no code implementations • 28 Apr 2022 • Jin Xu, Chi Hong, Jiyue Huang, Lydia Y. Chen, Jérémie Decouchant
Recent reconstruction attacks apply a gradient inversion optimization on the gradient update of a single minibatch to reconstruct the private data used by clients during training.
no code implementations • 7 Feb 2022 • Jiyue Huang, Zilong Zhao, Lydia Y. Chen, Stefanie Roos
Consequently, we design REFD, a defense specifically crafted to protect against data-free attacks.
no code implementations • 31 Jan 2022 • Chi Hong, Jiyue Huang, Lydia Y. Chen
However, they are all based on competing generator-substitute networks and hence encounter training instability. In this paper we propose a data-free model stealing frame-work, MEGA, which is based on collaborative generator-substitute networks and only requires the target model toprovide label prediction for synthetic query examples.
no code implementations • 24 Jan 2022 • Zilong Zhao, Jiyue Huang, Stefanie Roos, Lydia Y. Chen
To mitigate the model degradation, we propose a defense strategy against free-riders in MD-GAN, termed DFG.
no code implementations • 29 Sep 2021 • Chi Hong, Jiyue Huang, Lydia Y. Chen
Deep machine learning models are increasingly deployed in the wild, subject to adversarial attacks.
no code implementations • 20 Jun 2021 • Jiyue Huang, Chi Hong, Lydia Y. Chen, Stefanie Roos
Shapley Value is commonly adopted to measure and incentivize client participation in federated learning.
no code implementations • 5 Dec 2018 • Ying Shen, Qiang Zhang, Jin Zhang, Jiyue Huang, Yuming Lu, Kai Lei
However, in electronic medical records (EMR), the texts containing sentences are shorter than that in general domain, which leads to the lack of semantic features and the ambiguity of semantic.