Skip to main content

Showing 1–13 of 13 results for author: Tourani, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.04601  [pdf, other

    cs.CR cs.LG

    LATTEO: A Framework to Support Learning Asynchronously Tempered with Trusted Execution and Obfuscation

    Authors: Abhinav Kumar, George Torres, Noah Guzinski, Gaurav Panwar, Reza Tourani, Satyajayant Misra, Marcin Spoczynski, Mona Vij, Nageen Himayat

    Abstract: The privacy vulnerabilities of the federated learning (FL) paradigm, primarily caused by gradient leakage, have prompted the development of various defensive measures. Nonetheless, these solutions have predominantly been crafted for and assessed in the context of synchronous FL systems, with minimal focus on asynchronous FL. This gap arises in part due to the unique challenges posed by the asynchr… ▽ More

    Submitted 6 February, 2025; originally announced February 2025.

  2. arXiv:2501.18617  [pdf, other

    cs.CR cs.LG

    DarkMind: Latent Chain-of-Thought Backdoor in Customized LLMs

    Authors: Zhen Guo, Reza Tourani

    Abstract: With the growing demand for personalized AI solutions, customized LLMs have become a preferred choice for businesses and individuals, driving the deployment of millions of AI agents across various platforms, e.g., GPT Store hosts over 3 million customized GPTs. Their popularity is partly driven by advanced reasoning capabilities, such as Chain-of-Thought, which enhance their ability to tackle comp… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

    Comments: 21 pages, 9 figures, 13 tables

  3. arXiv:2409.13864  [pdf, other

    cs.LG cs.CR

    Persistent Backdoor Attacks in Continual Learning

    Authors: Zhen Guo, Abhinav Kumar, Reza Tourani

    Abstract: Backdoor attacks pose a significant threat to neural networks, enabling adversaries to manipulate model outputs on specific inputs, often with devastating consequences, especially in critical applications. While backdoor attacks have been studied in various contexts, little attention has been given to their practicality and persistence in continual learning, particularly in understanding how the c… ▽ More

    Submitted 20 September, 2024; originally announced September 2024.

    Comments: 18 pages, 15 figures, 6 tables

    Journal ref: Proceedings of the 2025 USENIX Security Symposium

  4. arXiv:2407.01306  [pdf, other

    cs.LG cs.CR

    Unveiling the Unseen: Exploring Whitebox Membership Inference through the Lens of Explainability

    Authors: Chenxi Li, Abhinav Kumar, Zhen Guo, Jie Hou, Reza Tourani

    Abstract: The increasing prominence of deep learning applications and reliance on personalized data underscore the urgent need to address privacy vulnerabilities, particularly Membership Inference Attacks (MIAs). Despite numerous MIA studies, significant knowledge gaps persist, particularly regarding the impact of hidden features (in isolation) on attack efficacy and insufficient justification for the root… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 20 pages, 10 figures, 4 tables

  5. arXiv:2407.00866  [pdf, other

    cs.LG

    Silver Linings in the Shadows: Harnessing Membership Inference for Machine Unlearning

    Authors: Nexhi Sula, Abhinav Kumar, Jie Hou, Han Wang, Reza Tourani

    Abstract: With the continued advancement and widespread adoption of machine learning (ML) models across various domains, ensuring user privacy and data security has become a paramount concern. In compliance with data privacy regulations, such as GDPR, a secure machine learning framework should not only grant users the right to request the removal of their contributed data used for model training but also fa… ▽ More

    Submitted 5 July, 2024; v1 submitted 30 June, 2024; originally announced July 2024.

    Comments: 17 pages, 14 figures, 6 tables

  6. A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference

    Authors: Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra

    Abstract: The growing popularity of Machine Learning (ML) has led to its deployment in various sensitive domains, which has resulted in significant research focused on ML security and privacy. However, in some applications, such as Augmented/Virtual Reality, integrity verification of the outsourced ML tasks is more critical--a facet that has not received much attention. Existing solutions, such as multi-par… ▽ More

    Submitted 24 April, 2024; v1 submitted 31 March, 2023; originally announced April 2023.

    Comments: 15 pages, 12 figures

  7. arXiv:2201.06050  [pdf, other

    cs.NI

    Harpocrates: Anonymous Data Publication in Named Data Networking

    Authors: Md Washik Al Azad, Reza Tourani, Abderrahmen Mtibaa, Spyridon Mastorakis

    Abstract: Named-Data Networking (NDN), a prominent realization of the Information-Centric Networking (ICN) vision, offers a request-response communication model where data is identified based on application-defined names at the network layer. This amplifies the ability of censoring authorities to restrict user access to certain data/websites/applications and monitor user requests. The majority of existing N… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

    Comments: This paper has been accepted by the ACM Symposium on Access Control Models and Technologies (SACMAT) 2022. The definite version of this work will be published by ACM as part of the SACMAT conference proceedings

  8. arXiv:2010.10334  [pdf, other

    cs.CR cs.LG cs.NI

    DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding

    Authors: Spyridon Mastorakis, Xin Zhong, Pei-Chi Huang, Reza Tourani

    Abstract: The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physical… ▽ More

    Submitted 17 October, 2020; originally announced October 2020.

    Comments: 7 pages. This paper has been accepted for publication by the 18th IEEE Annual Consumer Communications & Networking Conference (CCNC). The copyright is with the IEEE. arXiv admin note: text overlap with arXiv:2007.02460

  9. arXiv:2008.05052  [pdf, ps, other

    cs.LG math.ST stat.ML

    Predictive and Causal Implications of using Shapley Value for Model Interpretation

    Authors: Sisi Ma, Roshan Tourani

    Abstract: Shapley value is a concept from game theory. Recently, it has been used for explaining complex models produced by machine learning techniques. Although the mathematical definition of Shapley value is straight-forward, the implication of using it as a model interpretation tool is yet to be described. In the current paper, we analyzed Shapley value in the Bayesian network framework. We established t… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Comments: Accepted by KDD CD workshop 2020

    MSC Class: 62H22; 62H30 ACM Class: I.2.6; G.3

  10. arXiv:2007.00641  [pdf, other

    cs.NI

    Democratizing the Edge: A Pervasive Edge Computing Framework

    Authors: Reza Tourani, Srikathyayani Srikanteswara, Satyajayant Misra, Richard Chow, Lily Yang, Xiruo Liu, Yi Zhang

    Abstract: The needs of emerging applications, such as augmented and virtual reality, federated machine learning, and autonomous driving, have motivated edge computing--the push of computation capabilities to the edge. Various edge computing architectures have emerged, including multi-access edge computing and edge-cloud, all with the premise of reducing communication latency and augmenting privacy. However,… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

    Comments: 7 pages, 4 figures

  11. arXiv:1703.08453  [pdf, other

    cs.NI

    LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities

    Authors: Travis Mick, Reza Tourani, Satyajayant Misra

    Abstract: Recent literature suggests that the Internet of Things (IoT) scales much better in an Information-Centric Networking (ICN) model instead of the current host-centric Internet Protocol (IP) model. In particular, the Named Data Networking (NDN) project (one of the ICN architecture flavors) offers features exploitable by IoT applications, such as stateful forwarding, in- network caching, and built-in… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

    Comments: 9 pages, 8 figures, journal paper

  12. arXiv:1603.03501  [pdf, other

    cs.NI cs.CR

    AccConF: An Access Control Framework for Leveraging In-Network Cached Data in ICNs

    Authors: S. Misra, R. Tourani, F. Natividad, T. Mick, N. Majd, H. Huang

    Abstract: The fast-growing Internet traffic is increasingly becoming content-based and driven by mobile users, with users more interested in data rather than its source. This has precipitated the need for an information-centric Internet architecture. Research in information-centric networks (ICNs) have resulted in novel architectures, e.g., CCN/NDN, DONA, and PSIRP/PURSUIT; all agree on named data based add… ▽ More

    Submitted 10 March, 2016; originally announced March 2016.

    Comments: 13 pages, 6 figures

  13. arXiv:1603.03409  [pdf, other

    cs.NI cs.CR

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    Authors: Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar

    Abstract: Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents origin. Content and client security are more intrinsic in the ICN paradigm versus the cur… ▽ More

    Submitted 1 June, 2017; v1 submitted 10 March, 2016; originally announced March 2016.

    Comments: 36 pages, 17 figures