Search Results for author: Carmela Troncoso

Found 20 papers, 13 papers with code

On the Conflict of Robustness and Learning in Collaborative Machine Learning

no code implementations21 Feb 2024 Mathilde Raynal, Carmela Troncoso

Collaborative Machine Learning (CML) allows participants to jointly train a machine learning model while keeping their training data private.

Privacy Preserving

The Fundamental Limits of Least-Privilege Learning

no code implementations19 Feb 2024 Theresa Stadler, Bogdan Kulynych, Nicoals Papernot, Michael Gastpar, Carmela Troncoso

The promise of least-privilege learning -- to find feature representations that are useful for a learning task but prevent inference of any sensitive information unrelated to this task -- is highly appealing.

Attribute

Transferable Adversarial Robustness for Categorical Data via Universal Robust Embeddings

1 code implementation NeurIPS 2023 Klim Kireev, Maksym Andriushchenko, Carmela Troncoso, Nicolas Flammarion

We present a method that allows us to train adversarially robust deep networks for tabular data and to transfer this robustness to other classifiers via universal robust embeddings tailored to categorical data.

Adversarial Robustness Fraud Detection +2

Can Decentralized Learning be more robust than Federated Learning?

no code implementations7 Mar 2023 Mathilde Raynal, Dario Pasquini, Carmela Troncoso

Decentralized Learning (DL) is a peer--to--peer learning approach that allows a group of users to jointly train a machine learning model.

Federated Learning

Arbitrary Decisions are a Hidden Cost of Differentially Private Training

1 code implementation28 Feb 2023 Bogdan Kulynych, Hsiang Hsu, Carmela Troncoso, Flavio P. Calmon

We demonstrate that such randomization incurs predictive multiplicity: for a given input example, the output predicted by equally-private models depends on the randomness used in training.

Privacy Preserving

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

1 code implementation18 Jan 2023 Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso

Specifically, the model uses deep learning to capture the correlation between the auxiliary data of a group of users (e. g., users of a web application) and their passwords.

Adversarial Robustness for Tabular Data through Cost and Utility Awareness

no code implementations27 Aug 2022 Klim Kireev, Bogdan Kulynych, Carmela Troncoso

We argue that, due to the differences between tabular data and images or text, existing threat models are not suitable for tabular domains.

Abuse Detection Adversarial Robustness

On the (In)security of Peer-to-Peer Decentralized Machine Learning

1 code implementation17 May 2022 Dario Pasquini, Mathilde Raynal, Carmela Troncoso

In this work, we carry out the first, in-depth, privacy analysis of Decentralized Learning -- a collaborative machine learning framework aimed at addressing the main limitations of federated learning.

BIG-bench Machine Learning Federated Learning +1

Synthetic Data -- Anonymisation Groundhog Day

1 code implementation13 Nov 2020 Theresa Stadler, Bristena Oprisanu, Carmela Troncoso

In other words, we empirically show that synthetic data does not provide a better tradeoff between privacy and utility than traditional anonymisation techniques.

Privacy Preserving

DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists

1 code implementation29 May 2020 Kasra EdalatNejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso

We present DatashareNetwork, a decentralized and privacy-preserving search system that enables journalists worldwide to find documents via a dedicated network of peers.

Cryptography and Security

Encrypted DNS --> Privacy? A Traffic Analysis Perspective

no code implementations24 Jun 2019 Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso

Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship.

Cryptography and Security

On (The Lack Of) Location Privacy in Crowdsourcing Applications

1 code implementation15 Jan 2019 Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso

Crowdsourcing enables application developers to benefit from large and diverse datasets at a low cost.

Cryptography and Security

Questioning the assumptions behind fairness solutions

no code implementations27 Nov 2018 Rebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda Gürses

In addition to their benefits, optimization systems can have negative economic, moral, social, and political effects on populations as well as their environments.

Decision Making Fairness +1

Evading classifiers in discrete domains with provable optimality guarantees

2 code implementations25 Oct 2018 Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso

We introduce a graphical framework that (1) generalizes existing attacks in discrete domains, (2) can accommodate complex cost functions beyond $p$-norms, including financial cost incurred when attacking a classifier, and (3) efficiently produces valid adversarial examples with guarantees of minimal adversarial cost.

Adversarial Robustness Spam detection +2

POTs: Protective Optimization Technologies

1 code implementation7 Jun 2018 Bogdan Kulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses

Fairness frameworks do so, in part, by mapping these problems to a narrow definition and assuming the service providers can be trusted to deploy countermeasures.

Decision Making Fairness

Feature importance scores and lossless feature pruning using Banzhaf power indices

no code implementations14 Nov 2017 Bogdan Kulynych, Carmela Troncoso

In particular, we propose the use of the Banzhaf power index as a measure of influence of features on the outcome of a classifier.

Feature Importance General Classification

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

2 code implementations19 Jul 2017 Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso

Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.