1 code implementation • 6 Mar 2024 • Dario Pasquini, Martin Strohmeier, Carmela Troncoso
We introduce a new family of prompt injection attacks, termed Neural Exec.
no code implementations • 21 Feb 2024 • Mathilde Raynal, Carmela Troncoso
Collaborative Machine Learning (CML) allows participants to jointly train a machine learning model while keeping their training data private.
no code implementations • 19 Feb 2024 • Theresa Stadler, Bogdan Kulynych, Nicoals Papernot, Michael Gastpar, Carmela Troncoso
The promise of least-privilege learning -- to find feature representations that are useful for a learning task but prevent inference of any sensitive information unrelated to this task -- is highly appealing.
1 code implementation • NeurIPS 2023 • Klim Kireev, Maksym Andriushchenko, Carmela Troncoso, Nicolas Flammarion
We present a method that allows us to train adversarially robust deep networks for tabular data and to transfer this robustness to other classifiers via universal robust embeddings tailored to categorical data.
no code implementations • 7 Mar 2023 • Mathilde Raynal, Dario Pasquini, Carmela Troncoso
Decentralized Learning (DL) is a peer--to--peer learning approach that allows a group of users to jointly train a machine learning model.
1 code implementation • 28 Feb 2023 • Bogdan Kulynych, Hsiang Hsu, Carmela Troncoso, Flavio P. Calmon
We demonstrate that such randomization incurs predictive multiplicity: for a given input example, the output predicted by equally-private models depends on the randomness used in training.
1 code implementation • 18 Jan 2023 • Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso
Specifically, the model uses deep learning to capture the correlation between the auxiliary data of a group of users (e. g., users of a web application) and their passwords.
no code implementations • 27 Aug 2022 • Klim Kireev, Bogdan Kulynych, Carmela Troncoso
We argue that, due to the differences between tabular data and images or text, existing threat models are not suitable for tabular domains.
1 code implementation • 17 May 2022 • Dario Pasquini, Mathilde Raynal, Carmela Troncoso
In this work, we carry out the first, in-depth, privacy analysis of Decentralized Learning -- a collaborative machine learning framework aimed at addressing the main limitations of federated learning.
1 code implementation • 13 Nov 2020 • Theresa Stadler, Bristena Oprisanu, Carmela Troncoso
In other words, we empirically show that synthetic data does not provide a better tradeoff between privacy and utility than traditional anonymisation techniques.
1 code implementation • 29 May 2020 • Kasra EdalatNejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso
We present DatashareNetwork, a decentralized and privacy-preserving search system that enables journalists worldwide to find documents via a dedicated network of peers.
Cryptography and Security
3 code implementations • 25 May 2020 • Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Čapkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira
This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale.
Cryptography and Security Computers and Society
no code implementations • 24 Jun 2019 • Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso
Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship.
Cryptography and Security
2 code implementations • 2 Jun 2019 • Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso
Differential privacy bounds disparate vulnerability but can significantly reduce the accuracy of the model.
1 code implementation • 15 Jan 2019 • Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso
Crowdsourcing enables application developers to benefit from large and diverse datasets at a low cost.
Cryptography and Security
no code implementations • 27 Nov 2018 • Rebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda Gürses
In addition to their benefits, optimization systems can have negative economic, moral, social, and political effects on populations as well as their environments.
2 code implementations • 25 Oct 2018 • Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso
We introduce a graphical framework that (1) generalizes existing attacks in discrete domains, (2) can accommodate complex cost functions beyond $p$-norms, including financial cost incurred when attacking a classifier, and (3) efficiently produces valid adversarial examples with guarantees of minimal adversarial cost.
1 code implementation • 7 Jun 2018 • Bogdan Kulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses
Fairness frameworks do so, in part, by mapping these problems to a narrow definition and assuming the service providers can be trusted to deploy countermeasures.
no code implementations • 14 Nov 2017 • Bogdan Kulynych, Carmela Troncoso
In particular, we propose the use of the Banzhaf power index as a measure of influence of features on the outcome of a classifier.
2 code implementations • 19 Jul 2017 • Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso
Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Cryptography and Security