no code implementations • 21 May 2024 • Mengwei Yang, Ismat Jarin, Baturalp Buyukates, Salman Avestimehr, Athina Markopoulou
In this paper, we first design a Maverick-aware Shapley valuation that fairly evaluates the contribution of Mavericks.
no code implementations • 30 Oct 2023 • Tianyue Chu, Mengwei Yang, Nikolaos Laoutaris, Athina Markopoulou
Federated learning (FL) is a paradigm that allows several client devices and a server to collaboratively train a global model, by exchanging only model updates, without the devices sharing their local training data.
1 code implementation • 25 Feb 2022 • Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq
AutoFR is effective: it generates filter rules that can block 86% of the ads, as compared to 87% by EasyList, while achieving comparable visual breakage.
no code implementations • 8 Feb 2022 • Emmanouil Alimpertis, Athina Markopoulou, Carter T. Butts, Evita Bakopoulou, Konstantinos Psounis
This improves prediction (e. g., from 64% to 94% in recall for coverage loss) by removing points with negative values, and can also enable data minimization.
no code implementations • 7 Dec 2021 • Evita Bakopoulou, Mengwei Yang, Jiang Zhang, Konstantinos Psounis, Athina Markopoulou
We consider the problem of predicting cellular network performance (signal maps) from measurements collected by several mobile devices.
1 code implementation • 2020 • Minas Gjoka, Maciej Kurant, Carter T. Butts, Athina Markopoulou
Our goal in this paper is to obtain a representative (unbiased) sample of Facebook users by crawling its social graph.
no code implementations • 30 Jul 2019 • Evita Bakopoulou, Balint Tillman, Athina Markopoulou
In this paper, we apply, for the first time, a Federated Learning approach to mobile packet classification, which allows mobile devices to collaborate and train a global model, without sharing raw training data.
no code implementations • 26 Jul 2019 • Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, Brian Demsky
Smart home devices are vulnerable to passive inference attacks based on network traffic, even in the presence of encryption.