Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Hou, Y T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.09972  [pdf, other

    cs.LG cs.CR eess.IV

    Harvesting Private Medical Images in Federated Learning Systems with Crafted Models

    Authors: Shanghao Shi, Md Shahedul Haque, Abhijeet Parida, Marius George Linguraru, Y. Thomas Hou, Syed Muhammad Anwar, Wenjing Lou

    Abstract: Federated learning (FL) allows a set of clients to collaboratively train a machine-learning model without exposing local training samples. In this context, it is considered to be privacy-preserving and hence has been adopted by medical centers to train machine-learning models over private data. However, in this paper, we propose a novel attack named MediLeak that enables a malicious parameter serv… ▽ More

    Submitted 13 July, 2024; originally announced July 2024.

  2. arXiv:2407.09658  [pdf, other

    cs.LG cs.CR

    BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning

    Authors: Ning Wang, Shanghao Shi, Yang Xiao, Yimin Chen, Y. Thomas Hou, Wenjing Lou

    Abstract: Federated learning, while being a promising approach for collaborative model training, is susceptible to poisoning attacks due to its decentralized nature. Backdoor attacks, in particular, have shown remarkable stealthiness, as they selectively compromise predictions for inputs containing triggers. Previous endeavors to detect and mitigate such attacks are based on the Independent and Identically… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  3. arXiv:2406.13073  [pdf, other

    cs.LG cs.CR cs.CV

    NoiSec: Harnessing Noise for Security against Adversarial and Backdoor Attacks

    Authors: Md Hasan Shahriar, Ning Wang, Y. Thomas Hou, Wenjing Lou

    Abstract: The exponential adoption of machine learning (ML) is propelling the world into a future of intelligent automation and data-driven solutions. However, the proliferation of malicious data manipulation attacks against ML, namely adversarial and backdoor attacks, jeopardizes its reliability in safety-critical applications. The existing detection methods against such attacks are built upon assumptions,… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 20 pages, 7 figures

  4. arXiv:2405.20521  [pdf, other

    cs.CR

    SoK: Public Blockchain Sharding

    Authors: Md Mohaimin Al Barat, Shaoyu Li, Changlai Du, Y. Thomas Hou, Wenjing Lou

    Abstract: Blockchain's decentralization, transparency, and tamper-resistance properties have facilitated the system's use in various application fields. However, the low throughput and high confirmation latency hinder the widespread adoption of Blockchain. Many solutions have been proposed to address these issues, including first-layer solutions (or on-chain solutions) and second-layer solutions (or off-cha… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 18 pages

  5. arXiv:2405.02466  [pdf, other

    cs.CR cs.LG

    ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models

    Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou

    Abstract: Large language models (LLMs) have attracted significant attention in recent years. Due to their "Large" nature, training LLMs from scratch consumes immense computational resources. Since several major players in the artificial intelligence (AI) field have open-sourced their original LLMs, an increasing number of individual researchers and smaller companies are able to build derivative LLMs based o… ▽ More

    Submitted 26 June, 2024; v1 submitted 3 May, 2024; originally announced May 2024.

    Comments: This is the author's pre-print version of the work. It is posted here for your personal use. Not for redistribution

  6. arXiv:2403.02573  [pdf, other

    cs.LG

    Learning-augmented Online Minimization of Age of Information and Transmission Costs

    Authors: Zhongdong Liu, Keyuan Zhang, Bin Li, Yin Sun, Y. Thomas Hou, Bo Ji

    Abstract: We consider a discrete-time system where a resource-constrained source (e.g., a small sensor) transmits its time-sensitive data to a destination over a time-varying wireless channel. Each transmission incurs a fixed transmission cost (e.g., energy cost), and no transmission results in a staleness cost represented by the Age-of-Information. The source must balance the tradeoff between transmission… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: A preliminary version of this work is to be presented at IEEE INFOCOM 2024 Age and Semantics of Information Workshop

  7. arXiv:2311.05808  [pdf, other

    cs.LG

    Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction

    Authors: Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, Wenjing Lou

    Abstract: Federated learning is known for its capability to safeguard participants' data privacy. However, recently emerged model inversion attacks (MIAs) have shown that a malicious parameter server can reconstruct individual users' local data samples through model updates. The state-of-the-art attacks either rely on computation-intensive search-based optimization processes to recover each input batch, mak… ▽ More

    Submitted 14 November, 2023; v1 submitted 9 November, 2023; originally announced November 2023.

  8. CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level

    Authors: Md Hasan Shahriar, Yang Xiao, Pablo Moriano, Wenjing Lou, Y. Thomas Hou

    Abstract: Modern vehicles rely on a fleet of electronic control units (ECUs) connected through controller area network (CAN) buses for critical vehicular control. With the expansion of advanced connectivity features in automobiles and the elevated risks of internal system exposure, the CAN bus is increasingly prone to intrusions and injection attacks. As ordinary injection attacks disrupt the typical timing… ▽ More

    Submitted 7 October, 2023; v1 submitted 3 May, 2022; originally announced May 2022.

    Comments: 17 pages, 13 figures, A version of this paper is accepted by IEEE Internet of Things Journal

  9. Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems

    Authors: Zhongdong Liu, Bin Li, Zizhan Zheng, Y. Thomas Hou, Bo Ji

    Abstract: In this paper, we consider a discrete-time information-update system, where a service provider can proactively retrieve information from the information source to update its data and users query the data at the service provider. One example is crowdsensing-based applications. In order to keep users satisfied, the application desires to provide users with fresh data, where the freshness is measured… ▽ More

    Submitted 9 January, 2023; v1 submitted 29 April, 2022; originally announced April 2022.

    Comments: Accepted by IEEE Internet of Things Journal

  10. Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution

    Authors: Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, Jeffrey H. Reed

    Abstract: Spectrum access system (SAS) is widely considered the de facto solution to coordinating dynamic spectrum sharing (DSS) and protecting incumbent users. The current SAS paradigm prescribed by the FCC for the CBRS band and standardized by the WInnForum follows a centralized service model in that a spectrum user subscribes to a SAS server for spectrum allocation service. This model, however, neither t… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

    Comments: A version of this work has been accepted by IEEE Wireless Communications for publication

    Journal ref: IEEE Wireless Communications (2022)

  11. arXiv:2107.05181  [pdf, other

    cs.NI cs.AI eess.SP

    AoI-minimizing Scheduling in UAV-relayed IoT Networks

    Authors: Biplav Choudhury, Vijay K. Shah, Aidin Ferdowsi, Jeffrey H. Reed, Y. Thomas Hou

    Abstract: Due to flexibility, autonomy and low operational cost, unmanned aerial vehicles (UAVs), as fixed aerial base stations, are increasingly being used as \textit{relays} to collect time-sensitive information (i.e., status updates) from IoT devices and deliver it to the nearby terrestrial base station (TBS), where the information gets processed. In order to ensure timely delivery of information to the… ▽ More

    Submitted 24 September, 2021; v1 submitted 11 July, 2021; originally announced July 2021.

  12. Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain

    Authors: Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou

    Abstract: Blockchain, the technology behind the popular Bitcoin, is considered a "security by design" system as it is meant to create security among a group of distrustful parties yet without a central trusted authority. The security of blockchain relies on the premise of honest-majority, namely, the blockchain system is assumed to be secure as long as the majority of consensus voting power is honest. And i… ▽ More

    Submitted 31 August, 2020; v1 submitted 20 February, 2020; originally announced February 2020.

    Comments: In proceedings of 2020 IEEE International Conference on Computer Communications (INFOCOM 2020)

    Journal ref: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, 2020, pp. 1648-1657

  13. arXiv:1912.08454  [pdf, ps, other

    cs.CR cs.DB cs.DC

    Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data

    Authors: Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou

    Abstract: While the security of the cloud remains a concern, a common practice is to encrypt data before outsourcing them for utilization. One key challenging issue is how to efficiently perform queries over the ciphertext. Conventional crypto-based solutions, e.g. partially/fully homomorphic encryption and searchable encryption, suffer from low performance, poor expressiveness and weak compatibility. An al… ▽ More

    Submitted 18 December, 2019; originally announced December 2019.

  14. arXiv:1907.06141  [pdf, ps, other

    eess.SP cs.NI

    A Real-Time mmWave Communication Testbed with Phase Noise Cancellation

    Authors: Adnan Quadri, Huacheng Zeng, Y. Thomas Hou

    Abstract: As the spectrum under 6 GHz is being depleted, pushing wireless communications onto millimeter wave (mmWave) frequencies is a trend that promises multi-Gbps data rate. mmWave is therefore considered as a key technology for 5G wireless systems and has attracted tremendous research efforts. The booming research on mmWave necessitates a reconfigurable mmWave testbed that can be used to prototype and… ▽ More

    Submitted 13 July, 2019; originally announced July 2019.

  15. arXiv:1904.07275  [pdf, other

    cs.CR

    PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution

    Authors: Yang Xiao, Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou

    Abstract: The abundance and rich varieties of data are enabling many transformative applications of big data analytics that have profound societal impacts. However, there are also increasing concerns regarding the improper use of individual data owner's private data. In this paper, we propose PrivacyGuard, a system that leverages blockchain smart contract and trusted execution environment (TEE) to enable in… ▽ More

    Submitted 16 July, 2020; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: To appear in the 25th European Symposium on Research in Computer Security (ESORICS 2020), September 14 - 18, 2020

  16. A Survey of Distributed Consensus Protocols for Blockchain Networks

    Authors: Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou

    Abstract: Since the inception of Bitcoin, cryptocurrencies and the underlying blockchain technology have attracted an increasing interest from both academia and industry. Among various core components, consensus protocol is the defining technology behind the security and performance of blockchain. From incremental modifications of Nakamoto consensus protocol to innovative alternative consensus mechanisms, m… ▽ More

    Submitted 28 January, 2020; v1 submitted 8 April, 2019; originally announced April 2019.

    Comments: Accepted by the IEEE Communications Surveys and Tutorials for publication

  17. arXiv:0704.0967  [pdf, ps, other

    cs.IT cs.AR

    Cross-Layer Optimization of MIMO-Based Mesh Networks with Gaussian Vector Broadcast Channels

    Authors: Jia Liu, Y. Thomas Hou

    Abstract: MIMO technology is one of the most significant advances in the past decade to increase channel capacity and has a great potential to improve network capacity for mesh networks. In a MIMO-based mesh network, the links outgoing from each node sharing the common communication spectrum can be modeled as a Gaussian vector broadcast channel. Recently, researchers showed that ``dirty paper coding'' (DP… ▽ More

    Submitted 6 April, 2007; originally announced April 2007.

  18. arXiv:cs/0703111  [pdf, ps, other

    cs.IT

    Maximum Weighted Sum Rate of Multi-Antenna Broadcast Channels

    Authors: Jia Liu, Y. Thomas Hou

    Abstract: Recently, researchers showed that dirty paper coding (DPC) is the optimal transmission strategy for multiple-input multiple-output broadcast channels (MIMO-BC). In this paper, we study how to determine the maximum weighted sum of DPC rates through solving the maximum weighted sum rate problem of the dual MIMO multiple access channel (MIMO-MAC) with a sum power constraint. We first simplify the m… ▽ More

    Submitted 22 March, 2007; originally announced March 2007.

  19. arXiv:cs/0701061  [pdf, ps, other

    cs.IT

    Conjugate Gradient Projection Approach for Multi-Antenna Gaussian Broadcast Channels

    Authors: Jia Liu, Y. Thomas Hou, Hanif D. Sherali

    Abstract: It has been shown recently that the dirty-paper coding is the optimal strategy for maximizing the sum rate of multiple-input multiple-output Gaussian broadcast channels (MIMO BC). Moreover, by the channel duality, the nonconvex MIMO BC sum rate problem can be transformed to the convex dual MIMO multiple-access channel (MIMO MAC) problem with a sum power constraint. In this paper, we design an ef… ▽ More

    Submitted 9 January, 2007; originally announced January 2007.