• Publications
  • Influence
Analyzing Federated Learning through an Adversarial Lens
TLDR
We explore the threat of model poisoning attacks on federated learning initiated by a single, non-colluding malicious agent where the adversarial objective is to cause the model to misclassify a set of chosen inputs with high confidence. Expand
  • 150
  • 22
  • PDF
SybilInfer: Detecting Sybil Nodes using Social Networks
TLDR
SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils controlled by an adversary, and is not susceptible to manipulation by the adversary. Expand
  • 294
  • 19
  • PDF
RAPTOR: Routing Attacks on Privacy in Tor
TLDR
We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. Expand
  • 142
  • 17
  • PDF
DECENT: A decentralized architecture for enforcing privacy in online social networks
TLDR
We propose DECENT, an architecture for OSNs that uses a distributed hash table to store user data, and features cryptographic protections for confidentiality and integrity, as well as support for flexible attribute policies and fast revocation. Expand
  • 125
  • 17
  • PDF
Evolution of social-attribute networks: measurements, modeling, and implications using google+
TLDR
We develop a new generative model to jointly reproduce the social structure and the node attributes of real social networks using a unique dataset collected as the Google+ social network grew over time. Expand
  • 194
  • 16
  • PDF
Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples
TLDR
We introduce the notion of dependent differential privacy (DDP) that accounts for the dependence that exists between tuples and propose a dependent perturbation mechanism (DPM) to achieve the privacy guarantees in DDP. Expand
  • 107
  • 16
  • PDF
BotGrep: Finding P2P Bots with Structured Graph Analysis
TLDR
In this work, we devise techniques to localize botnet members based on the unique communication patterns arising from their overlay topologies used for command and control. Expand
  • 246
  • 15
  • PDF
EASiER: encryption-based access control in social networks with efficient revocation
TLDR
A promising approach to mitigate the privacy risks in Online Social Networks (OSNs) is to shift access control enforcement from the OSN provider to the user by means of encryption by using attribute-based encryption. Expand
  • 324
  • 15
  • PDF
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
TLDR
We study, implement, and evaluate 11 graph data anonymization algorithms, 19 data utility metrics, and 15 modern Structure-based De-Anonymization (SDA) attacks. Expand
  • 91
  • 12
  • PDF
BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
TLDR
We demonstrate that an Internet of Things (IoT) botnet of high wattage devices–such as air conditioners and heaters–gives a unique ability to adversaries to launch large-scale coordinated attacks on the power grid. Expand
  • 99
  • 11
  • PDF