1 code implementation • 7 Nov 2023 • HANLIN ZHANG, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak
To prove this result, we introduce a generic efficient watermark attack; the attacker is not required to know the private key of the scheme or even which scheme is used.
1 code implementation • 18 Jan 2023 • Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso
Specifically, the model uses deep learning to capture the correlation between the auxiliary data of a group of users (e. g., users of a web application) and their passwords.
1 code implementation • 14 Nov 2021 • Dario Pasquini, Danilo Francati, Giuseppe Ateniese
Indeed, the use of secure aggregation prevents the server from learning the value and the source of the individual model updates provided by the users, hampering inference and data attribution attacks.
3 code implementations • 4 Dec 2020 • Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi
We investigate the security of Split Learning -- a novel collaborative machine learning framework that enables peak performance by requiring minimal resources consumption.
1 code implementation • 23 Oct 2020 • Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi
Password security hinges on an in-depth understanding of the techniques adopted by attackers.
1 code implementation • 15 Apr 2020 • Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi
Probabilistic password strength meters have been proved to be the most accurate tools to measure password strength.
no code implementations • ICLR 2018 • Pablo M. Olmos, Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Perez-Cruz
In this paper, we noticed that even though GANs might not be able to generate samples from the underlying distribution (or we cannot tell at least), they are capturing some structure of the data in that high dimensional space.
3 code implementations • 1 Sep 2017 • Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Perez-Cruz
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable users to check billions of passwords per second against password hashes.
no code implementations • 24 Feb 2017 • Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz
Unfortunately, we show that any privacy-preserving collaborative deep learning is susceptible to a powerful attack that we devise in this paper.
no code implementations • 19 Jun 2013 • Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali
Machine Learning (ML) algorithms are used to train computers to perform a variety of complex tasks and improve with experience.