Federated learning for privacy preservation of healthcare data from smartphone-based side-channel attacks

A Rehman, I Razzak, G Xu - IEEE Journal of Biomedical and …, 2022 - ieeexplore.ieee.org
Federated learning (FL) has recently emerged as a striking framework for allowing machine
and deep learning models with thousands of participants to have distributed training to …

Tandem deep learning side-channel attack on FPGA implementation of AES

H Wang, E Dubrova - SN Computer Science, 2021 - Springer
Side-channel attacks have become a realistic threat to implementations of cryptographic
algorithms, especially with the help of deep-learning techniques. The majority of recently …

Advanced far field EM side-channel attack on AES

R Wang, H Wang, E Dubrova, M Brisfors - … of the 7th ACM on Cyber …, 2021 - dl.acm.org
Several attacks on AES using far field electromagnetic (EM) emission as a side channel
have been recently presented. Unlike power analysis or near filed EM analysis, far field EM …

[PDF][PDF] Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response

M Varun, S Feng, H Wang, S Sural… - Proceedings of the …, 2024 - yhongcs.github.io
Federated Learning (FL), a privacy-preserving training approach, has proven to be effective,
yet its vulnerability to attacks that extract information from model weights is widely …

Tinyfl: On-device training, communication and aggregation on a microcontroller for federated learning

L Wulfert, C Wiede, A Grabmaier - 2023 21st IEEE Interregional …, 2023 - ieeexplore.ieee.org
In federated learning (FL), in contrast to centralized ML learning processes, ML models are
sent rather than the raw data. Therefore, FL is a decentralized and privacy-compliant …

Privacy-Preserving Orthogonal Aggregation for Guaranteeing Gender Fairness in Federated Recommendation

S Zhang, Y Ding, W Tang, W Sun, Y Liao… - arxiv preprint arxiv …, 2024 - arxiv.org
Under stringent privacy constraints, whether federated recommendation systems can
achieve group fairness remains an inadequately explored question. Taking gender fairness …

[PDF][PDF] Cross-Subkey Deep-Learning Side-Channel Analysis.

F Hu, H Wang, J Wang - IACR Cryptol. ePrint Arch., 2021 - scholar.archive.org
The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use
neural networks trained on a segment of traces containing operations only related to the …

Software implementation of aes-128: Cross-subkey side channel attack

F Hu, J Wang, W Wang, F Ni - Open Access Library Journal, 2022 - scirp.org
The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use
neural networks trained on a segment of traces containing operations only related to the …

Power Analysis Side-Channel Attacks on Same and Cross-Device Settings: A Survey of Machine Learning Techniques

A Ghimire, VV Baligodugula, F Amsaad - IFIP International Internet of …, 2023 - Springer
Abstract Systems that use secret keys or personal details are seriously at risk from side-
channel attacks, especially if they rely on power analysis. Attackers can use unintentional …

DLSCA: Improving Cross-Device Side-Channel Analysis Using Device Discrepancy Correction

F Hu, Y Li, H Tan, S Jiang, Z **ao - 2023 IEEE Smart World …, 2023 - ieeexplore.ieee.org
In this paper, we focus on the problem of Transfer Learning (TL) in Side-Channel Analysis
(SCA) due to differences between the source device and the target device. Such differences …