1 code implementation • 19 Feb 2023 • Jiahua Xu, Daniel Perez, Yebo Feng, Benjamin Livshits
In recent years, decentralized finance (DeFi) has experienced remarkable growth, with various protocols such as lending protocols and automated market makers (AMMs) emerging.
no code implementations • 9 May 2021 • Lorenzo Minto, Moritz Haller, Hamed Haddadi, Benjamin Livshits
Recommender systems are commonly trained on centrally collected user interaction data like views or clicks.
1 code implementation • 28 Sep 2020 • Daniel Perez, Sam M. Werner, Jiahua Xu, Benjamin Livshits
We find that liquidators' efficiency has improved significantly over time, with currently over 70% of liquidable positions being immediately liquidated.
1 code implementation • 5 Mar 2020 • Daniel Perez, Jiahua Xu, Benjamin Livshits
In particular, 96% of the transactions on EOSIO were triggered by the airdrop of a currently valueless token; on Tezos, 76% of throughput was used for maintaining consensus; and over 94% of transactions on XRPL carried no economic value.
Cryptography and Security
1 code implementation • 10 Sep 2019 • Mohammad Malekzadeh, Dimitrios Athanasakis, Hamed Haddadi, Benjamin Livshits
Contextual bandit algorithms~(CBAs) often rely on personal data to provide recommendations.
2 code implementations • 17 May 2019 • Zain ul abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits
In this paper we present Percival, a browser-embedded, lightweight, deep learning-powered ad blocker.
1 code implementation • 18 Feb 2019 • Daniel Perez, Benjamin Livshits
In the last year we have seen a great deal of both academic and practical interest in the topic of vulnerabilities in smart contracts, particularly those developed for the Ethereum blockchain.
Cryptography and Security
1 code implementation • 25 Nov 2018 • Jiahua Xu, Benjamin Livshits
While pump-and-dump schemes have attracted the attention of cryptocurrency observers and regulators alike, this paper represents the first detailed empirical query of pump-and-dump activities in cryptocurrency markets.
1 code implementation • 22 May 2018 • Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq
AdGraph differs from existing approaches by building a graph representation of the HTML structure, network requests, and JavaScript behavior of a webpage, and using this unique representation to train a classifier for identifying advertising and tracking resources.
no code implementations • 2 May 2017 • Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits
We propose a hybrid model of differential privacy that considers a combination of regular and opt-in users who desire the differential privacy guarantees of the local privacy model and the trusted curator model, respectively.