no code implementations • 24 Sep 2021 • Marcello Ienca, Joseph J. Fins, Ralf J. Jox, Fabrice Jotterand, Silja Voeneky, Roberto Andorno, Tonio Ball, Claude Castelluccia, Ricardo Chavarriaga, Hervé Chneiweiss, Agata Ferretti, Orsolya Friedrich, Samia Hurst, Grischa Merkel, Fruzsina Molnar-Gabor, Jean-Marc Rickli, James Scheibner, Effy Vayena, Rafael Yuste, Philipp Kellmeyer
The increasing availability of brain data within and outside the biomedical field, combined with the application of artificial intelligence (AI) to brain data analysis, poses a challenge for ethics and governance.
no code implementations • 27 Feb 2021 • Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès
This bandwidth and corresponding processing costs could be prohibitive if the participating entities are, for example, mobile devices.
no code implementations • 10 Nov 2020 • Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès
In this paper, compressive sensing is used to reduce the model size and hence increase model quality without sacrificing privacy.
no code implementations • 15 Oct 2020 • Raouf Kerkouche, Gergely Ács, Claude Castelluccia
This paper presents a new federated learning scheme that provides different trade-offs between robustness, privacy, bandwidth efficiency, and model accuracy.
no code implementations • 13 Sep 2017 • Gergely Acs, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro
We model the generator distribution of the training data with a mixture of $k$ generative neural networks.
2 code implementations • 24 Apr 2013 • Claude Castelluccia, Abdelberi Chaabane, Markus Dürmuth, Daniele Perito
In extensive experiments we show that it can crack up to 69% of passwords at 10 billion guesses, more than all probabilistic password crackers we compared again t. Second, we systematically analyze the idea that additional personal information about a user helps in speeding up password guessing.
Cryptography and Security
1 code implementation • 22 Jan 2009 • Aurélien Francillon, Claude Castelluccia
To our knowledge, this is the first result that presents a code injection technique for such devices.
Cryptography and Security