Skip to main content

Showing 1–50 of 51 results for author: Zhang, L Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.20242  [pdf, other

    cs.CY cs.AI cs.RO

    The Threats of Embodied Multimodal LLMs: Jailbreaking Robotic Manipulation in the Physical World

    Authors: Hangtao Zhang, Chenyu Zhu, Xianlong Wang, Ziqi Zhou, Yichen Wang, Lulu Xue, Minghui Li, Shengshan Hu, Leo Yu Zhang

    Abstract: Embodied artificial intelligence (AI) represents an artificial intelligence system that interacts with the physical world through sensors and actuators, seamlessly integrating perception and action. This design enables AI to learn from and operate within complex, real-world environments. Large Language Models (LLMs) deeply explore language instructions, playing a crucial role in devising plans for… ▽ More

    Submitted 15 August, 2024; v1 submitted 16 July, 2024; originally announced July 2024.

    Comments: Preliminary version (17 pages, 4 figures). Work in progress, revisions ongoing. Appreciate understanding and welcome any feedback

  2. arXiv:2406.15093  [pdf, other

    cs.CR cs.CV eess.IV

    ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification

    Authors: Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin

    Abstract: Clean-label indiscriminate poisoning attacks add invisible perturbations to correctly labeled training images, thus dramatically reducing the generalization capability of the victim models. Recently, some defense mechanisms have been proposed such as adversarial training, image transformation techniques, and image purification. However, these schemes are either susceptible to adaptive attacks, bui… ▽ More

    Submitted 24 June, 2024; v1 submitted 21 June, 2024; originally announced June 2024.

    Comments: Accepted by ESORICS 2024

  3. arXiv:2406.03880  [pdf, other

    cs.LG cs.AI

    Memorization in deep learning: A survey

    Authors: Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Ming Ding, Chao Chen, Kok-Leong Ong, Jun Zhang, Yang Xiang

    Abstract: Deep Learning (DL) powered by Deep Neural Networks (DNNs) has revolutionized various domains, yet understanding the intricacies of DNN decision-making and learning processes remains a significant challenge. Recent investigations have uncovered an interesting memorization phenomenon in which DNNs tend to memorize specific details from examples rather than learning general patterns, affecting model… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

  4. arXiv:2405.19677  [pdf, other

    cs.CR cs.AI

    Large Language Model Watermark Stealing With Mixed Integer Programming

    Authors: Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill, Shirui Pan

    Abstract: The Large Language Model (LLM) watermark is a newly emerging technique that shows promise in addressing concerns surrounding LLM copyright, monitoring AI-generated text, and preventing its misuse. The LLM watermark scheme commonly includes generating secret keys to partition the vocabulary into green and red lists, applying a perturbation to the logits of tokens in the green list to increase their… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 12 pages

  5. arXiv:2405.09786  [pdf, other

    cs.LG cs.CR

    IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency

    Authors: Linshan Hou, Ruili Feng, Zhongyun Hua, Wei Luo, Leo Yu Zhang, Yiming Li

    Abstract: Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries can maliciously trigger model misclassifications by implanting a hidden backdoor during model training. This paper proposes a simple yet effective input-level backdoor detection (dubbed IBD-PSC) as a `firewall' to filter out malicious testing images. Our method is motivated by an intriguing phenomenon, i.e., paramete… ▽ More

    Submitted 2 June, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: Accepted to ICML 2024, 31 pages

  6. arXiv:2405.09543  [pdf, other

    cs.CY cs.AI cs.IR cs.LG

    Algorithmic Fairness: A Tolerance Perspective

    Authors: Renqiang Luo, Tao Tang, Feng Xia, Jiaying Liu, Chengpei Xu, Leo Yu Zhang, Wei Xiang, Chengqi Zhang

    Abstract: Recent advancements in machine learning and deep learning have brought algorithmic fairness into sharp focus, illuminating concerns over discriminatory decision making that negatively impacts certain individuals or groups. These concerns have manifested in legal, ethical, and societal challenges, including the erosion of trust in intelligent systems. In response, this survey delves into the existi… ▽ More

    Submitted 26 April, 2024; originally announced May 2024.

    Comments: 33 pages, 4 figures

    MSC Class: 68T01; 68W40 ACM Class: I.2.6; K.4.2; H.1.2

  7. arXiv:2405.03299  [pdf, other

    cs.CR cs.DC

    DarkFed: A Data-Free Backdoor Attack in Federated Learning

    Authors: Minghui Li, Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Leo Yu Zhang, Yichen Wang

    Abstract: Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, which is impractical. In the context of real-world industrial scenarios, even the simplest defense suffices to defend against the state-of-the-art attack, 3DFed. A practical FL backdoor… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: This paper has been accepted by IJCAI 2024

  8. arXiv:2404.11357  [pdf, other

    cs.CV

    Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving

    Authors: Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen

    Abstract: Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor techniques have primarily been adapted from classification tasks, overlooking deeper vulnerabilities specific to object detection. This paper is dedicated to bridging this gap by introd… ▽ More

    Submitted 15 August, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted to IJCAI 2024

  9. arXiv:2403.10801  [pdf, other

    cs.CV

    Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples

    Authors: Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin

    Abstract: With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as versatile feature extractors, enabling downstream users to harness the benefits of expansive models with minimal effort through fine-tuning. Nevertheless, recent works have exposed a… ▽ More

    Submitted 18 March, 2024; v1 submitted 16 March, 2024; originally announced March 2024.

  10. arXiv:2403.07673  [pdf, other

    cs.CR

    Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation

    Authors: Di Mi, Yanjun Zhang, Leo Yu Zhang, Shengshan Hu, Qi Zhong, Haizhuan Yuan, Shirui Pan

    Abstract: Model extraction attacks (MEAs) enable an attacker to replicate the functionality of a victim deep neural network (DNN) model by only querying its API service remotely, posing a severe threat to the security and integrity of pay-per-query DNN-based services. Although the majority of current research on MEAs has primarily concentrated on neural classifiers, there is a growing prevalence of image-to… ▽ More

    Submitted 19 March, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

    Comments: Accepted by AAAI 2024

  11. arXiv:2403.06143  [pdf, other

    cs.CR cs.AI

    Fluent: Round-efficient Secure Aggregation for Private Federated Learning

    Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang

    Abstract: Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their local datasets. However, FL remains susceptible to vulnerabilities such as privacy inference and inversion attacks. Single-server secure aggregation schemes were proposed to address these threats. Nonetheless, they encounter practical constra… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

  12. arXiv:2401.16687  [pdf, other

    cs.CR cs.LG

    Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks

    Authors: Lulu Xue, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun, Dezhong Yao

    Abstract: Collaborative learning (CL) is a distributed learning framework that aims to protect user privacy by allowing users to jointly train a model by sharing their gradient updates only. However, gradient inversion attacks (GIAs), which recover users' training data from shared gradients, impose severe privacy threats to CL. Existing defense methods adopt different techniques, e.g., differential privacy,… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  13. arXiv:2312.11026  [pdf, other

    cs.LG cs.CR cs.DC

    MISA: Unveiling the Vulnerabilities in Split Federated Learning

    Authors: Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin

    Abstract: \textit{Federated learning} (FL) and \textit{split learning} (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels in parallel execution capabilities, while the latter enjoys low dependence on edge computing resources and strong privacy protection. \textit{Split federated learning}… ▽ More

    Submitted 19 December, 2023; v1 submitted 18 December, 2023; originally announced December 2023.

    Comments: This paper has been accepted by the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2024)

  14. arXiv:2312.02673  [pdf, other

    cs.CR

    Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics

    Authors: Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang

    Abstract: A backdoor attack in deep learning inserts a hidden backdoor in the model to trigger malicious behavior upon specific input patterns. Existing detection approaches assume a metric space (for either the original inputs or their latent representations) in which normal samples and malicious samples are separable. We show that this assumption has a severe limitation by introducing a novel SSDT (Source… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Comments: 18 pages. To appear in IEEE Symposium on Security and Privacy 2024

  15. arXiv:2311.18403  [pdf, other

    cs.CV cs.AI

    Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations

    Authors: Xianlong Wang, Shengshan Hu, Minghui Li, Zhifei Yu, Ziqi Zhou, Leo Yu Zhang

    Abstract: Unlearnable datasets lead to a drastic drop in the generalization performance of models trained on them by introducing elaborate and imperceptible perturbations into clean training sets. Many existing defenses, e.g., JPEG compression and adversarial training, effectively counter UDs based on norm-constrained additive noise. However, a fire-new type of convolution-based UDs have been proposed and r… ▽ More

    Submitted 2 April, 2024; v1 submitted 30 November, 2023; originally announced November 2023.

  16. AGRAMPLIFIER: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification

    Authors: Zirui Gong, Liyue Shen, Yanjun Zhang, Leo Yu Zhang, Jingwei Wang, Guangdong Bai, Yong Xiang

    Abstract: The collaborative nature of federated learning (FL) poses a major threat in the form of manipulation of local training data and local updates, known as the Byzantine poisoning attack. To address this issue, many Byzantine-robust aggregation rules (AGRs) have been proposed to filter out or moderate suspicious local updates uploaded by Byzantine participants. This paper introduces a novel approach… ▽ More

    Submitted 23 November, 2023; v1 submitted 12 November, 2023; originally announced November 2023.

    Comments: Accepted by IEEE TIFS, this is the complete version

  17. arXiv:2310.16520  [pdf, other

    cs.LG

    Towards Self-Interpretable Graph-Level Anomaly Detection

    Authors: Yixin Liu, Kaize Ding, Qinghua Lu, Fuyi Li, Leo Yu Zhang, Shirui Pan

    Abstract: Graph-level anomaly detection (GLAD) aims to identify graphs that exhibit notable dissimilarity compared to the majority in a collection. However, current works primarily focus on evaluating graph-level abnormality while failing to provide meaningful explanations for the predictions, which largely limits their reliability and application scope. In this paper, we investigate a new challenging probl… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: 23 pages; accepted to NeurIPS 2023

  18. arXiv:2310.09822  [pdf, other

    cs.CR cs.CV

    Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models

    Authors: Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu

    Abstract: The intellectual property protection of deep learning (DL) models has attracted increasing serious concerns. Many works on intellectual property protection for Deep Neural Networks (DNN) models have been proposed. The vast majority of existing work uses DNN watermarking to verify the ownership of the model after piracy occurs, which is referred to as passive verification. On the contrary, we focus… ▽ More

    Submitted 15 October, 2023; originally announced October 2023.

  19. arXiv:2309.07415  [pdf, other

    cs.CR cs.AI

    Client-side Gradient Inversion Against Federated Learning from Poisoning

    Authors: Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang

    Abstract: Federated Learning (FL) enables distributed participants (e.g., mobile devices) to train a global model without sharing data directly to a central server. Recent studies have revealed that FL is vulnerable to gradient inversion attack (GIA), which aims to reconstruct the original training samples and poses high risk against the privacy of clients in FL. However, most existing GIAs necessitate cont… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

  20. A Four-Pronged Defense Against Byzantine Attacks in Federated Learning

    Authors: Wei Wan, Shengshan Hu, Minghui Li, Jianrong Lu, Longling Zhang, Leo Yu Zhang, Hai Jin

    Abstract: \textit{Federated learning} (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious participants could independently or collusively upload well-crafted updates to deteriorate the performance of the global model. However, existing defenses could only mitigate par… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Comments: This paper has been accepted by the 31st ACM International Conference on Multimedia (MM '23)

  21. arXiv:2307.12280  [pdf, other

    cs.CV

    Downstream-agnostic Adversarial Examples

    Authors: Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin

    Abstract: Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning operations to enjoy the benefit of "large model". Despite this promising prospect, the security of pre-trained encoder has not been thoroughly investigated yet, especially when the pre-tr… ▽ More

    Submitted 14 August, 2023; v1 submitted 23 July, 2023; originally announced July 2023.

    Comments: This paper has been accepted by the International Conference on Computer Vision (ICCV '23, October 2--6, 2023, Paris, France)

  22. arXiv:2307.07873  [pdf, other

    cs.LG cs.CR cs.CV

    Why Does Little Robustness Help? Understanding and Improving Adversarial Transferability from Surrogate Training

    Authors: Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin

    Abstract: Adversarial examples (AEs) for DNNs have been shown to be transferable: AEs that successfully fool white-box surrogate models can also deceive other black-box models with different architectures. Although a bunch of empirical studies have provided guidance on generating highly transferable AEs, many of these findings lack explanations and even lead to inconsistent advice. In this paper, we take a… ▽ More

    Submitted 1 September, 2023; v1 submitted 15 July, 2023; originally announced July 2023.

    Comments: IEEE Symposium on Security and Privacy (Oakland) 2024; Extended version of camera-ready

  23. Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint

    Authors: Tianyang Cai, Yuqi Li, Tao Jia, Leo Yu Zhang, Zheng Yang

    Abstract: While collaborative systems provide convenience to our lives, they also face many security threats. One of them is the Low-rate Distributed Denial-of-Service (LDDoS) attack, which is a worthy concern. Unlike volumetric DDoS attacks that continuously send large volumes of traffic, LDDoS attacks are more stealthy and difficult to be detected owing to their low-volume feature. Due to its stealthiness… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  24. arXiv:2304.10783  [pdf, other

    cs.LG cs.CR cs.DC

    Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning

    Authors: Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Liew, Zhetao Li

    Abstract: Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS). Unlike recent model poisoning attacks that optimize the amplitude of malicious perturbations along certain prescribed directions to cause DoS, we propose a Flexible Model Poisoning Attack (FMPA) that can achieve versatile attack goals. We consider… ▽ More

    Submitted 19 May, 2023; v1 submitted 21 April, 2023; originally announced April 2023.

  25. arXiv:2304.08767  [pdf, other

    cs.CR cs.AI

    Masked Language Model Based Textual Adversarial Example Detection

    Authors: Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang

    Abstract: Adversarial attacks are a serious threat to the reliable deployment of machine learning models in safety-critical applications. They can misguide current models to predict incorrectly by slightly modifying the inputs. Recently, substantial work has shown that adversarial examples tend to deviate from the underlying data manifold of normal examples, whereas pre-trained masked language models can fi… ▽ More

    Submitted 28 January, 2024; v1 submitted 18 April, 2023; originally announced April 2023.

    Comments: 13 pages,3 figures

  26. arXiv:2211.12294  [pdf, other

    cs.CV cs.CR

    PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples

    Authors: Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun

    Abstract: Point cloud completion, as the upstream procedure of 3D recognition and segmentation, has become an essential part of many tasks such as navigation and scene understanding. While various point cloud completion models have demonstrated their powerful capabilities, their robustness against adversarial attacks, which have been proven to be fatally malicious towards deep neural networks, remains unkno… ▽ More

    Submitted 1 December, 2022; v1 submitted 22 November, 2022; originally announced November 2022.

    Comments: Accepted by the 37th AAAI Conference on Artificial Intelligence (AAAI-23)

  27. M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models

    Authors: Linshan Hou, Zhongyun Hua, Yuhong Li, Yifeng Zheng, Leo Yu Zhang

    Abstract: Deep neural networks (DNNs) are vulnerable to backdoor attacks, where a backdoored model behaves normally with clean inputs but exhibits attacker-specified behaviors upon the inputs containing triggers. Most previous backdoor attacks mainly focus on either the all-to-one or all-to-all paradigm, allowing attackers to manipulate an input to attack a single target class. Besides, the two paradigms re… ▽ More

    Submitted 1 July, 2024; v1 submitted 3 November, 2022; originally announced November 2022.

    Comments: 14 pages; Accepted to IEEE Transactions on Circuits and Systems for Video Technology (2024)

  28. arXiv:2210.01437  [pdf, other

    cs.DC

    Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints

    Authors: Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng

    Abstract: Federated learning is a newly emerging distributed learning framework that facilitates the collaborative training of a shared global model among distributed participants with their privacy preserved. However, federated learning systems are vulnerable to Byzantine attacks from malicious participants, who can upload carefully crafted local model updates to degrade the quality of the global model and… ▽ More

    Submitted 12 October, 2022; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: This paper has been accepted by the 18th International Conference on Mobility, Sensing and Networking (MSN 2022)

  29. arXiv:2207.00278  [pdf, other

    cs.CV

    BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label

    Authors: Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan HE, Hai Jin

    Abstract: Due to its powerful feature learning capability and high efficiency, deep hashing has achieved great success in large-scale image retrieval. Meanwhile, extensive works have demonstrated that deep neural networks (DNNs) are susceptible to adversarial examples, and exploring adversarial attack against deep hashing has attracted many research efforts. Nevertheless, backdoor attack, another famous thr… ▽ More

    Submitted 13 July, 2022; v1 submitted 1 July, 2022; originally announced July 2022.

    Comments: This paper has been accepted by the 30th ACM International Conference on Multimedia (MM '22, October 10--14, 2022, Lisboa, Portugal)

  30. arXiv:2205.06986  [pdf, other

    cs.CR cs.AI

    Evaluating Membership Inference Through Adversarial Robustness

    Authors: Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu

    Abstract: The usage of deep learning is being escalated in many applications. Due to its outstanding performance, it is being used in a variety of security and privacy-sensitive areas in addition to conventional applications. One of the key aspects of deep learning efficacy is to have abundant data. This trait leads to the usage of data which can be highly sensitive and private, which in turn causes warines… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

    Comments: Accepted by The Computer Journal. Pre-print version

  31. Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection

    Authors: Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He

    Abstract: Federated learning (FL) enables multiple clients to collaboratively train an accurate global model while protecting clients' data privacy. However, FL is susceptible to Byzantine attacks from malicious participants. Although the problem has gained significant attention, existing defenses have several flaws: the server irrationally chooses malicious clients for aggregation even after they have been… ▽ More

    Submitted 7 August, 2023; v1 submitted 27 April, 2022; originally announced April 2022.

    Comments: This paper has been published on the 31st International Joint Conference on Artificial Intelligence (IJCAI-22, Main Track, LONG Oral Presentation)

  32. arXiv:2204.10958  [pdf, other

    cs.CR cs.AI

    Towards Privacy-Preserving Neural Architecture Search

    Authors: Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss

    Abstract: Machine learning promotes the continuous development of signal processing in various fields, including network traffic monitoring, EEG classification, face identification, and many more. However, massive user data collected for training deep learning models raises privacy concerns and increases the difficulty of manually adjusting the network structure. To address these issues, we propose a privac… ▽ More

    Submitted 22 April, 2022; originally announced April 2022.

    Comments: Accepted by IEEE ISCC 2022

  33. arXiv:2204.01934  [pdf, other

    cs.CV cs.CR

    Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting

    Authors: Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang

    Abstract: Fine-tuning attacks are effective in removing the embedded watermarks in deep learning models. However, when the source data is unavailable, it is challenging to just erase the watermark without jeopardizing the model performance. In this context, we introduce Attention Distraction (AD), a novel source data-free watermark removal attack, to make the model selectively forget the embedded watermarks… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: Accepted by ICME2022

  34. arXiv:2203.03121  [pdf, other

    cs.CV cs.CR

    Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer

    Authors: Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu

    Abstract: While deep face recognition (FR) systems have shown amazing performance in identification and verification, they also arouse privacy concerns for their excessive surveillance on users, especially for public face images widely spread on social networks. Recently, some studies adopt adversarial examples to protect photos from being identified by unauthorized face recognition systems. However, existi… ▽ More

    Submitted 28 March, 2022; v1 submitted 6 March, 2022; originally announced March 2022.

    Comments: Accepted by CVPR2022. Code is available at https://github.com/CGCL-codes/AMT-GAN

  35. A Survey of PPG's Application in Authentication

    Authors: Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang

    Abstract: Biometric authentication prospered because of its convenient use and security. Early generations of biometric mechanisms suffer from spoofing attacks. Recently, unobservable physiological signals (e.g., Electroencephalogram, Photoplethysmogram, Electrocardiogram) as biometrics offer a potential remedy to this problem. In particular, Photoplethysmogram (PPG) measures the change in blood flow of the… ▽ More

    Submitted 25 January, 2024; v1 submitted 26 January, 2022; originally announced January 2022.

    Comments: Accepted by Computer & Security (COSE)

  36. Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges

    Authors: Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, MD Zahidul Islam, Leo Yu Zhang, MD Rafiqul Islam, Warren Armstrong

    Abstract: Advances of emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products m… ▽ More

    Submitted 2 April, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

  37. arXiv:2112.14468  [pdf, other

    cs.CR cs.AI cs.DC

    Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning

    Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang

    Abstract: Recently emerged federated learning (FL) is an attractive distributed learning framework in which numerous wireless end-user devices can train a global model with the data remained autochthonous. Compared with the traditional machine learning framework that collects user data for centralized storage, which brings huge communication burden and concerns about data privacy, this approach can not only… ▽ More

    Submitted 6 October, 2022; v1 submitted 29 December, 2021; originally announced December 2021.

    Comments: The paper has been accepted by the 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-22)

  38. From Chaos to Pseudo-Randomness: A Case Study on the 2D Coupled Map Lattice

    Authors: Yong Wang, Zhuo Liu, Leo Yu Zhang, Fabio Pareschi, Gianluca Setti, Guanrong Chen

    Abstract: Applying chaos theory for secure digital communications is promising and it is well acknowledged that in such applications the underlying chaotic systems should be carefully chosen. However, the requirements imposed on the chaotic systems are usually heuristic, without theoretic guarantee for the resultant communication scheme. Among all the primitives for secure communications, it is well-accepte… ▽ More

    Submitted 11 July, 2021; v1 submitted 23 May, 2021; originally announced May 2021.

    Comments: 10 pages, 11figures

  39. FairCMS: Cloud Media Sharing with Fair Copyright Protection

    Authors: Xiangli Xiao, Yushu Zhang, Leo Yu Zhang, Zhongyun Hua, Zhe Liu, Jiwu Huang

    Abstract: The onerous media sharing task prompts resource-constrained media owners to seek help from a cloud platform, i.e., storing media contents in the cloud and letting the cloud do the sharing. There are three key security/privacy problems that need to be solved in the cloud media sharing scenario, including data privacy leakage and access control in the cloud, infringement on the owner's copyright, an… ▽ More

    Submitted 25 April, 2024; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted by IEEE Transactions on Computational Social Systems

  40. arXiv:2105.03689  [pdf, other

    cs.CV cs.CR cs.LG

    Self-Supervised Adversarial Example Detection by Disentangled Representation

    Authors: Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Jinyu Tian, Jiantao Zhou

    Abstract: Deep learning models are known to be vulnerable to adversarial examples that are elaborately designed for malicious purposes and are imperceptible to the human perceptual system. Autoencoder, when trained solely over benign examples, has been widely used for (self-supervised) adversarial detection based on the assumption that adversarial examples yield larger reconstruction errors. However, becaus… ▽ More

    Submitted 28 August, 2022; v1 submitted 8 May, 2021; originally announced May 2021.

    Comments: to appear in TrustCom 2022

  41. arXiv:1801.04642  [pdf, ps, other

    cs.SI physics.soc-ph

    Stable and Efficient Structures for the Content Production and Consumption in Information Communities

    Authors: Larry Yueli Zhang, Peter Marbach

    Abstract: Real-world information communities exhibit inherent structures that characterize a system that is stable and efficient for content production and consumption. In this paper, we study such structures through mathematical modelling and analysis. We formulate a generic model of a community in which each member decides how they allocate their time between content production and consumption with the ob… ▽ More

    Submitted 14 January, 2018; originally announced January 2018.

    Comments: 21 pages

  42. arXiv:1512.09263  [pdf, ps, other

    cs.CR

    On the security of a class of diffusion mechanisms for image encryption

    Authors: Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong, Fabio Pareschi, Yushu Zhang, Riccardo Rovatti, Gianluca Setti

    Abstract: The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex ynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assu… ▽ More

    Submitted 31 December, 2015; originally announced December 2015.

    Comments: 16 pages, 7 figures

  43. arXiv:1503.06638  [pdf, ps, other

    cs.CR

    Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure

    Authors: Yuansheng Liu, Leo Yu Zhang, Jia Wang, Yushu Zhang, Kwok-wo Wong

    Abstract: Since the first appearance in Fridrich's design, the usage of permutation-diffusion structure for designing digital image cryptosystem has been receiving increasing research attention in the field of chaos-based cryptography. Recently, a novel chaotic Image Cipher using one round Modified Permutation-Diffusion pattern (ICMPD) was proposed. Unlike traditional permutation-diffusion structure, the pe… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

  44. arXiv:1411.6079  [pdf, ps, other

    cs.CR

    Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images

    Authors: Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Qiuzhen Lin

    Abstract: Recent research advances have revealed the computational secrecy of the compressed sensing (CS) paradigm. Perfect secrecy can also be achieved by normalizing the CS measurement vector. However, these findings are established on real measurements while digital devices can only store measurements at a finite precision. Based on the distribution of measurements of natural images sensed by structurall… ▽ More

    Submitted 21 November, 2014; originally announced November 2014.

    Comments: 4 pages, 4 figures

  45. arXiv:1409.4845  [pdf, ps, other

    cs.CR

    Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher

    Authors: Li Zeng, Renren Liu, Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong

    Abstract: Recently, an image encryption algorithm based on scrambling and Vegin`ere cipher has been proposed. However, it was soon cryptanalyzed by Zhang et al. using a combination of chosen-plaintext attack and differential attack. This paper briefly reviews the two attack methods proposed by Zhang et al. and outlines the mathematical interpretations of them. Based on their work, we present an improved cho… ▽ More

    Submitted 16 September, 2014; originally announced September 2014.

    Comments: 11 pages, 14 figures

  46. Bi-level Protected Compressive Sampling

    Authors: Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Jiantao Zhou

    Abstract: Some pioneering works have investigated embedding cryptographic properties in compressive sampling (CS) in a way similar to one-time pad symmetric cipher. This paper tackles the problem of constructing a CS-based symmetric cipher under the key reuse circumstance, i.e., the cipher is resistant to common attacks even a fixed measurement matrix is used multiple times. To this end, we suggest a bi-lev… ▽ More

    Submitted 5 August, 2015; v1 submitted 29 May, 2014; originally announced June 2014.

    Comments: 14 pages, 8 figures

  47. Robust Coding of Encrypted Images via Structural Matrix

    Authors: Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Di Xiao

    Abstract: The robust coding of natural images and the effective compression of encrypted images have been studied individually in recent years. However, little work has been done in the robust coding of encrypted images. The existing results in these two individual research areas cannot be combined directly for the robust coding of encrypted images. This is because the robust coding of natural images relies… ▽ More

    Submitted 27 May, 2014; originally announced May 2014.

    Comments: 10 pages, 11 figures

  48. arXiv:1403.6213  [pdf, ps, other

    cs.CR cs.IT

    Embedding Cryptographic Features in Compressive Sensing

    Authors: Yushu Zhang, Kwok-Wo Wong, Di Xiao, Leo Yu Zhang, Ming Li

    Abstract: Compressive sensing (CS) has been widely studied and applied in many fields. Recently, the way to perform secure compressive sensing (SCS) has become a topic of growing interest. The existing works on SCS usually take the sensing matrix as a key and the resultant security level is not evaluated in depth. They can only be considered as a preliminary exploration on SCS, but a concrete and operable e… ▽ More

    Submitted 24 March, 2014; originally announced March 2014.

    Comments: 10 pages, 6 figures

  49. Cryptanalyzing a class of image encryption schemes based on Chinese Remainder Theorem

    Authors: Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Kwok-wo Wong

    Abstract: As a fundamental theorem in number theory, the Chinese Reminder Theorem (CRT) is widely used to construct cryptographic primitives. This paper investigates the security of a class of image encryption schemes based on CRT, referred to as CECRT. Making use of some properties of CRT, the equivalent secret key of CECRT can be recovered efficiently. The required number of pairs of chosen plaintext and… ▽ More

    Submitted 29 September, 2016; v1 submitted 24 June, 2013; originally announced June 2013.

    Comments: 7 pages

    MSC Class: 97F60; 68P25 ACM Class: E.3

    Journal ref: Signal Processing: Image Communication, 29(8): 914-920, 2014

  50. A chaotic image encryption scheme owning temp-value feedback

    Authors: Leo Yu Zhang, Xiaobo Hu, Yuansheng Liu, Kwok-Wo Wong

    Abstract: This paper presents a novel efficient chaotic image encryption scheme, in which the temp-value feedback mechanism is introduced to the permutation and diffusion procedures. Firstly, a simple trick is played to map the plain-image pixels to the initial condition of the Logistic map. Then, a pseudorandom number sequence (PRNS) is obtained from iterating the map. The permutation procedure is carried… ▽ More

    Submitted 7 January, 2014; v1 submitted 9 April, 2013; originally announced April 2013.

    Comments: 10 pages, 4 figures