no code implementations • 5 Aug 2024 • Josh Millar, Sarab Sethi, Hamed Haddadi, Anil Madhavapeddy
In-situ sensing devices need to be deployed in remote environments for long periods of time; minimizing their power consumption is vital for maximising both their operational lifetime and coverage.
no code implementations • 27 May 2024 • Mohammad Mahdi Maheri, Sandra Siby, Sina Abdollahi, Anastasia Borovykh, Hamed Haddadi
Personalized learning is a proposed approach to address the problem of data heterogeneity in collaborative machine learning.
no code implementations • 10 May 2024 • Mengjia Niu, Hao Li, Jie Shi, Hamed Haddadi, Fan Mo
Large language models (LLMs) have demonstrated remarkable capabilities across various domains, although their susceptibility to hallucination poses significant challenges for their deployment in critical areas such as healthcare.
1 code implementation • 23 Mar 2024 • Yushan Huang, Josh Millar, Yuxuan Long, Yuchen Zhao, Hamed Haddadi
For each type, we fine-tune different blocks of the model to achieve optimal performance with reduced energy costs.
1 code implementation • 19 Mar 2024 • Stefanos Laskaridis, Kleomenis Katevas, Lorenzo Minto, Hamed Haddadi
Transformers have revolutionized the machine learning landscape, gradually making their way into everyday tasks and equipping our computers with "sparks of intelligence".
no code implementations • 12 Mar 2024 • Yushan Huang, Ranya Aloufi, Xavier Cadet, Yuchen Zhao, Payam Barnaghi, Hamed Haddadi
On MCUs, compared to the standard full model inference, MicroT can save up to about 29. 13% in energy consumption.
no code implementations • 25 Jan 2024 • Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David Choffnes, Hamed Haddadi
With an increasing number of Internet of Things (IoT) devices present in homes, there is a rise in the number of potential information leakage channels and their associated security threats and privacy risks.
2 code implementations • 6 Nov 2023 • Siqi Li, Di Miao, Qiming Wu, Chuan Hong, Danny D'Agostino, Xin Li, Yilin Ning, Yuqing Shang, Huazhu Fu, Marcus Eng Hock Ong, Hamed Haddadi, Nan Liu
Our goal was to bridge the gap by presenting the first comprehensive comparison of FL frameworks from both engineering and statistical domains.
no code implementations • 11 Sep 2023 • Mengjia Niu, Yuchen Zhao, Hamed Haddadi
Multivariate time series (MTS) data collected from multiple sensors provide the potential for accurate abnormal activity detection in smart healthcare scenarios.
no code implementations • 7 Jun 2023 • Xavier F. Cadet, Ranya Aloufi, Sara Ahmadi-Abhari, Hamed Haddadi
We are the first to evaluate the representations from pre-trained state-of-the-art Self-Supervised models across three downstream tasks on dysarthric speech: disease classification, word recognition and intelligibility classification, and under three noise scenarios on the UA-Speech dataset.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +3
no code implementations • 2 Jun 2023 • Xavier F. Cadet, Ranya Aloufi, Alain Miranville, Sara Ahmadi-Abhari, Hamed Haddadi
Despite impressive empirical advances of SSL in solving various tasks, the problem of understanding and characterizing SSL representations learned from input data remains relatively under-explored.
no code implementations • 30 May 2023 • Yushan Huang, Hamed Haddadi
The results demonstrate that, our pipeline can achieve 97. 78% accuracy with 483. 82 KB Flash, 70. 32 KB RAM, 118 ms runtime, 4. 83 mW power, and 0. 57 mJ energy consumption on MCUs, reducing by 64. 17%, 12. 31%, 52. 42%, 63. 74%, and 82. 67%, compared to the baseline.
no code implementations • 9 May 2023 • Yacine Belal, Sonia Ben Mokhtar, Hamed Haddadi, Jaron Wang, Afra Mashhadi
Federated learning involves training statistical models over edge devices such as mobile phones such that the training data is kept local.
no code implementations • 14 Apr 2023 • Siqi Li, Pinyan Liu, Gustavo G. Nascimento, Xinru Wang, Fabio Renato Manzolli Leite, Bibhas Chakraborty, Chuan Hong, Yilin Ning, Feng Xie, Zhen Ling Teo, Daniel Shu Wei Ting, Hamed Haddadi, Marcus Eng Hock Ong, Marco Aurélio Peres, Nan Liu
Structured data, one of the most prevalent forms of clinical data, has experienced significant growth in volume concurrently, notably with the widespread adoption of electronic health records in clinical practice.
no code implementations • 10 Apr 2023 • Yuting Zhan, Hamed Haddadi, Afra Mashhadi
Preserving the individuals' privacy in sharing spatial-temporal datasets is critical to prevent re-identification attacks based on unique trajectories.
1 code implementation • 22 Feb 2023 • Yushan Huang, Yuchen Zhao, Alexander Capstick, Francesca Palermo, Hamed Haddadi, Payam Barnaghi
For applications with stochastic state transitions, features are developed based on Shannon's entropy of Markov chains, entropy rates of Markov chains, entropy production of Markov chains, and von Neumann entropy of Markov chains.
no code implementations • 27 Dec 2022 • Savvas Hadjixenophontos, Anna Maria Mandalari, Yuchen Zhao, Hamed Haddadi
In this paper, we propose PRISM, an edge-based system for experimenting with in-home smart healthcare devices.
no code implementations • 4 Oct 2022 • Yushan Huang, Yuchen Zhao, Hamed Haddadi, Payam Barnaghi
The study uses Internet of Things (IoT) enabled solutions for continuous monitoring of in-home activity, sleep, and physiology to develop care and early intervention solutions to support people living with dementia (PLWD) in their own homes.
no code implementations • 22 Aug 2022 • Fan Mo, Zahra Tarkhani, Hamed Haddadi
Privacy and security challenges in Machine Learning (ML) have become increasingly severe, along with ML's pervasive development and the recent demonstration of large attack surfaces.
no code implementations • 9 Aug 2022 • Yuting Zhan, Hamed Haddadi, Afra Mashhadi
As mobile devices and location-based services are increasingly developed in different smart city scenarios and applications, many unexpected privacy leakages have arisen due to geolocated data collection and sharing.
no code implementations • 10 Jul 2022 • Xavier F. Cadet, Sara Ahmadi-Abhari, Hamed Haddadi
Nevertheless, there is limited research investigating the impact of imbalance in the contribution of different features in an error vector.
no code implementations • 26 Mar 2022 • Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang
A contrasting approach, distributed data analytics, where code and models for training and inference are distributed to the places where data is collected, has been boosted by two recent, ongoing developments: increased processing power and memory capacity available in user devices at the edge of the network, such as smartphones and home assistants; and increased sensitivity to the highly intrusive nature of many of these devices and services and the attendant demands for improved privacy.
no code implementations • 16 Feb 2022 • Yuchen Zhao, Sayed Saad Afzal, Waleed Akbar, Osvy Rodriguez, Fan Mo, David Boyle, Fadel Adib, Hamed Haddadi
This paper is motivated by a simple question: Can we design and build battery-free devices capable of machine learning and inference in underwater environments?
no code implementations • 19 Jan 2022 • Yuting Zhan, Alex Kyllo, Afra Mashhadi, Hamed Haddadi
Our proposed architecture reports a Pareto Frontier analysis that enables the user to assess this trade-off as a function of Lagrangian loss weight parameters.
no code implementations • 26 Oct 2021 • Oliver Thompson, Anna Maria Mandalari, Hamed Haddadi
Consumer Internet of Things (IoT) devices are increasingly common in everyday homes, from smart speakers to security cameras.
no code implementations • 10 Sep 2021 • Yuchen Zhao, Payam Barnaghi, Hamed Haddadi
Federated learning is proposed as an alternative to centralized machine learning since its client-server structure provides better privacy protection and scalability in real-world applications.
1 code implementation • 16 Jul 2021 • Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi
Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such, they would greatly benefit from automated management.
no code implementations • 28 May 2021 • Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Soteris Demetriou, Deniz Gündüz, Hamed Haddadi
Our proposed framework enables clients to localize and quantify the private information leakage in a layer-wise manner, and enables a better understanding of the sources of information leakage in collaborative learning, which can be used by future studies to benchmark new attacks and defense mechanisms.
no code implementations • 9 May 2021 • Lorenzo Minto, Moritz Haller, Hamed Haddadi, Benjamin Livshits
Recommender systems are commonly trained on centrally collected user interaction data like views or clicks.
1 code implementation • 29 Apr 2021 • Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis
We propose and implement a Privacy-preserving Federated Learning ($PPFL$) framework for mobile systems to limit privacy leakages in federated learning.
no code implementations • 1 Apr 2021 • Ranya Aloufi, Hamed Haddadi, David Boyle
We show that overlapping speech inputs to ASR systems present further privacy concerns, and how these may be mitigated using speech separation and optimization techniques.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +3
no code implementations • 17 Nov 2020 • Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Yiming Xie, Richard Mortier, Hamed Haddadi
We therefore evaluate our approach using hardware resources and data sources representative of those that would be available at the edge of the network, such as in an IoT deployment.
no code implementations • 4 Nov 2020 • Ranya Aloufi, Hamed Haddadi, David Boyle
One approach to mitigate the risk of paralinguistic-based privacy breaches is to exploit a combination of cloud-based processing with privacy-preserving, on-device paralinguistic information learning and filtering before transmitting voice data.
no code implementations • 2 Nov 2020 • Yuchen Zhao, Hanyang Liu, Honglin Li, Payam Barnaghi, Hamed Haddadi
In this paper, we propose an activity recognition system that uses semi-supervised federated learning, wherein clients conduct unsupervised learning on autoencoders with unlabelled local data to learn general representations, and a cloud server conducts supervised learning on an activity classifier with labelled data.
no code implementations • 17 Oct 2020 • Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, Soteris Demetriou
Training deep neural networks via federated learning allows clients to share, instead of the original data, only the model trained on their data.
no code implementations • 4 Sep 2020 • Giuseppe Siracusano, Salvator Galea, Davide Sanvito, Mohammad Malekzadeh, Hamed Haddadi, Gianni Antichi, Roberto Bifulco
In this paper we show that the data plane of commodity programmable (Network Interface Cards) NICs can run neural network inference tasks required by packet monitoring applications, with low overhead.
2 code implementations • 5 Aug 2020 • Mohammad Malekzadeh, Richard G. Clegg, Andrea Cavallaro, Hamed Haddadi
We introduce a dimension-adaptive pooling (DAP) layer that makes DNNs flexible and more robust to changes in sensor availability and in sampling rate.
no code implementations • 29 Jul 2020 • Ranya Aloufi, Hamed Haddadi, David Boyle
Our experimental evaluation over five datasets shows that the proposed framework can effectively defend against attribute inference attacks by reducing their success rates to approximately that of guessing at random, while maintaining accuracy in excess of 99% for the tasks of interest.
1 code implementation • 12 Apr 2020 • Ali Shahin Shamsabadi, Adria Gascon, Hamed Haddadi, Andrea Cavallaro
To address this problem, we propose PrivEdge, a technique for privacy-preserving MLaaS that safeguards the privacy of users who provide their data for training, as well as users who use the prediction service.
2 code implementations • 12 Apr 2020 • Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi
We present DarkneTZ, a framework that uses an edge device's Trusted Execution Environment (TEE) in conjunction with model partitioning to limit the attack surface against Deep Neural Networks (DNNs).
no code implementations • 16 Mar 2020 • Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David Choffnes
Our initial results demonstrate that some IoT devices contact destinations that are not critical to their operation, and there is no impact on device functionality if these destinations are blocked.
Networking and Internet Architecture Cryptography and Security
2 code implementations • 14 Mar 2020 • Kleomenis Katevas, Eugene Bagdasaryan, Jason Waterman, Mohamad Mounir Safadieh, Eleanor Birrell, Hamed Haddadi, Deborah Estrin
In this paper we present PoliFL, a decentralized, edge-based framework that supports heterogeneous privacy policies for federated learning.
1 code implementation • 14 Nov 2019 • Mohammad Malekzadeh, Richard G. Clegg, Andrea Cavallaro, Hamed Haddadi
Sensitive inferences and user re-identification are major threats to privacy when raw sensor data from wearable or portable devices are shared with cloud-assisted applications.
1 code implementation • 10 Sep 2019 • Mohammad Malekzadeh, Dimitrios Athanasakis, Hamed Haddadi, Benjamin Livshits
Contextual bandit algorithms~(CBAs) often rely on personal data to provide recommendations.
1 code implementation • 9 Aug 2019 • Ranya Aloufi, Hamed Haddadi, David Boyle
The voice signal is a rich resource that discloses several possible states of a speaker, such as emotional state, confidence and stress levels, physical condition, age, gender, and personal traits.
no code implementations • 13 Jul 2019 • Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Andrea Cavallaro, Hamed Haddadi
Pre-trained Deep Neural Network (DNN) models are increasingly used in smartphones and other user devices to enable prediction services, leading to potential disclosures of (sensitive) information from training data captured inside these models.
1 code implementation • 21 Jun 2019 • Edoardo Lisi, Mohammad Malekzadeh, Hamed Haddadi, F. Din-Houn Lau, Seth Flaxman
Realisations from this distribution can be used by the CGAN to generate "future" paintings.
1 code implementation • 26 Oct 2018 • Mohammad Malekzadeh, Richard G. Clegg, Andrea Cavallaro, Hamed Haddadi
Motion sensors such as accelerometers and gyroscopes measure the instant acceleration and rotation of a device, in three dimensions.
no code implementations • 30 Aug 2018 • Kleomenis Katevas, Katrin Hänsel, Richard Clegg, Ilias Leontiadis, Hamed Haddadi, Laurissa Tokarchuk
Remembering our day-to-day social interactions is challenging even if you aren't a blue memory challenged fish.
no code implementations • 12 Mar 2018 • Chaoyun Zhang, Paul Patras, Hamed Haddadi
One potential solution is to resort to advanced machine learning techniques to help managing the rise in data volumes and algorithm-driven applications.
Ranked #1 on Link Prediction on SINS
1 code implementation • 21 Feb 2018 • Mohammad Malekzadeh, Richard G. Clegg, Andrea Cavallaro, Hamed Haddadi
Results show that the proposed framework maintains the usefulness of the transformed data for activity recognition, with an average loss of only around three percentage points, while reducing the possibility of gender classification to around 50\%, the target random guess, from more than 90\% when using raw sensor data.
no code implementations • 10 Feb 2018 • Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro
A major advantage of the proposed filter over existing distributed learning approaches is that users cannot access, even indirectly, the parameters of other users.
1 code implementation • 9 Feb 2018 • Seyed Ali Osia, Ali Taheri, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Hamid R. Rabiee
We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints.
1 code implementation • 18 Oct 2017 • Mohammad Malekzadeh, Richard G. Clegg, Hamed Haddadi
Though access to the sensory data is critical to the success of many beneficial applications such as health monitoring or activity recognition, a wide range of potentially sensitive information about the individuals can also be discovered through access to sensory data and this cannot easily be protected using traditional privacy approaches.
1 code implementation • 4 Oct 2017 • Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi
Our evaluations show that by using certain kind of fine-tuning and embedding techniques and at a small processing costs, we can greatly reduce the level of information available to unintended tasks applied to the data feature on the cloud, and hence achieving the desired tradeoff between privacy and performance.
1 code implementation • 8 Mar 2017 • Seyed Ali Osia, Ali Shahin Shamsabadi, Sina Sajadmanesh, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi
To this end, instead of performing the whole operation on the cloud, we let an IoT device to run the initial layers of the neural network, and then send the output to the cloud to feed the remaining layers and produce the final result.
no code implementations • 1 Mar 2017 • Sandra Servia-Rodriguez, Liang Wang, Jianxin R. Zhao, Richard Mortier, Hamed Haddadi
Many current Internet services rely on inferences from models trained on user data.
no code implementations • 26 Oct 2016 • Sina Sajadmanesh, Sina Jafarzadeh, Seyed Ali Osia, Hamid R. Rabiee, Hamed Haddadi, Yelena Mejova, Mirco Musolesi, Emiliano De Cristofaro, Gianluca Stringhini
In this paper, we present a large-scale study of recipes published on the web and their content, aiming to understand cuisines and culinary habits around the world.
no code implementations • 25 Feb 2016 • Tiago O. Cunha, Ingmar Weber, Hamed Haddadi, Gisele L. Pappa
It is generally accepted as common wisdom that receiving social feedback is helpful to (i) keep an individual engaged with a community and to (ii) facilitate an individual's positive behavior change.
Social and Information Networks
no code implementations • 20 Jan 2015 • Hamed Haddadi, Heidi Howard, Amir Chaudhry, Jon Crowcroft, Anil Madhavapeddy, Richard Mortier
We propose there is a need for a technical platform enabling people to engage with the collection, management and consumption of personal data; and that this platform should itself be personal, under the direct control of the individual whose data it holds.
Computers and Society