Skip to main content

Showing 1–8 of 8 results for author: Arora, S S

  1. arXiv:2309.04664  [pdf, other

    cs.CR cs.LG

    Compact: Approximating Complex Activation Functions for Secure Computation

    Authors: Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian

    Abstract: Secure multi-party computation (MPC) techniques can be used to provide data privacy when users query deep neural network (DNN) models hosted on a public cloud. State-of-the-art MPC techniques can be directly leveraged for DNN models that use simple activation functions such as ReLU. However, these techniques are ineffective and/or inefficient for the complex and highly non-linear activation functi… ▽ More

    Submitted 17 March, 2024; v1 submitted 8 September, 2023; originally announced September 2023.

    Comments: Accepted to Proceedings on Privacy Enhancing Technologies (PoPETs)

  2. arXiv:2303.11575  [pdf, other

    cs.CR cs.HC

    How Interactions Influence Users' Security Perception of Virtual Reality Authentication?

    Authors: Jingjie Li, Sunpreet Singh Arora, Kassem Fawaz, Younghyun Kim, Can Liu, Sebastian Meiser, Mohsen Minaei, Maliheh Shirvanian, Kim Wagner

    Abstract: Users readily embrace the rapid advancements in virtual reality (VR) technology within various everyday contexts, such as gaming, social interactions, shopping, and commerce. In order to facilitate transactions and payments, VR systems require access to sensitive user data and assets, which consequently necessitates user authentication. However, there exists a limited understanding regarding how u… ▽ More

    Submitted 3 June, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  3. arXiv:2101.04773  [pdf, other

    cs.SD cs.AI cs.CR eess.AS

    Practical Speech Re-use Prevention in Voice-driven Services

    Authors: Yangyong Zhang, Maliheh Shirvanian, Sunpreet S. Arora, Jianwei Huang, Guofei Gu

    Abstract: Voice-driven services (VDS) are being used in a variety of applications ranging from smart home control to payments using digital assistants. The input to such services is often captured via an open voice channel, e.g., using a microphone, in an unsupervised setting. One of the key operational security requirements in such setting is the freshness of the input speech. We present AEOLUS, a security… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

  4. arXiv:2012.15386  [pdf, other

    cs.CV cs.LG

    Beating Attackers At Their Own Games: Adversarial Example Detection Using Adversarial Gradient Directions

    Authors: Yuhang Wu, Sunpreet S. Arora, Yanhong Wu, Hao Yang

    Abstract: Adversarial examples are input examples that are specifically crafted to deceive machine learning classifiers. State-of-the-art adversarial example detection methods characterize an input example as adversarial either by quantifying the magnitude of feature variations under multiple perturbations or by measuring its distance from estimated benign example distribution. Instead of using such metrics… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

    Comments: Accepted at AAAI 2021

  5. arXiv:2004.03756  [pdf, other

    cs.CR cs.CV

    DashCam Pay: A System for In-vehicle Payments Using Face and Voice

    Authors: Cori Tymoszek, Sunpreet S. Arora, Kim Wagner, Anil K. Jain

    Abstract: We present our ongoing work on developing a system, called DashCam Pay, that enables in-vehicle payments in a seamless and secure manner using face and voice biometrics. A plug-and-play device (dashcam) mounted in the vehicle is used to capture face images and voice commands of passengers. Privacy-preserving biometric comparison techniques are used to compare the biometric data captured by the das… ▽ More

    Submitted 8 September, 2020; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: 9 pages

  6. arXiv:2003.11145  [pdf, other

    cs.CV cs.LG eess.IV

    Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study

    Authors: Dinh-Luan Nguyen, Sunpreet S. Arora, Yuhang Wu, Hao Yang

    Abstract: Deep learning-based systems have been shown to be vulnerable to adversarial attacks in both digital and physical domains. While feasible, digital attacks have limited applicability in attacking deployed systems, including face recognition systems, where an adversary typically has access to the input and not the transmission channel. In such setting, physical attacks that directly provide a malicio… ▽ More

    Submitted 16 April, 2020; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: To appear in the proceedings of the IEEE Computer Vision and Pattern Recognition (CVPR) Biometrics Workshop 2020 - 9 pages, 8 figures

  7. arXiv:1705.07972  [pdf, other

    cs.CV

    Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations

    Authors: Joshua J. Engelsma, Sunpreet S. Arora, Anil K. Jain, Nicholas G. Paulter Jr

    Abstract: We present the design and manufacturing of high fidelity universal 3D fingerprint targets, which can be imaged on a variety of fingerprint sensing technologies, namely capacitive, contact-optical, and contactless-optical. Universal 3D fingerprint targets enable, for the first time, not only a repeatable and controlled evaluation of fingerprint readers, but also the ability to conduct fingerprint r… ▽ More

    Submitted 22 May, 2017; originally announced May 2017.

    Comments: 14 pages, 14 figures

  8. arXiv:1504.04651  [pdf

    cs.CV

    Biometrics for Child Vaccination and Welfare: Persistence of Fingerprint Recognition for Infants and Toddlers

    Authors: Anil K. Jain, Sunpreet S. Arora, Lacey Best-Rowden, Kai Cao, Prem Sewak Sudhish, Anjoo Bhatnagar

    Abstract: With a number of emerging applications requiring biometric recognition of children (e.g., tracking child vaccination schedules, identifying missing children and preventing newborn baby swaps in hospitals), investigating the temporal stability of biometric recognition accuracy for children is important. The persistence of recognition accuracy of three of the most commonly used biometric traits (fin… ▽ More

    Submitted 17 April, 2015; originally announced April 2015.

    Comments: Michigan State University Technical Report

    Report number: MSU-CSE-15-7