1 code implementation • CVPR 2023 • Shen Lin, XiaoYu Zhang, Chenyang Chen, Xiaofeng Chen, Willy Susilo
When receiving the unlearning requests, we transfer the knowledge of the non-target data points from the original model to the unlearned model and meanwhile prohibit the knowledge of the target data points via our proposed knowledge transfer and prohibition (KTP) method.
no code implementations • 8 Jul 2022 • Haripriya Harikumar, Santu Rana, Kien Do, Sunil Gupta, Wei Zong, Willy Susilo, Svetha Venkastesh
To defend against this attack, we first introduce a trigger reverse-engineering mechanism that uses multiple images to recover a variety of potential triggers.
no code implementations • 31 May 2022 • Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu
Compared with a representative SSBA as a baseline ($SSBA_{Base}$), $CASSOCK$-based attacks have significantly advanced the attack performance, i. e., higher ASR and lower FPR with comparable CDA (clean data accuracy).
no code implementations • 24 Feb 2022 • Kien Do, Haripriya Harikumar, Hung Le, Dung Nguyen, Truyen Tran, Santu Rana, Dang Nguyen, Willy Susilo, Svetha Venkatesh
Trojan attacks on deep neural networks are both dangerous and surreptitious.
no code implementations • 7 Feb 2022 • Hao Wang, Zhi Li, Chunpeng Ge, Willy Susilo
To address the issue of privacy-preserving in collaborative learning, secure outsourced computation and federated learning are two typical methods.
no code implementations • IEEE Transactions on Knowledge and Data Engineering 2020 • Xiaofeng Chen, Hui Li, Jin Li, Qian Wang, Xinyi Huang, Willy Susilo, and Yang Xiang
As a result, it remains an open problem how to construct an efficient (and publicly verifiable) VDB scheme that can support all updating operations regardless of the manner of insertion.
no code implementations • 23 Feb 2019 • Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao
Malicious web domains represent a big threat to web users' privacy and security.