Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–18 of 18 results for author: Tramer, F

Searching in archive stat. Search in all archives.
.
  1. arXiv:2306.09983  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Evaluating Superhuman Models with Consistency Checks

    Authors: Lukas Fluri, Daniel Paleka, Florian Tramèr

    Abstract: If machine learning models were to achieve superhuman abilities at various reasoning or decision-making tasks, how would we go about evaluating such models, given that humans would necessarily be poor proxies for ground truth? In this paper, we propose a framework for evaluating superhuman models via consistency checks. Our premise is that while the correctness of superhuman decisions may be impos… ▽ More

    Submitted 19 October, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

    Comments: 42 pages, 18 figures. Code and data are available at https://github.com/ethz-spylab/superhuman-ai-consistency

  2. arXiv:2306.02895  [pdf, other

    cs.CR cs.LG stat.ML

    Evading Black-box Classifiers Without Breaking Eggs

    Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr

    Abstract: Decision-based evasion attacks repeatedly query a black-box classifier to generate adversarial examples. Prior work measures the cost of such attacks by the total number of queries made to the classifier. We argue this metric is flawed. Most security-critical machine learning systems aim to weed out "bad" data (e.g., malware, harmful content, etc). Queries to such systems carry a fundamentally asy… ▽ More

    Submitted 14 February, 2024; v1 submitted 5 June, 2023; originally announced June 2023.

    Comments: Code at https://github.com/ethz-privsec/realistic-adv-examples. Accepted at IEEE SaTML 2024

  3. arXiv:2212.06470  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Position: Considerations for Differentially Private Learning with Large-Scale Public Pretraining

    Authors: Florian Tramèr, Gautam Kamath, Nicholas Carlini

    Abstract: The performance of differentially private machine learning can be boosted significantly by leveraging the transfer learning capabilities of non-private models pretrained on large public datasets. We critically review this approach. We primarily question whether the use of large Web-scraped datasets should be viewed as differential-privacy-preserving. We caution that publicizing these models pret… ▽ More

    Submitted 17 July, 2024; v1 submitted 13 December, 2022; originally announced December 2022.

    Comments: Full and unabridged version of paper ICML 2024

  4. arXiv:2204.00032  [pdf, other

    cs.CR cs.LG stat.ML

    Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets

    Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini

    Abstract: We introduce a new class of attacks on machine learning models. We show that an adversary who can poison a training dataset can cause models trained on this dataset to leak significant private details of training points belonging to other parties. Our active inference attacks connect two independent lines of work targeting the integrity and privacy of machine learning training data. Our attacks… ▽ More

    Submitted 6 October, 2022; v1 submitted 31 March, 2022; originally announced April 2022.

    Comments: ACM CCS 2022

  5. arXiv:2202.05520  [pdf, other

    stat.ML cs.CL cs.LG

    What Does it Mean for a Language Model to Preserve Privacy?

    Authors: Hannah Brown, Katherine Lee, Fatemehsadat Mireshghallah, Reza Shokri, Florian Tramèr

    Abstract: Natural language reflects our private lives and identities, making its privacy concerns as broad as those of real life. Language models lack the ability to understand the context and sensitivity of text, and tend to memorize phrases present in their training sets. An adversary can exploit this tendency to extract training data. Depending on the nature of the content and the context in which this d… ▽ More

    Submitted 14 February, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

    Comments: 21 pages, 2 figures

  6. arXiv:2107.11630  [pdf, other

    cs.LG cs.CR stat.ML

    Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them

    Authors: Florian Tramèr

    Abstract: Making classifiers robust to adversarial examples is hard. Thus, many defenses tackle the seemingly easier task of detecting perturbed inputs. We show a barrier towards this goal. We prove a general hardness reduction between detection and classification of adversarial examples: given a robust detector for attacks at distance ε (in some metric), we can build a similarly robust (but inefficient) cl… ▽ More

    Submitted 16 June, 2022; v1 submitted 24 July, 2021; originally announced July 2021.

    Comments: ICML 2022 (Long Talk)

  7. arXiv:2011.11660  [pdf, other

    cs.LG cs.CR stat.ML

    Differentially Private Learning Needs Better Features (or Much More Data)

    Authors: Florian Tramèr, Dan Boneh

    Abstract: We demonstrate that differentially private machine learning has not yet reached its "AlexNet moment" on many canonical vision tasks: linear models trained on handcrafted features significantly outperform end-to-end deep neural networks for moderate privacy budgets. To exceed the performance of handcrafted features, we show that private learning requires either much more private data, or access to… ▽ More

    Submitted 17 February, 2021; v1 submitted 23 November, 2020; originally announced November 2020.

    Comments: ICLR 2021. Code available at https://github.com/ftramer/Handcrafted-DP

  8. arXiv:2007.14321  [pdf, other

    cs.CR cs.LG stat.ML

    Label-Only Membership Inference Attacks

    Authors: Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot

    Abstract: Membership inference attacks are one of the simplest forms of privacy leakage for machine learning models: given a data point and model, determine whether the point was used to train the model. Existing membership inference attacks exploit models' abnormal confidence when queried on their training data. These attacks do not apply if the adversary only gets access to models' predicted labels, witho… ▽ More

    Submitted 5 December, 2021; v1 submitted 28 July, 2020; originally announced July 2020.

    Comments: 16 pages, 11 figures, 2 tables Revision 2: 19 pages, 12 figures, 3 tables. Improved text and additional experiments. Final ICML paper

  9. arXiv:2002.08347  [pdf, other

    cs.LG cs.CR stat.ML

    On Adaptive Attacks to Adversarial Example Defenses

    Authors: Florian Tramer, Nicholas Carlini, Wieland Brendel, Aleksander Madry

    Abstract: Adaptive attacks have (rightfully) become the de facto standard for evaluating defenses to adversarial examples. We find, however, that typical adaptive evaluations are incomplete. We demonstrate that thirteen defenses recently published at ICLR, ICML and NeurIPS---and chosen for illustrative and pedagogical purposes---can be circumvented despite attempting to perform evaluations using adaptive at… ▽ More

    Submitted 23 October, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

    Comments: NeurIPS 2020

  10. arXiv:2002.04599  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Fundamental Tradeoffs between Invariance and Sensitivity to Adversarial Perturbations

    Authors: Florian Tramèr, Jens Behrmann, Nicholas Carlini, Nicolas Papernot, Jörn-Henrik Jacobsen

    Abstract: Adversarial examples are malicious inputs crafted to induce misclassification. Commonly studied sensitivity-based adversarial examples introduce semantically-small changes to an input that result in a different model prediction. This paper studies a complementary failure mode, invariance-based adversarial examples, that introduce minimal semantic changes that modify an input's true label yet prese… ▽ More

    Submitted 4 August, 2020; v1 submitted 11 February, 2020; originally announced February 2020.

    Comments: ICML 2020 (Supersedes the workshop paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness", arXiv:1903.10484)

  11. arXiv:1912.04977  [pdf, other

    cs.LG cs.CR stat.ML

    Advances and Open Problems in Federated Learning

    Authors: Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson , et al. (34 additional authors not shown)

    Abstract: Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. service provider), while keeping the training data decentralized. FL embodies the principles of focused data collection and minimization, and can mitigate many of the systemic privacy risks and costs re… ▽ More

    Submitted 8 March, 2021; v1 submitted 10 December, 2019; originally announced December 2019.

    Comments: Published in Foundations and Trends in Machine Learning Vol 4 Issue 1. See: https://www.nowpublishers.com/article/Details/MAL-083

  12. arXiv:1904.13000  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Adversarial Training and Robustness for Multiple Perturbations

    Authors: Florian Tramèr, Dan Boneh

    Abstract: Defenses against adversarial examples, such as adversarial training, are typically tailored to a single perturbation type (e.g., small $\ell_\infty$-noise). For other perturbations, these defenses offer no guarantees and, at times, even increase the model's vulnerability. Our aim is to understand the reasons underlying this robustness trade-off, and to train models that are simultaneously robust t… ▽ More

    Submitted 17 October, 2019; v1 submitted 29 April, 2019; originally announced April 2019.

    Comments: Accepted at NeurIPS 2019, 23 pages

  13. arXiv:1903.10484  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness

    Authors: Jörn-Henrik Jacobsen, Jens Behrmannn, Nicholas Carlini, Florian Tramèr, Nicolas Papernot

    Abstract: Adversarial examples are malicious inputs crafted to cause a model to misclassify them. Their most common instantiation, "perturbation-based" adversarial examples introduce changes to the input that leave its true label unchanged, yet result in a different model prediction. Conversely, "invariance-based" adversarial examples insert changes to the input that leave the model's prediction unaffected… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Comments: Accepted at the ICLR 2019 SafeML Workshop

  14. arXiv:1811.03194  [pdf, other

    cs.CR cs.LG stat.ML

    AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning

    Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh

    Abstract: Perceptual ad-blocking is a novel approach that detects online advertisements based on their visual content. Compared to traditional filter lists, the use of perceptual signals is believed to be less prone to an arms race with web publishers and ad networks. We demonstrate that this may not be the case. We describe attacks on multiple perceptual ad-blocking techniques, and unveil a new arms race t… ▽ More

    Submitted 26 August, 2019; v1 submitted 7 November, 2018; originally announced November 2018.

    Comments: 17 pages, 14 figures

    Journal ref: In 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19)

  15. arXiv:1806.03287  [pdf, other

    stat.ML cs.CR cs.LG

    Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

    Authors: Florian Tramèr, Dan Boneh

    Abstract: As Machine Learning (ML) gets applied to security-critical or sensitive domains, there is a growing need for integrity and privacy for outsourced ML computations. A pragmatic solution comes from Trusted Execution Environments (TEEs), which use hardware and software protections to isolate sensitive computations from the untrusted software stack. However, these isolation guarantees come at a price i… ▽ More

    Submitted 27 February, 2019; v1 submitted 8 June, 2018; originally announced June 2018.

    Comments: Accepted as an oral presentation at ICLR 2019. OpenReview available at https://openreview.net/forum?id=rJVorjCcKQ

  16. arXiv:1705.07204  [pdf, other

    stat.ML cs.CR cs.LG

    Ensemble Adversarial Training: Attacks and Defenses

    Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are perturbed inputs designed to fool machine learning models. Adversarial training injects such examples into training data to increase robustness. To scale this technique to large datasets, perturbations are crafted using fast single-step methods that maximize a linear approximation of the model's loss. We show that this form of adversarial training converges to a degenerate… ▽ More

    Submitted 26 April, 2020; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: 22 pages, 5 figures, International Conference on Learning Representations (ICLR) 2018 (amended in April 2020 to include subsequent attacks that significantly reduced the robustness of our models)

  17. arXiv:1704.03453  [pdf, other

    stat.ML cs.CR cs.LG

    The Space of Transferable Adversarial Examples

    Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are maliciously perturbed inputs designed to mislead machine learning (ML) models at test-time. They often transfer: the same adversarial example fools more than one model. In this work, we propose novel methods for estimating the previously unknown dimensionality of the space of adversarial inputs. We find that adversarial examples span a contiguous subspace of large (~25)… ▽ More

    Submitted 23 May, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: 15 pages, 7 figures

  18. arXiv:1609.02943  [pdf, other

    cs.CR cs.LG stat.ML

    Stealing Machine Learning Models via Prediction APIs

    Authors: Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart

    Abstract: Machine learning (ML) models may be deemed confidential due to their sensitive training data, commercial value, or use in security applications. Increasingly often, confidential ML models are being deployed with publicly accessible query interfaces. ML-as-a-service ("predictive analytics") systems are an example: Some allow users to train models on potentially sensitive data and charge others for… ▽ More

    Submitted 2 October, 2016; v1 submitted 9 September, 2016; originally announced September 2016.

    Comments: 19 pages, 7 figures, Proceedings of USENIX Security 2016