Alert button
Picture for Moinuddin K Qureshi

Moinuddin K Qureshi

Alert button

Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis

Add code
Bookmark button
Alert button
Sep 12, 2022
Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee

Figure 1 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 2 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 3 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Figure 4 for Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis
Viaarxiv icon

Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning

Add code
Bookmark button
Alert button
Nov 25, 2021
Sanjay Kariyappa, Moinuddin K Qureshi

Figure 1 for Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning
Figure 2 for Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning
Figure 3 for Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning
Figure 4 for Gradient Inversion Attack: Leaking Private Labels in Two-Party Split Learning
Viaarxiv icon

Enabling Inference Privacy with Adaptive Noise Injection

Add code
Bookmark button
Alert button
Apr 06, 2021
Sanjay Kariyappa, Ousmane Dia, Moinuddin K Qureshi

Figure 1 for Enabling Inference Privacy with Adaptive Noise Injection
Figure 2 for Enabling Inference Privacy with Adaptive Noise Injection
Figure 3 for Enabling Inference Privacy with Adaptive Noise Injection
Figure 4 for Enabling Inference Privacy with Adaptive Noise Injection
Viaarxiv icon

Defending Against Model Stealing Attacks with Adaptive Misinformation

Add code
Bookmark button
Alert button
Nov 16, 2019
Sanjay Kariyappa, Moinuddin K Qureshi

Figure 1 for Defending Against Model Stealing Attacks with Adaptive Misinformation
Figure 2 for Defending Against Model Stealing Attacks with Adaptive Misinformation
Figure 3 for Defending Against Model Stealing Attacks with Adaptive Misinformation
Figure 4 for Defending Against Model Stealing Attacks with Adaptive Misinformation
Viaarxiv icon