no code implementations • 8 Nov 2023 • Yashothara Shanmugarasa, M. A. P. Chamikara, Hye-Young Paik, Salil S. Kanhere, Liming Zhu
In this paper, we propose a novel LDP approach (named LDP-SmartEnergy) that utilizes randomized response techniques with sliding windows to facilitate the sharing of appliance-level energy consumption data over time while not revealing individual users' appliance usage patterns.
1 code implementation • 18 Feb 2022 • Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor
Biometric data, such as face images, are often associated with sensitive information (e. g medical, financial, personal government records).
no code implementations • 25 Nov 2020 • Chandra Thapa, M. A. P. Chamikara, Seyit A. Camtepe
In practical scenarios, all clients do not have sufficient computing resources (e. g., Internet of Things), the machine learning model has millions of parameters, and its privacy between the server and the clients while training/testing is a prime concern (e. g., rival parties).
no code implementations • 21 May 2020 • M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe
Biometric information delivered to untrusted third-party servers in an uncontrolled manner can be considered a significant privacy leak (i. e. uncontrolled information release) as biometrics can be correlated with sensitive data such as healthcare or financial records.
Cryptography and Security Databases
2 code implementations • 25 Apr 2020 • Chandra Thapa, M. A. P. Chamikara, Seyit Camtepe, Lichao Sun
SL provides better model privacy than FL due to the machine learning model architecture split between clients and the server.
no code implementations • 25 Apr 2020 • M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe
Distributed devices such as the Internet of Things (IoT) often produce a large amount of data, eventually resulting in big data that can be vital in uncovering hidden patterns, and other insights in numerous fields such as healthcare, banking, and policing.
Databases
1 code implementation • 8 Aug 2019 • M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman
However, DL algorithms tend to leak privacy when trained on highly sensitive crowd-sourced data such as medical data.
no code implementations • 24 Dec 2014 • G. I. Gunarathna, M. A. P. Chamikara, R. G. Ragel
This unique feature makes it a challenge to extend the prevailing techniques to improve recognition of Sinhala characters.