Federated learning for privacy preservation of healthcare data from smartphone-based side-channel attacks
Federated learning (FL) has recently emerged as a striking framework for allowing machine
and deep learning models with thousands of participants to have distributed training to …
and deep learning models with thousands of participants to have distributed training to …
Tandem deep learning side-channel attack on FPGA implementation of AES
Side-channel attacks have become a realistic threat to implementations of cryptographic
algorithms, especially with the help of deep-learning techniques. The majority of recently …
algorithms, especially with the help of deep-learning techniques. The majority of recently …
Advanced far field EM side-channel attack on AES
Several attacks on AES using far field electromagnetic (EM) emission as a side channel
have been recently presented. Unlike power analysis or near filed EM analysis, far field EM …
have been recently presented. Unlike power analysis or near filed EM analysis, far field EM …
[PDF][PDF] Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response
Federated Learning (FL), a privacy-preserving training approach, has proven to be effective,
yet its vulnerability to attacks that extract information from model weights is widely …
yet its vulnerability to attacks that extract information from model weights is widely …
Tinyfl: On-device training, communication and aggregation on a microcontroller for federated learning
In federated learning (FL), in contrast to centralized ML learning processes, ML models are
sent rather than the raw data. Therefore, FL is a decentralized and privacy-compliant …
sent rather than the raw data. Therefore, FL is a decentralized and privacy-compliant …
Privacy-Preserving Orthogonal Aggregation for Guaranteeing Gender Fairness in Federated Recommendation
Under stringent privacy constraints, whether federated recommendation systems can
achieve group fairness remains an inadequately explored question. Taking gender fairness …
achieve group fairness remains an inadequately explored question. Taking gender fairness …
[PDF][PDF] Cross-Subkey Deep-Learning Side-Channel Analysis.
F Hu, H Wang, J Wang - IACR Cryptol. ePrint Arch., 2021 - scholar.archive.org
The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use
neural networks trained on a segment of traces containing operations only related to the …
neural networks trained on a segment of traces containing operations only related to the …
Software implementation of aes-128: Cross-subkey side channel attack
F Hu, J Wang, W Wang, F Ni - Open Access Library Journal, 2022 - scirp.org
The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use
neural networks trained on a segment of traces containing operations only related to the …
neural networks trained on a segment of traces containing operations only related to the …
Power Analysis Side-Channel Attacks on Same and Cross-Device Settings: A Survey of Machine Learning Techniques
Abstract Systems that use secret keys or personal details are seriously at risk from side-
channel attacks, especially if they rely on power analysis. Attackers can use unintentional …
channel attacks, especially if they rely on power analysis. Attackers can use unintentional …
DLSCA: Improving Cross-Device Side-Channel Analysis Using Device Discrepancy Correction
In this paper, we focus on the problem of Transfer Learning (TL) in Side-Channel Analysis
(SCA) due to differences between the source device and the target device. Such differences …
(SCA) due to differences between the source device and the target device. Such differences …