Search Results for author: Esha Sarkar

Found 6 papers, 0 papers with code

Scalable privacy-preserving cancer type prediction with homomorphic encryption

no code implementations12 Apr 2022 Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos

Privacy concerns in outsourced ML, especially in the field of genetics, motivate the use of encrypted computation, like Homomorphic Encryption (HE).

Decision Making feature selection +3

PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks

no code implementations17 Mar 2022 Yue Wang, Wenqing Li, Esha Sarkar, Muhammad Shafique, Michail Maniatakos, Saif Eddin Jabari

Based on our theoretical analysis and experimental results, we demonstrate the effectiveness of PiDAn in defending against backdoor attacks that use different settings of poisoned samples on GTSRB and ILSVRC2012 datasets.

Anomaly Detection Backdoor Attack

TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis

no code implementations14 Aug 2021 Esha Sarkar, Michail Maniatakos

Using a real-world cancer dataset, we analyze the dataset with the bias that already existed towards white individuals and also introduced biases in datasets artificially, and our experimental result show that TRAPDOOR can detect the presence of dataset bias with 100% accuracy, and furthermore can also extract the extent of bias by recovering the percentage with a small error.

BIG-bench Machine Learning

Explainability Matters: Backdoor Attacks on Medical Imaging

no code implementations30 Dec 2020 Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, Farah Shamout

Extensive evaluation of a state-of-the-art architecture demonstrates that by introducing images with few-pixel perturbations into the training set, an attacker can execute the backdoor successfully without having to be involved with the training procedure.

FaceHack: Triggering backdoored facial recognition systems using facial characteristics

no code implementations20 Jun 2020 Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos

In this work, we demonstrate that specific changes to facial characteristics may also be used to trigger malicious behavior in an ML model.

Cannot find the paper you are looking for? You can Submit a new open access paper.