no code implementations • 16 Mar 2021 • Sylvain Chatel, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux
Tree-based models are among the most efficient machine learning techniques for data mining nowadays due to their accuracy, interpretability, and simplicity.
no code implementations • 1 Sep 2020 • Sinem Sav, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, Jean-Pierre Hubaux
In this paper, we address the problem of privacy-preserving training and evaluation of neural networks in an $N$-party, federated learning setting.
1 code implementation • 8 Jul 2020 • Sylvain Chatel, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Jean-Pierre Hubaux
Service providers are interested in verifying the integrity of the users' data to improve their services and obtain useful knowledge for their business.
Cryptography and Security
3 code implementations • 25 May 2020 • Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Čapkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira
This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale.
Cryptography and Security Computers and Society
1 code implementation • 5 Oct 2018 • Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro
Unfortunately, however, research on CPB has only focused on increasing the number of predicted attacks but has not considered the impact on false positives and false negatives.
Cryptography and Security
no code implementations • 21 Sep 2016 • Apostolos Pyrgelis, Emiliano De Cristofaro, Gordon Ross
Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes.
no code implementations • 13 Dec 2015 • Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro
(Withdrawn) Collaborative security initiatives are increasingly often advocated to improve timeliness and effectiveness of threat mitigation.