Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Amit, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.15169  [pdf, other

    eess.IV cs.CR cs.CV

    Back-in-Time Diffusion: Unsupervised Detection of Medical Deepfakes

    Authors: Fred Grabovski, Lior Yasur, Guy Amit, Yuval Elovici, Yisroel Mirsky

    Abstract: Recent progress in generative models has made it easier for a wide audience to edit and create image content, raising concerns about the proliferation of deepfakes, especially in healthcare. Despite the availability of numerous techniques for detecting manipulated images captured by conventional cameras, their applicability to medical images is limited. This limitation stems from the distinctive f… ▽ More

    Submitted 21 July, 2024; originally announced July 2024.

  2. arXiv:2407.02870  [pdf, ps, other

    cs.LG cs.AI

    Membership Inference Attacks Against Time-Series Models

    Authors: Noam Koren, Abigail Goldsteen, Ariel Farkash, Guy Amit

    Abstract: Analyzing time-series data that may contain personal information, particularly in the medical field, presents serious privacy concerns. Sensitive health data from patients is often used to train machine-learning models for diagnostics and ongoing care. Assessing the privacy risk of such models is crucial to making knowledgeable decisions on whether to use a model in production, share it with third… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: 16 pages

  3. arXiv:2405.20446  [pdf, other

    cs.CR cs.AI cs.LG

    Is My Data in Your Retrieval Database? Membership Inference Attacks Against Retrieval Augmented Generation

    Authors: Maya Anderson, Guy Amit, Abigail Goldsteen

    Abstract: Retrieval Augmented Generation (RAG) systems have shown great promise in natural language processing. However, their reliance on data stored in a retrieval database, which may contain proprietary or sensitive information, introduces new privacy concerns. Specifically, an attacker may be able to infer whether a certain text passage appears in the retrieval database by observing the outputs of the R… ▽ More

    Submitted 7 June, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

    Comments: 16 pages, 3 figures

    ACM Class: I.2; K.6.5

  4. arXiv:2403.09751  [pdf, other

    cs.CR cs.AI cs.CL

    What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

    Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky

    Abstract: AI assistants are becoming an integral part of society, used for asking advice or help in personal and confidential issues. In this paper, we unveil a novel side-channel that can be used to read encrypted responses from AI Assistants over the web: the token-length side-channel. We found that many vendors, including OpenAI and Microsoft, have this side-channel. However, inferring the content of a… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  5. arXiv:2403.08481  [pdf, other

    cs.LG cs.CR

    SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks

    Authors: Guy Amit, Abigail Goldsteen, Ariel Farkash

    Abstract: Natural language processing models have experienced a significant upsurge in recent years, with numerous applications being built upon them. Many of these applications require fine-tuning generic base models on customized, proprietary datasets. This fine-tuning data is especially likely to contain personal or sensitive information about individuals, resulting in increased privacy risk. Membership… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: preliminary version

  6. arXiv:2311.07389  [pdf, other

    cs.LG cs.CR

    Transpose Attack: Stealing Datasets with Bidirectional Training

    Authors: Guy Amit, Mosh Levy, Yisroel Mirsky

    Abstract: Deep neural networks are normally executed in the forward direction. However, in this work, we identify a vulnerability that enables models to be trained in both directions and on different tasks. Adversaries can exploit this capability to hide rogue models within seemingly legitimate models. In addition, in this work we show that neural networks can be taught to systematically memorize and retrie… ▽ More

    Submitted 17 May, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

    Comments: NDSS24 paper, Transpose Attack, Transposed Model. NDSS version: https://www.ndss-symposium.org/ndss-paper/transpose-attack-stealing-datasets-with-bidirectional-training/

  7. arXiv:2212.02081  [pdf, other

    cs.CV cs.LG

    YolOOD: Utilizing Object Detection Concepts for Multi-Label Out-of-Distribution Detection

    Authors: Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai

    Abstract: Out-of-distribution (OOD) detection has attracted a large amount of attention from the machine learning research community in recent years due to its importance in deployed systems. Most of the previous studies focused on the detection of OOD samples in the multi-class classification task. However, OOD detection in the multi-label classification task, a more common real-world use case, remains an… ▽ More

    Submitted 21 November, 2023; v1 submitted 5 December, 2022; originally announced December 2022.

    Comments: 10 pages, 6 figures

  8. arXiv:2208.10878  [pdf, other

    cs.LG cs.CR

    Transferability Ranking of Adversarial Examples

    Authors: Mosh Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky

    Abstract: Adversarial transferability in black-box scenarios presents a unique challenge: while attackers can employ surrogate models to craft adversarial examples, they lack assurance on whether these examples will successfully compromise the target model. Until now, the prevalent method to ascertain success has been trial and error-testing crafted samples directly on the victim model. This approach, howev… ▽ More

    Submitted 18 April, 2024; v1 submitted 23 August, 2022; originally announced August 2022.

  9. arXiv:2201.08661  [pdf, other

    cs.CR cs.LG eess.IV

    The Security of Deep Learning Defences for Medical Imaging

    Authors: Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky

    Abstract: Deep learning has shown great promise in the domain of medical image analysis. Medical professionals and healthcare providers have been adopting the technology to speed up and enhance their work. These systems use deep neural networks (DNN) which are vulnerable to adversarial samples; images with imperceivable changes that can alter the model's prediction. Researchers have proposed defences which… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  10. arXiv:2009.05283  [pdf, other

    cs.CV cs.AI cs.LG

    Fair and accurate age prediction using distribution aware data curation and augmentation

    Authors: Yushi Cao, David Berend, Palina Tolmach, Guy Amit, Moshe Levy, Yang Liu, Asaf Shabtai, Yuval Elovici

    Abstract: Deep learning-based facial recognition systems have experienced increased media attention due to exhibiting unfair behavior. Large enterprises, such as IBM, shut down their facial recognition and age prediction systems as a consequence. Age prediction is an especially difficult application with the issue of fairness remaining an open research problem (e.g., predicting age for different ethnicity e… ▽ More

    Submitted 16 November, 2021; v1 submitted 11 September, 2020; originally announced September 2020.

    Comments: Preprint, accepted at WACV'22

  11. arXiv:2008.06856  [pdf, other

    cs.LG stat.ML

    FOOD: Fast Out-Of-Distribution Detector

    Authors: Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici

    Abstract: Deep neural networks (DNNs) perform well at classifying inputs associated with the classes they have been trained on, which are known as in distribution inputs. However, out-of-distribution (OOD) inputs pose a great challenge to DNNs and consequently represent a major risk when DNNs are implemented in safety-critical systems. Extensive research has been performed in the domain of OOD detection. Ho… ▽ More

    Submitted 23 February, 2021; v1 submitted 16 August, 2020; originally announced August 2020.

    Comments: Guy Amit and Moshe Levy contributed equally to this paper Updated version

  12. arXiv:2002.02176  [pdf, other

    cs.LG stat.ML

    GIM: Gaussian Isolation Machines

    Authors: Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici

    Abstract: In many cases, neural network classifiers are likely to be exposed to input data that is outside of their training distribution data. Samples from outside the distribution may be classified as an existing class with high probability by softmax-based classifiers; such incorrect classifications affect the performance of the classifiers and the applications/systems that depend on them. Previous resea… ▽ More

    Submitted 21 March, 2020; v1 submitted 6 February, 2020; originally announced February 2020.

    Comments: Submitted to IJCNN2020 conference