Search Results for author: Hamed Haddadi

Found 36 papers, 16 papers with code

Rapid IoT Device Identification at the Edge

no code implementations26 Oct 2021 Oliver Thompson, Anna Maria Mandalari, Hamed Haddadi

Consumer Internet of Things (IoT) devices are increasingly common in everyday homes, from smart speakers to security cameras.

Multimodal Federated Learning

no code implementations10 Sep 2021 Yuchen Zhao, Payam Barnaghi, Hamed Haddadi

Federated learning is proposed as an alternative to centralized machine learning since its client-server structure provides better privacy protection and scalability in real-world applications.

Federated Learning

Revisiting IoT Device Identification

1 code implementation16 Jul 2021 Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi

Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such, they would greatly benefit from automated management.

Quantifying and Localizing Private Information Leakage from Neural Network Gradients

no code implementations28 May 2021 Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, Soteris Demetriou

In this paper, we introduce theoretically-motivated measures to quantify information leakages in both attack-dependent and attack-independent manners.

PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments

1 code implementation29 Apr 2021 Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis

We propose and implement a Privacy-preserving Federated Learning ($PPFL$) framework for mobile systems to limit privacy leakages in federated learning.

Federated Learning

Configurable Privacy-Preserving Automatic Speech Recognition

no code implementations1 Apr 2021 Ranya Aloufi, Hamed Haddadi, David Boyle

We show that overlapping speech inputs to ASR systems present further privacy concerns, and how these may be mitigated using speech separation and optimization techniques.

automatic-speech-recognition Speech Recognition +1

The Case for Retraining of ML Models for IoT Device Identification at the Edge

no code implementations17 Nov 2020 Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Yiming Xie, Richard Mortier, Hamed Haddadi

We therefore evaluate our approach using hardware resources and data sources representative of those that would be available at the edge of the network, such as in an IoT deployment.

Paralinguistic Privacy Protection at the Edge

no code implementations4 Nov 2020 Ranya Aloufi, Hamed Haddadi, David Boyle

One approach to mitigate the risk of paralinguistic-based privacy breaches is to exploit a combination of cloud-based processing with privacy-preserving, on-device paralinguistic information learning and filtering before transmitting voice data.

Knowledge Distillation Quantization +2

Semi-supervised Federated Learning for Activity Recognition

no code implementations2 Nov 2020 Yuchen Zhao, Hanyang Liu, Honglin Li, Payam Barnaghi, Hamed Haddadi

In this paper, we propose an activity recognition system that uses semi-supervised federated learning, wherein clients conduct unsupervised learning on autoencoders with unlabelled local data to learn general representations, and a cloud server conducts supervised learning on an activity classifier with labelled data.

Activity Recognition Data Augmentation +1

Layer-wise Characterization of Latent Information Leakage in Federated Learning

no code implementations17 Oct 2020 Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, Soteris Demetriou

Training deep neural networks via federated learning allows clients to share, instead of the original data, only the model trained on their data.

Federated Learning

Running Neural Networks on the NIC

no code implementations4 Sep 2020 Giuseppe Siracusano, Salvator Galea, Davide Sanvito, Mohammad Malekzadeh, Hamed Haddadi, Gianni Antichi, Roberto Bifulco

In this paper we show that the data plane of commodity programmable (Network Interface Cards) NICs can run neural network inference tasks required by packet monitoring applications, with low overhead.

DANA: Dimension-Adaptive Neural Architecture for Multivariate Sensor Data

2 code implementations5 Aug 2020 Mohammad Malekzadeh, Richard G. Clegg, Andrea Cavallaro, Hamed Haddadi

We introduce a dimension-adaptive pooling (DAP) layer that makes DNNs flexible and more robust to changes in sensor availability and in sampling rate.

Activity Recognition Imputation

Privacy-preserving Voice Analysis via Disentangled Representations

no code implementations29 Jul 2020 Ranya Aloufi, Hamed Haddadi, David Boyle

Our experimental evaluation over five datasets shows that the proposed framework can effectively defend against attribute inference attacks by reducing their success rates to approximately that of guessing at random, while maintaining accuracy in excess of 99% for the tasks of interest.

Representation Learning Speech Recognition

PrivEdge: From Local to Distributed Private Training and Prediction

1 code implementation12 Apr 2020 Ali Shahin Shamsabadi, Adria Gascon, Hamed Haddadi, Andrea Cavallaro

To address this problem, we propose PrivEdge, a technique for privacy-preserving MLaaS that safeguards the privacy of users who provide their data for training, as well as users who use the prediction service.

Image Compression

DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

2 code implementations12 Apr 2020 Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi

We present DarkneTZ, a framework that uses an edge device's Trusted Execution Environment (TEE) in conjunction with model partitioning to limit the attack surface against Deep Neural Networks (DNNs).

Image Classification

Towards Automatic Identification and Blocking of Non-Critical IoT Traffic Destinations

no code implementations16 Mar 2020 Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David Choffnes

Our initial results demonstrate that some IoT devices contact destinations that are not critical to their operation, and there is no impact on device functionality if these destinations are blocked.

Networking and Internet Architecture Cryptography and Security

Policy-Based Federated Learning

2 code implementations14 Mar 2020 Kleomenis Katevas, Eugene Bagdasaryan, Jason Waterman, Mohamad Mounir Safadieh, Eleanor Birrell, Hamed Haddadi, Deborah Estrin

In this paper we present PoliFL, a decentralized, edge-based framework that supports heterogeneous privacy policies for federated learning.

Federated Learning Image Classification

Privacy and Utility Preserving Sensor-Data Transformations

1 code implementation14 Nov 2019 Mohammad Malekzadeh, Richard G. Clegg, Andrea Cavallaro, Hamed Haddadi

Sensitive inferences and user re-identification are major threats to privacy when raw sensor data from wearable or portable devices are shared with cloud-assisted applications.

Activity Recognition

Privacy-Preserving Bandits

1 code implementation10 Sep 2019 Mohammad Malekzadeh, Dimitrios Athanasakis, Hamed Haddadi, Benjamin Livshits

Contextual bandit algorithms~(CBAs) often rely on personal data to provide recommendations.

Multi-Label Classification

Emotionless: Privacy-Preserving Speech Analysis for Voice Assistants

1 code implementation9 Aug 2019 Ranya Aloufi, Hamed Haddadi, David Boyle

The voice signal is a rich resource that discloses several possible states of a speaker, such as emotional state, confidence and stress levels, physical condition, age, gender, and personal traits.

Emotion Recognition Speech Recognition +1

Towards Characterizing and Limiting Information Exposure in DNN Layers

no code implementations13 Jul 2019 Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, Hamed Haddadi

Pre-trained Deep Neural Network (DNN) models are increasingly used in smartphones and other user devices to enable prediction services, leading to potential disclosures of (sensitive) information from training data captured inside these models.

Modeling and Forecasting Art Movements with CGANs

1 code implementation21 Jun 2019 Edoardo Lisi, Mohammad Malekzadeh, Hamed Haddadi, F. Din-Houn Lau, Seth Flaxman

Realisations from this distribution can be used by the CGAN to generate "future" paintings.

Mobile Sensor Data Anonymization

1 code implementation26 Oct 2018 Mohammad Malekzadeh, Richard G. Clegg, Andrea Cavallaro, Hamed Haddadi

Motion sensors such as accelerometers and gyroscopes measure the instant acceleration and rotation of a device, in three dimensions.

Activity Recognition

Deep Learning in Mobile and Wireless Networking: A Survey

no code implementations12 Mar 2018 Chaoyun Zhang, Paul Patras, Hamed Haddadi

One potential solution is to resort to advanced machine learning techniques to help managing the rise in data volumes and algorithm-driven applications.

Protecting Sensory Data against Sensitive Inferences

1 code implementation21 Feb 2018 Mohammad Malekzadeh, Richard G. Clegg, Andrea Cavallaro, Hamed Haddadi

Results show that the proposed framework maintains the usefulness of the transformed data for activity recognition, with an average loss of only around three percentage points, while reducing the possibility of gender classification to around 50\%, the target random guess, from more than 90\% when using raw sensor data.

Activity Recognition

Distributed One-class Learning

no code implementations10 Feb 2018 Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro

A major advantage of the proposed filter over existing distributed learning approaches is that users cannot access, even indirectly, the parameters of other users.

One-class classifier

Deep Private-Feature Extraction

1 code implementation9 Feb 2018 Seyed Ali Osia, Ali Taheri, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Hamid R. Rabiee

We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints.

Replacement AutoEncoder: A Privacy-Preserving Algorithm for Sensory Data Analysis

1 code implementation18 Oct 2017 Mohammad Malekzadeh, Richard G. Clegg, Hamed Haddadi

Though access to the sensory data is critical to the success of many beneficial applications such as health monitoring or activity recognition, a wide range of potentially sensitive information about the individuals can also be discovered through access to sensory data and this cannot easily be protected using traditional privacy approaches.

Activity Recognition Time Series

Privacy-Preserving Deep Inference for Rich User Data on The Cloud

1 code implementation4 Oct 2017 Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi

Our evaluations show that by using certain kind of fine-tuning and embedding techniques and at a small processing costs, we can greatly reduce the level of information available to unintended tasks applied to the data feature on the cloud, and hence achieving the desired tradeoff between privacy and performance.

Fine-tuning

A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics

1 code implementation8 Mar 2017 Seyed Ali Osia, Ali Shahin Shamsabadi, Sina Sajadmanesh, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi

To this end, instead of performing the whole operation on the cloud, we let an IoT device to run the initial layers of the neural network, and then send the output to the cloud to feed the remaining layers and produce the final result.

Fine-tuning

Privacy-Preserving Personal Model Training

no code implementations1 Mar 2017 Sandra Servia-Rodriguez, Liang Wang, Jianxin R. Zhao, Richard Mortier, Hamed Haddadi

Many current Internet services rely on inferences from models trained on user data.

Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web

no code implementations26 Oct 2016 Sina Sajadmanesh, Sina Jafarzadeh, Seyed Ali Osia, Hamid R. Rabiee, Hamed Haddadi, Yelena Mejova, Mirco Musolesi, Emiliano De Cristofaro, Gianluca Stringhini

In this paper, we present a large-scale study of recipes published on the web and their content, aiming to understand cuisines and culinary habits around the world.

The Effect of Social Feedback in a Reddit Weight Loss Community

no code implementations25 Feb 2016 Tiago O. Cunha, Ingmar Weber, Hamed Haddadi, Gisele L. Pappa

It is generally accepted as common wisdom that receiving social feedback is helpful to (i) keep an individual engaged with a community and to (ii) facilitate an individual's positive behavior change.

Social and Information Networks

Personal Data: Thinking Inside the Box

no code implementations20 Jan 2015 Hamed Haddadi, Heidi Howard, Amir Chaudhry, Jon Crowcroft, Anil Madhavapeddy, Richard Mortier

We propose there is a need for a technical platform enabling people to engage with the collection, management and consumption of personal data; and that this platform should itself be personal, under the direct control of the individual whose data it holds.

Computers and Society

Cannot find the paper you are looking for? You can Submit a new open access paper.