no code implementations • 27 Oct 2024 • Ari Juels, Farinaz Koushanfar
We propose protected pipelines or props for short, a new approach for authenticated, privacy-preserving access to deep-web data for machine learning (ML).
1 code implementation • 4 Dec 2019 • Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramer, Giulia Fanti, Ari Juels
Incentive mechanisms are central to the functionality of permissionless blockchains: they incentivize participants to run and secure the underlying consensus protocol.
Cryptography and Security
5 code implementations • 10 Apr 2019 • Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels
We study the breadth of DEX arbitrage bots in a subset of transactions that yield quantifiable revenue to these bots.
Cryptography and Security Computer Science and Game Theory
no code implementations • 14 Apr 2018 • Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, Dawn Song
Smart contracts are applications that execute on blockchains.
Cryptography and Security
1 code implementation • 9 Sep 2016 • Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
In such attacks, an adversary with black-box access, but no prior knowledge of an ML model's parameters or training data, aims to duplicate the functionality of (i. e., "steal") the model.