Search Results for author: James Joshi

Found 6 papers, 2 papers with code

Privacy-Preserving Machine Learning: Methods, Challenges and Directions

no code implementations10 Aug 2021 Runhua Xu, Nathalie Baracaldo, James Joshi

In particular, existing PPML research cross-cut ML, systems and applications design, as well as security and privacy areas; hence, there is a critical need to understand state-of-the-art research, related challenges and a research roadmap for future research in PPML area.

Attribute BIG-bench Machine Learning +1

Adaptive ABAC Policy Learning: A Reinforcement Learning Approach

no code implementations18 May 2021 Leila Karimi, Mai Abdelhakim, James Joshi

In this paper, we propose an adaptive ABAC policy learning approach to automate the authorization management task.

Attribute Management +2

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data

no code implementations5 Mar 2021 Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig

We empirically demonstrate the applicability for multiple types of ML models and show a reduction of 10%-70% of training time and 80% to 90% in data transfer with respect to the state-of-the-art approaches.

Federated Learning Privacy Preserving

Blockchain-based Transparency Framework for Privacy Preserving Third-party Services

1 code implementation2 Feb 2021 Runhua Xu, Chao Li, James Joshi

We also formally show the security guarantee provided by TAB, and analyze the privacy guarantee and trustworthiness it provides.

Cryptography and Security Networking and Internet Architecture

NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-Sourced Datasets

1 code implementation18 Dec 2020 Runhua Xu, James Joshi, Chao Li

We propose a novel framework, NN-EMD, to train DNN over multiple encrypted datasets collected from multiple sources.

BIG-bench Machine Learning Privacy Preserving

An Automatic Attribute Based Access Control Policy Extraction from Access Logs

no code implementations16 Mar 2020 Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim

In this paper, we present a methodology for automatically learning ABAC policy rules from access logs of a system to simplify the policy development process.

Attribute

Cannot find the paper you are looking for? You can Submit a new open access paper.