Search Results for author: Jon Crowcroft

Found 11 papers, 3 papers with code

Federated Principal Component Analysis

1 code implementation NeurIPS 2020 Andreas Grammenos, Rodrigo Mendoza-Smith, Jon Crowcroft, Cecilia Mascolo

We present a federated, asynchronous, and $(\varepsilon, \delta)$-differentially private algorithm for PCA in the memory-limited setting.

Federated Split GANs

1 code implementation4 Jul 2022 Pranvera Kortoçi, Yilei Liang, Pengyuan Zhou, Lik-Hang Lee, Abbas Mehrabi, Pan Hui, Sasu Tarkoma, Jon Crowcroft

Mobile devices and the immense amount and variety of data they generate are key enablers of machine learning (ML)-based applications.

Attribute Privacy Preserving

Differentially Private Health Tokens for Estimating COVID-19 Risk

1 code implementation25 Jun 2020 David Butler, Chris Hicks, James Bell, Carsten Maple, Jon Crowcroft

Our experimental results show that for groups of size 500 or more, the error associated with our method can be as low as 0. 03 on average and thus the aggregated results can be useful in a number of identity-free contexts.

Cryptography and Security Computers and Society

Recommending Investors for Crowdfunding Projects

no code implementations26 Sep 2014 Jisun An, Daniele Quercia, Jon Crowcroft

Nowadays, they have an additional option: that of crowdfunding.

Edge Intelligence: Architectures, Challenges, and Applications

no code implementations26 Mar 2020 Dianlei Xu, Tong Li, Yong Li, Xiang Su, Sasu Tarkoma, Tao Jiang, Jon Crowcroft, Pan Hui

Edge intelligence refers to a set of connected systems and devices for data collection, caching, processing, and analysis in locations close to where data is captured based on artificial intelligence.

Personal Data: Thinking Inside the Box

no code implementations20 Jan 2015 Hamed Haddadi, Heidi Howard, Amir Chaudhry, Jon Crowcroft, Anil Madhavapeddy, Richard Mortier

We propose there is a need for a technical platform enabling people to engage with the collection, management and consumption of personal data; and that this platform should itself be personal, under the direct control of the individual whose data it holds.

Computers and Society

Beyond COVID-19: Network science and sustainable exit strategies

no code implementations27 Sep 2020 James Bell, Ginestra Bianconi, David Butler, Jon Crowcroft, Paul C. W Davies, Chris Hicks, Hyunju Kim, Istvan Z. Kiss, Francesco Di Lauro, Carsten Maple, Ayan Paul, Mikhail Prokopenko, Philip Tee, Sara I. Walker

On May $28^{th}$ and $29^{th}$, a two day workshop was held virtually, facilitated by the Beyond Center at ASU and Moogsoft Inc.

Physics and Society

Probabilistic Sampling-Enhanced Temporal-Spatial GCN: A Scalable Framework for Transaction Anomaly Detection in Ethereum Networks

no code implementations29 Sep 2023 Stefan Kambiz Behfar, Jon Crowcroft

The rapid evolution of the Ethereum network necessitates sophisticated techniques to ensure its robustness against potential threats and to maintain transparency.

Anomaly Detection Temporal Sequences

Analysis of Information Propagation in Ethereum Network Using Combined Graph Attention Network and Reinforcement Learning to Optimize Network Efficiency and Scalability

no code implementations2 Nov 2023 Stefan Kambiz Behfar, Jon Crowcroft

We construct a transaction graph representation using adjacency matrices to capture the node embeddings; while our major contribution is to develop a combined Graph Attention Network (GAT) and Reinforcement Learning (RL) model to optimize the network efficiency and scalability.

Graph Attention Reinforcement Learning (RL)

Architecture of Smart Certificates for Web3 Applications Against Cyberthreats in Financial Industry

no code implementations3 Nov 2023 Stefan Kambiz Behfar, Jon Crowcroft

This study addresses the security challenges associated with the current internet transformations, specifically focusing on emerging technologies such as blockchain and decentralized storage.

Management

Cannot find the paper you are looking for? You can Submit a new open access paper.