1 code implementation • 24 May 2023 • Daniël Vos, Jelle Vos, Tianyu Li, Zekeriya Erkin, Sicco Verwer
By leveraging the better privacy-utility trade-off of PrivaTree we are able to train decision trees with significantly better robustness against backdoor attacks compared to regular decision trees and with meaningful theoretical guarantees.
1 code implementation • 30 Jan 2023 • Daniël Vos, Sicco Verwer
While there is generally a trade-off between the performance and interpretability of machine learning models, we find that OMDTs limited to a depth of 3 often perform close to the optimal limit.
1 code implementation • 22 Aug 2022 • Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer
The security literature sometimes also fails to disentangle the role of the various stakeholders, e. g., by providing explanations to model users and designers while also exposing them to adversaries.
1 code implementation • 25 Jan 2022 • Laurens Bliek, Paulo da Costa, Reza Refaei Afshar, Yingqian Zhang, Tom Catshoek, Daniël Vos, Sicco Verwer, Fynn Schmitt-Ulms, André Hottung, Tapan Shah, Meinolf Sellmann, Kevin Tierney, Carl Perreault-Lafleur, Caroline Leboeuf, Federico Bobbio, Justine Pepin, Warley Almeida Silva, Ricardo Gama, Hugo L. Fernandes, Martin Zaefferer, Manuel López-Ibáñez, Ekhine Irurozki
Overall, by organizing this competition we have introduced routing problems as an interesting problem setting for AI researchers.
no code implementations • 8 Sep 2021 • Daniël Vos, Sicco Verwer
Decision trees are a popular choice of explainable model, but just like neural networks, they suffer from adversarial examples.
1 code implementation • 18 Dec 2020 • Daniël Vos, Sicco Verwer
We can use algorithms that take adversarial attacks into account to fit trees that are more robust.
no code implementations • 25 Mar 2018 • Daniël Vos, Leon Overweel, Wouter Raateland, Jelle Vos, Matthijs Bijman, Max Pigmans, Zekeriya Erkin
In our system, economic operators make claims to the network about goods they insert into or remove from containers, and encrypt these claims so that they can only be read by the destination country's customs agency.
Cryptography and Security