Search Results for author: Valerio Schiavoni

Found 6 papers, 2 papers with code

Mitigating Adversarial Attacks in Federated Learning with Trusted Execution Environments

1 code implementation13 Sep 2023 Simon Queyrut, Valerio Schiavoni, Pascal Felber

In particular, Pelta constitutes the first attempt at defending an ensemble model against the Self-Attention Gradient attack to the best of our knowledge.

Autonomous Vehicles Federated Learning

Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning

no code implementations8 Aug 2023 Simon Queyrut, Yérom-David Bromberg, Valerio Schiavoni

The main premise of federated learning is that machine learning model updates are computed locally, in particular to preserve user data privacy, as those never leave the perimeter of their device.

Adversarial Attack Federated Learning

Understanding Cryptocoins Trends Correlations

1 code implementation30 Nov 2022 Pasquale De Rosa, Valerio Schiavoni

Secure encryption techniques guarantee the security of the transactions (transfers of coins across owners), registered into the ledger.

Time Series Time Series Analysis

Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

no code implementations11 Aug 2022 Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni

Specifically, in FL, models are trained on the users devices and only model updates (i. e., gradients) are sent to a central server for aggregation purposes.

Federated Learning

Plinius: Secure and Persistent Machine Learning Model Training

no code implementations7 Apr 2021 Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana

With the increasing popularity of cloud based machine learning (ML) techniques there comes a need for privacy and integrity guarantees for ML data.

BIG-bench Machine Learning

TEEMon: A continuous performance monitoring framework for TEEs

no code implementations11 Dec 2020 Robert Krahn, Donald Dragoti, Franz Gregor, Do Le Quoc, Valerio Schiavoni, Pascal Felber, Clenimar Souza, Andrey Brito, Christof Fetzer

Currently, only a limited number of performance measurement tools for TEE-based applications exist and none offer performance monitoring and analysis during runtime.

Cryptography and Security Distributed, Parallel, and Cluster Computing Performance C.4

Cannot find the paper you are looking for? You can Submit a new open access paper.