SP

Stjepan Picek

4 records found

Jump, It Is Easy

JumpReLU Activation Function in Deep Learning-Based Side-Channel Analysis

Deep learning-based side-channel analysis has become a popular and powerful option for side-channel attacks in recent years. One of the main directions that the side-channel community explores is how to design efficient architectures that can break the targets with as little as p ...
Backdoor attacks maliciously inject covert functionality into machine learning models, representing a security threat. The stealthiness of backdoor attacks is a critical research direction, focusing on adversaries' efforts to enhance the resistance of backdoor attacks against def ...

MUDGUARD

Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering

Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. FLTrust (NDSS '21) and Zeno++ ...

ELMs Under Siege

A Study on Backdoor Attacks on Extreme Learning Machines

Due to their computational efficiency and speed during training and inference, extreme learning machines are suitable for simple learning tasks on lightweight datasets. Examples of their real-world applications include healthcare and edge devices, where security concerns are cruc ...