Search Results for author: Samuel Marchal

Found 10 papers, 6 papers with code

A Survey on XAI for Beyond 5G Security: Technical Aspects, Use Cases, Challenges and Research Directions

no code implementations27 Apr 2022 Thulitha Senevirathna, Vinh Hoa La, Samuel Marchal, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang

With the advent of 5G commercialization, the need for more reliable, faster, and intelligent telecommunication systems are envisaged for the next generation beyond 5G (B5G) radio access technologies.

Decision Making Edge-computing +2

Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses

1 code implementation16 Jun 2021 Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan

Via an extensive evaluation using three Atari 2600 games, we show that our attacks are effective, as they fully degrade the performance of three different DRL agents (up to 100%, even when the $l_\infty$ bound on the perturbation is as small as 0. 01).

Atari Games reinforcement-learning +1

BAFFLE: TOWARDS RESOLVING FEDERATED LEARNING’S DILEMMA - THWARTING BACKDOOR AND INFERENCE ATTACKS

no code implementations1 Jan 2021 Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni

Recently, federated learning (FL) has been subject to both security and privacy attacks posing a dilemmatic challenge on the underlying algorithmic designs: On the one hand, FL is shown to be vulnerable to backdoor attacks that stealthily manipulate the global model output using malicious model updates, and on the other hand, FL is shown vulnerable to inference attacks by a malicious aggregator inferring information about clients’ data from their model updates.

Federated Learning Image Classification

WAFFLE: Watermarking in Federated Learning

1 code implementation17 Aug 2020 Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan

In this paper, we present WAFFLE, the first approach to watermark DNN models trained using federated learning.

Federated Learning

Extraction of Complex DNN Models: Real Threat or Boogeyman?

no code implementations11 Oct 2019 Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan

However, model extraction attacks can steal the functionality of ML models using the information leaked to clients through the results returned via the API.

Model extraction

Detecting organized eCommerce fraud using scalable categorical clustering

1 code implementation10 Oct 2019 Samuel Marchal, Sebastian Szyller

Our approach is based on clustering and aims to group together fraudulent orders placed by the same group of fraudsters.

Clustering Fraud Detection

DAWN: Dynamic Adversarial Watermarking of Neural Networks

1 code implementation3 Jun 2019 Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan

Existing watermarking schemes are ineffective against IP theft via model extraction since it is the adversary who trains the surrogate model.

Model extraction

PRADA: Protecting against DNN Model Stealing Attacks

2 code implementations7 May 2018 Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan

Access to the model can be restricted to be only via well-defined prediction APIs.

Cryptography and Security

DIoT: A Self-learning System for Detecting Compromised IoT Devices

no code implementations20 Apr 2018 Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, N. Asokan, Ahmad-Reza Sadeghi

Consequently, DIoT can cope with the emergence of new device types as well as new attacks.

Cryptography and Security

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

2 code implementations15 Nov 2016 Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma

In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.