Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems

H Abdullah, K Warren, V Bindschaedler… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …

Delphi: A cryptographic inference system for neural networks

P Mishra, R Lehmkuhl, A Srinivasan, W Zheng… - Proceedings of the …, 2020 - dl.acm.org
Many companies provide neural network prediction services to users for a wide range of
applications. However, current prediction systems compromise one party's privacy: either the …

CryptGPU: Fast privacy-preserving machine learning on the GPU

S Tan, B Knott, Y Tian, DJ Wu - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
We introduce CryptGPU, a system for privacy-preserving machine learning that implements
all operations on the GPU (graphics processing unit). Just as GPUs played a pivotal role in …

Amnesiac machine learning

L Graves, V Nagisetty, V Ganesh - … of the AAAI Conference on Artificial …, 2021 - ojs.aaai.org
Abstract The Right to be Forgotten is part of the recently enacted General Data Protection
Regulation (GDPR) law that affects any data holder that has data on European Union …

Thieves on sesame street! model extraction of bert-based apis

K Krishna, GS Tomar, AP Parikh, N Papernot… - arXiv preprint arXiv …, 2019 - arxiv.org
We study the problem of model extraction in natural language processing, in which an
adversary with only query access to a victim model attempts to reconstruct a local copy of …

Prediction poisoning: Towards defenses against dnn model stealing attacks

T Orekondy, B Schiele, M Fritz - arXiv preprint arXiv:1906.10908, 2019 - arxiv.org
High-performance Deep Neural Networks (DNNs) are increasingly deployed in many real-
world applications eg, cloud prediction APIs. Recent advances in model functionality …

Cryptanalytic extraction of neural network models

N Carlini, M Jagielski, I Mironov - Annual international cryptology …, 2020 - Springer
We argue that the machine learning problem of model extraction is actually a cryptanalytic
problem in disguise, and should be studied as such. Given oracle access to a neural …

Deep neural network fingerprinting by conferrable adversarial examples

N Lukas, Y Zhang, F Kerschbaum - arXiv preprint arXiv:1912.00888, 2019 - arxiv.org
In Machine Learning as a Service, a provider trains a deep neural network and gives many
users access. The hosted (source) model is susceptible to model stealing attacks, where an …

Proof-of-learning: Definitions and practice

H Jia, M Yaghini, CA Choquette-Choo… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Training machine learning (ML) models typically involves expensive iterative optimization.
Once the model's final parameters are released, there is currently no mechanism for the …

Deepem: Deep neural networks model recovery through em side-channel information leakage

H Yu, H Ma, K Yang, Y Zhao… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Neural Network (NN) accelerators are currently widely deployed in various security-crucial
scenarios, including image recognition, natural language processing and autonomous …