1 code implementation • 5 Jun 2021 • Amir Ahooye Atashin, Behrooz Razeghi, Deniz Gündüz, Slava Voloshynovskiy
We study the role of information complexity in privacy leakage about an attribute of an adversary's interest, which is not known a priori to the system designer.
no code implementations • 8 Feb 2021 • Behrooz Razeghi, Sohrab Ferdowsi, Dimche Kostadinov, Flavio. P. Calmon, Slava Voloshynovskiy
In this paper, we propose a framework for privacy-preserving approximate near neighbor search via stochastic sparsifying encoding.
1 code implementation • 4 Feb 2020 • Sohrab Ferdowsi, Behrooz Razeghi, Taras Holotyak, Flavio P. Calmon, Slava Voloshynovskiy
We propose a practical framework to address the problem of privacy-aware image sharing in large-scale setups.
no code implementations • 15 Jul 2019 • Behrooz Razeghi, Taras Stanko, Boris Škorić, Slava Voloshynovskiy
We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization.
no code implementations • 8 May 2019 • Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy
In this paper, we address the problem of data reconstruction from privacy-protected templates, based on recent concept of sparse ternary coding with ambiguization (STCA).
no code implementations • 30 Jan 2019 • Dimche Kostadinov, Behrooz Razeghi, Taras Holotyak, Slava Voloshynovskiy
We introduce a clustering principle that is based on evaluation of a parametric min-max measure for the discriminative prior.
no code implementations • 20 May 2018 • Dimche Kostadinov, Behrooz Razeghi, Sohrab Ferdowsi, Slava Voloshynovskiy
This paper presents a locally decoupled network parameter learning with local propagation.
no code implementations • 29 Sep 2017 • Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran
The sparsifying transform and privacy amplification are not symmetric for the data owner and data user.
no code implementations • 12 Aug 2014 • Alireza Naghizadeh, Tahereh Yourdkhani, Behrooz Razeghi, Ehsan Meamari
Peer-to-Peer (P2P) networks as distributed solutions are used in a variety of applications.