv:2004.05703  [pdf, other

    cs.LG cs.CR stat.ML

    DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

    Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi

    Abstract: We present DarkneTZ, a framework that uses an edge device's Trusted Execution Environment (TEE) in conjunction with model partitioning to limit the attack surface against Deep Neural Networks (DNNs). Increasingly, edge devices (smartphones and consumer IoT devices) are equipped with pre-trained DNNs for a variety of applications. This trend comes with privacy risks as models can leak information a… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

    Comments: 13 pages, 8 figures, accepted to ACM MobiSys 2020

  4. arXiv:1910.12227  [pdf, other

    cs.LG cs.CV stat.ML

    EdgeFool: An Adversarial Image Enhancement Filter

    Authors: Ali Shahin Shamsabadi, Changjae Oh, Andrea Cavallaro

    Abstract: Adversarial examples are intentionally perturbed images that mislead classifiers. These images can, however, be easily detected using denoising algorithms, when high-frequency spatial perturbations are used, or can be noticed by humans, when perturbations are large. In this paper, we propose EdgeFool, an adversarial image enhancement filter that learns structure-aware adversarial perturbations. Ed… ▽ More

    Submitted 5 March, 2020; v1 submitted 27 October, 2019; originally announced October 2019.

    Journal ref: Proceedings of the 45th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)2020

  5. arXiv:1802.03583  [pdf, other

    cs.LG stat.ML

    Distributed One-class Learning

    Authors: Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro

    Abstract: We propose a cloud-based filter trained to block third parties from uploading privacy-sensitive images of others to online social media. The proposed filter uses Distributed One-Class Learning, which decomposes the cloud-based filter into multiple one-class classifiers. Each one-class classifier captures the properties of a class of privacy-sensitive images with an autoencoder. The multi-class fil… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

  6. arXiv:1802.03151  [pdf, other

    stat.ML cs.CR cs.CV cs.IT cs.LG

    Deep Private-Feature Extraction

    Authors: Seyed Ali Osia, Ali Taheri, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Hamid R. Rabiee

    Abstract: We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information… ▽ More

    Submitted 28 February, 2018; v1 submitted 9 February, 2018; originally announced February 2018.