Search Results for author: Daniël Vos

Found 7 papers, 5 papers with code

Differentially-Private Decision Trees and Provable Robustness to Data Poisoning

1 code implementation24 May 2023 Daniël Vos, Jelle Vos, Tianyu Li, Zekeriya Erkin, Sicco Verwer

By leveraging the better privacy-utility trade-off of PrivaTree we are able to train decision trees with significantly better robustness against backdoor attacks compared to regular decision trees and with meaningful theoretical guarantees.

Data Poisoning

Optimal Decision Tree Policies for Markov Decision Processes

1 code implementation30 Jan 2023 Daniël Vos, Sicco Verwer

While there is generally a trade-off between the performance and interpretability of machine learning models, we find that OMDTs limited to a depth of 3 often perform close to the optimal limit.

Imitation Learning

SoK: Explainable Machine Learning for Computer Security Applications

1 code implementation22 Aug 2022 Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer

The security literature sometimes also fails to disentangle the role of the various stakeholders, e. g., by providing explanations to model users and designers while also exposing them to adversaries.

Computer Security Explainable artificial intelligence +1

Robust Optimal Classification Trees Against Adversarial Examples

no code implementations8 Sep 2021 Daniël Vos, Sicco Verwer

Decision trees are a popular choice of explainable model, but just like neural networks, they suffer from adversarial examples.

Classification

Efficient Training of Robust Decision Trees Against Adversarial Examples

1 code implementation18 Dec 2020 Daniël Vos, Sicco Verwer

We can use algorithms that take adversarial attacks into account to fit trees that are more robust.

Adversarial Attack

DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration

no code implementations25 Mar 2018 Daniël Vos, Leon Overweel, Wouter Raateland, Jelle Vos, Matthijs Bijman, Max Pigmans, Zekeriya Erkin

In our system, economic operators make claims to the network about goods they insert into or remove from containers, and encrypt these claims so that they can only be read by the destination country's customs agency.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.