Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Paek, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.15591  [pdf, other

    cs.LG

    VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification

    Authors: Yungi Cho, Woorim Han, Miseon Yu, Younghan Lee, Ho Bae, Yunheung Paek

    Abstract: Vertical Federated Learning (VFL) focuses on handling vertically partitioned data over FL participants. Recent studies have discovered a significant vulnerability in VFL to backdoor attacks which specifically target the distinct characteristics of VFL. Therefore, these attacks may neutralize existing defense mechanisms designed primarily for Horizontal Federated Learning (HFL) and deep neural netw… ▽ More

    Submitted 28 August, 2024; v1 submitted 28 August, 2024; originally announced August 2024.

    Comments: Accepted by 29th European Symposium on Research in Computer Security (ESORICS 2024)

  2. arXiv:2403.02870  [pdf, other

    cs.AI cs.CR cs.LG

    Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices

    Authors: Younghan Lee, Sohee Jun, Yungi Cho, Woorim Han, Hyungon Moon, Yunheung Paek

    Abstract: With growing popularity, deep learning (DL) models are becoming larger-scale, and only the companies with vast training datasets and immense computing power can manage their business serving such large models. Most of those DL models are proprietary to the companies who thus strive to keep their private models safe from the model extraction attack (MEA), whose aim is to steal the model by training… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: Accepted by 27th European Symposium on Research in Computer Security (ESORICS 2022)

  3. arXiv:2403.02846  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models

    Authors: Younghan Lee, Yungi Cho, Woorim Han, Ho Bae, Yunheung Paek

    Abstract: Federated Learning (FL) thrives in training a global model with numerous clients by only sharing the parameters of their local models trained with their private training datasets. Therefore, without revealing the private dataset, the clients can obtain a deep learning (DL) model with high performance. However, recent research proposed poisoning attacks that cause a catastrophic loss in the accurac… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: Accepted by 28th European Symposium on Research in Computer Security (ESORICS 2023)

  4. arXiv:1803.09171  [pdf, other

    cs.CR

    Extended Abstract: Mimicry Resilient Program Behavior Modeling with LSTM based Branch Models

    Authors: Hayoon Yi, Gyuwan Kim, Jangho Lee, Sunwoo Ahn, Younghan Lee, Sungroh Yoon, Yunheung Paek

    Abstract: In the software design, protecting a computer system from a plethora of software attacks or malware in the wild has been increasingly important. One branch of research to detect the existence of attacks or malware, there has been much work focused on modeling the runtime behavior of a program. Stemming from the seminal work of Forrest et al., one of the main tools to model program behavior is syst… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: 1st Deep Learning and Security Workshop (DLS 2018)

  5. arXiv:1611.01726  [pdf, other

    cs.CR cs.LG

    LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems

    Authors: Gyuwan Kim, Hayoon Yi, Jangho Lee, Yunheung Paek, Sungroh Yoon

    Abstract: In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. In this paper, we propose a system-call language-modeling approach for designing anomaly-based host intrusion detection systems. To remedy the issue of high false-alarm rates commonly arising in conventional methods, we employ a novel ensemble method that blends multiple thres… ▽ More

    Submitted 6 November, 2016; originally announced November 2016.

    Comments: 12 pages, 5 figures

  6. arXiv:1511.02435  [pdf

    cs.CL

    A Chinese POS Decision Method Using Korean Translation Information

    Authors: Son-Il Kwak, O-Chol Kown, Chang-Sin Kim, Yong-Il Pak, Gum-Chol Son, Chol-Jun Hwang, Hyon-Chol Kim, Hyok-Chol Sin, Gyong-Il Hyon, Sok-Min Han

    Abstract: In this paper we propose a method that imitates a translation expert using the Korean translation information and analyse the performance. Korean is good at tagging than Chinese, so we can use this property in Chinese POS tagging.

    Submitted 7 November, 2015; originally announced November 2015.

    Comments: 6 pages, 0 figures