Protecting intellectual property of large language model-based code generation apis via watermarks

Z Li, C Wang, S Wang, C Gao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The rise of large language model-based code generation (LLCG) has enabled various
commercial services and APIs. Training LLCG models is often expensive and time …

No privacy left outside: On the (in-) security of tee-shielded dnn partition for on-device ml

Z Zhang, C Gong, Y Cai, Y Yuan, B Liu… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
On-device ML introduces new security challenges: DNN models become white-box
accessible to device users. Based on white-box information, adversaries can conduct …

Graft: Efficient inference serving for hybrid deep learning with SLO guarantees via DNN re-alignment

J Wu, L Wang, Q **, F Liu - IEEE Transactions on Parallel and …, 2023 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been widely adopted for various mobile inference tasks,
yet their ever-increasing computational demands are hindering their deployment on …

Machine learning with confidential computing: A systematization of knowledge

F Mo, Z Tarkhani, H Haddadi - ACM computing surveys, 2024 - dl.acm.org
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …

CRONUS: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment

J Jiang, J Qi, T Shen, X Chen, S Zhao… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
With the trend of processing a large volume of sensitive data on PaaS services (eg, DNN
training), a TEE architecture that supports general heterogeneous accelerators, enables …

Fedslice: Protecting federated learning models from malicious participants with model slicing

Z Zhang, Y Li, B Liu, Y Cai, D Li… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Crowdsourcing Federated learning (CFL) is a new crowdsourcing development paradigm
for the Deep Neural Network (DNN) models, also called “software 2.0”. In practice, the …

Advancing Web 3.0: Making Smart Contracts Smarter on Blockchain

J Huang, L Kong, G Cheng, Q **ang, G Chen… - Proceedings of the …, 2024 - dl.acm.org
Blockchain and smart contracts are one of the key technologies promoting Web 3.0.
However, due to security considerations and consistency requirements, smart contracts …

Qdrl: Queue-aware online drl for computation offloading in industrial internet of things

A Xu, Z Hu, X Zhang, H **ao, H Zheng… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Recently, the Industrial Internet of Things (IIoT) has shown great application value in
environmental monitoring. However, it suffers from serious bottlenecks in energy and …

Silent guardian: Protecting text from malicious exploitation by large language models

J Zhao, K Chen, X Yuan, Y Qi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The rapid development of large language models (LLMs) has yielded impressive success in
various downstream tasks. However, the vast potential and remarkable capabilities of LLMs …

Guarantee: Towards attestable and private ml with cca

S Siby, S Abdollahi, M Maheri, M Kogias… - Proceedings of the 4th …, 2024 - dl.acm.org
Machine-learning (ML) models are increasingly being deployed on edge devices to provide
a variety of services. However, their deployment is accompanied by challenges in model …