SplitOut: out-of-the-box training-hijacking detection in split learning via outlier detection

buir.contributor.authorÇeliktenyıldız, Mehmet Salih
buir.contributor.authorÇiçek, A. Ercüment
buir.contributor.orcidÇeliktenyıldız, Mehmet Salih|0009-0005-7021-0892
buir.contributor.orcidÇiçek, A. Ercüment|0000-0001-8613-6619
dc.citation.epage142
dc.citation.spage118
dc.citation.volumeNumber14906
dc.contributor.authorErdoğan, E.
dc.contributor.authorTeksen, U.
dc.contributor.authorÇeliktenyıldız, Mehmet Salih
dc.contributor.authorKüpçü, A.
dc.contributor.authorÇiçek, A. Ercüment
dc.contributor.editorKohlweiss, Markulf
dc.contributor.editorDi Pietro, Roberto
dc.contributor.editorBeresford, Alastair
dc.coverage.spatialCambridge, UK
dc.date.accessioned2025-02-25T18:01:08Z
dc.date.available2025-02-25T18:01:08Z
dc.date.issued2024-09-29
dc.departmentDepartment of Electrical and Electronics Engineering
dc.departmentDepartment of Computer Engineering
dc.descriptionConference Name: 23rd International Conference on Cryptology and Network Security (CANS)
dc.descriptionDate of Conference: 24–27 September 2024
dc.description.abstractSplit learning enables efficient and privacy-aware training of a deep neural network by splitting a neural network so that the clients (data holders) compute the first layers and only share the intermediate output with the central compute-heavy server. This paradigm introduces a new attack medium in which the server has full control over what the client models learn, which has already been exploited to infer the private data of clients and to implement backdoors in the client models. Although previous work has shown that clients can successfully detect such training-hijacking attacks, the proposed methods rely on heuristics, require tuning of many hyperparameters, and do not fully utilize the clients' capabilities. In this work, we show that given modest assumptions regarding the clients' compute capabilities, an out-of-the-box outlier detection method can be used to detect existing training-hijacking attacks with almost-zero false positive rates. We conclude through experiments on different tasks that the simplicity of our approach we name SplitOut makes it a more viable and reliable alternative compared to the earlier detection methods.
dc.identifier.doi10.1007/978-981-97-8016-7_6
dc.identifier.eisbn9789819780167
dc.identifier.eissn1611-3349
dc.identifier.isbn9789819780150
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11693/116842
dc.language.isoEnglish
dc.publisherSpringer, Singapore
dc.relation.isversionofhttps://dx.doi.org/10.1007/978-981-97-8016-7_6
dc.source.title23rd International Conference on Cryptology and Network Security (CANS)
dc.subjectMachine learning
dc.subjectData privacy
dc.subjectSplit learning
dc.subjectTraining-hijacking
dc.titleSplitOut: out-of-the-box training-hijacking detection in split learning via outlier detection
dc.typeConference Paper

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
SplitOut_out-of-the-box_training-hijacking_detection_in_split_learning_via_outlier_detection.pdf
Size:
2.09 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: