Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

dc.contributor.authorAlam, Mohammad Mahmudul
dc.contributor.authorRaff, Edward
dc.contributor.authorOates, Tim
dc.contributor.authorHolt, James
dc.date.accessioned2022-07-14T18:55:09Z
dc.date.available2022-07-14T18:55:09Z
dc.date.issued2022-06-13
dc.descriptionProceedings of the 39 th International Conference on Machine Learning, Baltimore, Maryland, USA, PMLR 162, 2022.en
dc.description.abstractDue to the computational cost of running inference for a neural network, the need to deploy the inferential steps on a third party's compute environment or hardware is common. If the third party is not fully trusted, it is desirable to obfuscate the nature of the inputs and outputs, so that the third party can not easily determine what specific task is being performed. Provably secure protocols for leveraging an untrusted party exist but are too computational demanding to run in practice. We instead explore a different strategy of fast, heuristic security that we call Connectionist Symbolic Pseudo Secrets. By leveraging Holographic Reduced Representations (HRR), we create a neural network with a pseudo-encryption style defense that empirically shows robustness to attack, even under threat models that unrealistically favor the adversary.en
dc.description.urihttps://arxiv.org/abs/2206.05893en
dc.format.extent27 pagesen
dc.genreconference papers and proceedingsen
dc.genrepreprintsen
dc.identifierdoi:10.13016/m2cnst-9not
dc.identifier.urihttps://doi.org/10.48550/arXiv.2206.05893
dc.identifier.urihttp://hdl.handle.net/11603/25154
dc.language.isoenen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.en
dc.titleDeploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representationsen
dc.typeTexten
dcterms.creatorhttps://orcid.org/0000-0002-9900-1972en

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2206.05893.pdf
Size:
14.63 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: