Skip to main content

Showing 1–33 of 33 results for author: Ayday, E

.
  1. arXiv:2406.05545  [pdf, other

    cs.LG cs.CR

    Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering

    Authors: Maryam Ghasemian, Erman Ayday

    Abstract: This study investigates the optimal selection of parameters for collaborative clustering while ensuring data privacy. We focus on key clustering algorithms within a collaborative framework, where multiple data owners combine their data. A semi-trusted server assists in recommending the most suitable clustering algorithm and its parameters. Our findings indicate that the privacy parameter ($ε$) min… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  2. arXiv:2404.02138  [pdf, other

    cs.CR cs.CL cs.LG

    Topic-based Watermarks for LLM-Generated Text

    Authors: Alexander Nemecek, Yuzhou Jiang, Erman Ayday

    Abstract: Recent advancements of large language models (LLMs) have resulted in indistinguishable text outputs comparable to human-generated text. Watermarking algorithms are potential tools that offer a way to differentiate between LLM- and human-generated text by embedding detectable signatures within LLM-generated output. However, current watermarking schemes lack robustness against known attacks against… ▽ More

    Submitted 16 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: 11 pages

  3. arXiv:2310.05696  [pdf, other

    cs.LG

    Little is Enough: Improving Privacy by Sharing Labels in Federated Semi-Supervised Learning

    Authors: Amr Abourayya, Jens Kleesiek, Kanishka Rao, Erman Ayday, Bharat Rao, Geoff Webb, Michael Kamp

    Abstract: In many critical applications, sensitive data is inherently distributed and cannot be centralized due to privacy concerns. A wide range of federated learning approaches have been proposed in the literature to train models locally at each client without sharing their sensitive local data. Most of these approaches either share local model parameters, soft predictions on a public dataset, or a combin… ▽ More

    Submitted 23 May, 2024; v1 submitted 9 October, 2023; originally announced October 2023.

  4. arXiv:2302.02162  [pdf, other

    cs.LG cs.CR

    AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against White-Box Models

    Authors: Abdullah Caglar Oksuz, Anisa Halimi, Erman Ayday

    Abstract: Explainable Artificial Intelligence (XAI) encompasses a range of techniques and procedures aimed at elucidating the decision-making processes of AI models. While XAI is valuable in understanding the reasoning behind AI models, the data used for such revelations poses potential security and privacy vulnerabilities. Existing literature has identified privacy risks targeting machine learning models,… ▽ More

    Submitted 6 May, 2023; v1 submitted 4 February, 2023; originally announced February 2023.

  5. arXiv:2212.12785  [pdf, other

    cs.CR

    zkFaith: Soonami's Zero-Knowledge Identity Protocol

    Authors: Mina Namazi, Duncan Ross, Xiaojie Zhu, Erman Ayday

    Abstract: Individuals are encouraged to prove their eligibility to access specific services regularly. However, providing various organizations with personal data spreads sensitive information and endangers people's privacy. Hence, privacy-preserving identification systems that enable individuals to prove they are permitted to use specific services are required to fill the gap. Cryptographic techniques are… ▽ More

    Submitted 24 December, 2022; originally announced December 2022.

  6. arXiv:2210.01297  [pdf, other

    cs.CR

    Privacy-Preserving Link Prediction

    Authors: Didem Demirag, Mina Namazi, Erman Ayday, Jeremy Clark

    Abstract: Consider two data holders, ABC and XYZ, with graph data (e.g., social networks, e-commerce, telecommunication, and bio-informatics). ABC can see that node A is linked to node B, and XYZ can see node B is linked to node C. Node B is the common neighbour of A and C but neither network can discover this fact on their own. In this paper, we provide a two party computation that ABC and XYZ can run to d… ▽ More

    Submitted 3 October, 2022; originally announced October 2022.

  7. arXiv:2209.06327  [pdf, other

    cs.CR

    Reproducibility-Oriented and Privacy-Preserving Genomic Dataset Sharing

    Authors: Yuzhou Jiang, Tianxi Ji, Pan Li, Erman Ayday

    Abstract: As genomic research has become increasingly widespread in recent years, few studies share datasets due to the sensitivity in privacy of genomic records. This hinders the reproduction and validation of research outcomes, which are crucial for catching errors (e.g., miscalculations) during the research process.To the best of our knowledge, we are the first to propose a method of sharing genomic data… ▽ More

    Submitted 18 December, 2023; v1 submitted 13 September, 2022; originally announced September 2022.

  8. arXiv:2204.04792  [pdf, other

    cs.CR

    Robust Fingerprint of Location Trajectories Under Differential Privacy

    Authors: Yuzhou Jiang, Emre Yilmaz, Erman Ayday

    Abstract: Directly releasing those data raises privacy and liability (e.g., due to unauthorized distribution of such datasets) concerns since location data contain users' sensitive information, e.g., regular moving patterns and favorite spots. To address this, we propose a novel fingerprinting scheme that simultaneously identifies unauthorized redistribution of location datasets and provides differential pr… ▽ More

    Submitted 21 April, 2023; v1 submitted 10 April, 2022; originally announced April 2022.

  9. arXiv:2204.01801  [pdf, other

    cs.CR

    Robust Fingerprinting of Genomic Databases

    Authors: Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li

    Abstract: Database fingerprinting has been widely used to discourage unauthorized redistribution of data by providing means to identify the source of data leakages. However, there is no fingerprinting scheme aiming at achieving liability guarantees when sharing genomic databases. Thus, we are motivated to fill in this gap by devising a vanilla fingerprinting scheme specifically for genomic databases. Moreov… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: To appear in the 30th International Conference on Intelligent Systems for Molecular Biology (ISMB'22)

  10. arXiv:2203.12445  [pdf, ps, other

    cs.DC cs.SI

    ShareTrace: Contact Tracing with the Actor Model

    Authors: Ryan Tatton, Erman Ayday, Young** Yoo, Anisa Halimi

    Abstract: Proximity-based contact tracing relies on mobile-device interaction to estimate the spread of disease. ShareTrace is one such approach that improves the efficacy of tracking disease spread by considering direct and indirect forms of contact. In this work, we utilize the actor model to provide an efficient and scalable formulation of ShareTrace with asynchronous, concurrent message passing on a tem… ▽ More

    Submitted 18 September, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

    Comments: To be published in IEEE HealthCom 2022 Conference Proceedings; added mathematical detail about message reachability; improved explanations of algorithms and figures, updated conclusion, fixed typos, results unchanged; 6 pages with 3 figures

    ACM Class: F.1.2; G.2.2; J.3; G.3

  11. arXiv:2203.05664  [pdf, other

    cs.CR

    Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy

    Authors: Leonard Dervishi, Xinyue Wang, Wentao Li, Anisa Halimi, Jaideep Vaidya, Xiaoqian Jiang, Erman Ayday

    Abstract: With the reduction of sequencing costs and the pervasiveness of computing devices, genomic data collection is continually growing. However, data collection is highly fragmented and the data is still siloed across different repositories. Analyzing all of this data would be transformative for genomics research. However, the data is sensitive, and therefore cannot be easily centralized. Furthermore,… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

    Comments: 10 pages, 3 figures

  12. arXiv:2112.15109  [pdf, other

    q-bio.GN cs.CR

    GenShare: Sharing Accurate Differentially-Private Statistics for Genomic Datasets with Dependent Tuples

    Authors: Nour Almadhoun Alserr, Ozgur Ulusoy, Erman Ayday, Onur Mutlu

    Abstract: Motivation: Cutting the cost of DNA sequencing technology led to a quantum leap in the availability of genomic data. While sharing genomic data across researchers is an essential driver of advances in health and biomedical research, the sharing process is often infeasible due to data privacy concerns. Differential privacy is one of the rigorous mechanisms utilized to facilitate the sharing of aggr… ▽ More

    Submitted 30 December, 2021; originally announced December 2021.

    Comments: 8 pages, 7 figures

  13. arXiv:2109.02768  [pdf, other

    cs.CR cs.DB

    Privacy-Preserving Database Fingerprinting

    Authors: Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li

    Abstract: When sharing sensitive relational databases with other parties, a database owner aims to (i) have privacy guarantees for the database entries, (ii) have liability guarantees (via fingerprinting) in case of unauthorized sharing of its database by the recipients, and (iii) provide a high quality (utility) database to the recipients. We observe that sharing a relational database with privacy and liab… ▽ More

    Submitted 6 March, 2022; v1 submitted 6 September, 2021; originally announced September 2021.

  14. arXiv:2108.06505  [pdf, other

    cs.CR q-bio.GN

    Privacy-Preserving Identification of Target Patients from Outsourced Patient Data

    Authors: Xiaojie Zhu, Erman Ayday, Roman Vitenberg

    Abstract: With the increasing affordability and availability of patient data, hospitals tend to outsource their data to cloud service providers (CSPs) for the purpose of storage and analytics. However, the concern of data privacy significantly limits the data owners' choice. In this work, we propose the first solution, to the best of our knowledge, that allows a CSP to perform efficient identification of ta… ▽ More

    Submitted 28 August, 2021; v1 submitted 14 August, 2021; originally announced August 2021.

  15. arXiv:2106.05211  [pdf, other

    cs.CR cs.HC

    Near-Optimal Privacy-Utility Tradeoff in Genomic Studies Using Selective SNP Hiding

    Authors: Nour Almadhoun Alserr, Gulce Kale, Onur Mutlu, Oznur Tastan, Erman Ayday

    Abstract: Motivation: Researchers need a rich trove of genomic datasets that they can leverage to gain a better understanding of the genetic basis of the human genome and identify associations between phenotypes and specific parts of DNA. However, sharing genomic datasets that include sensitive genetic or medical information of individuals can lead to serious privacy-related consequences if data lands in th… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    Comments: 9 pages, 9 figures

  16. The Curse of Correlations for Robust Fingerprinting of Relational Databases

    Authors: Tianxi Ji, Emre Yilmaz, Erman Ayday, Pan Li

    Abstract: Database fingerprinting have been widely adopted to prevent unauthorized sharing of data and identify the source of data leakages. Although existing schemes are robust against common attacks, like random bit flip** and subset attack, their robustness degrades significantly if attackers utilize the inherent correlations among database entries. In this paper, we first demonstrate the vulnerability… ▽ More

    Submitted 21 July, 2021; v1 submitted 10 March, 2021; originally announced March 2021.

    Comments: To appear in 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID'21)

  17. arXiv:2102.07357  [pdf, other

    cs.CR

    Genomic Data Sharing under Dependent Local Differential Privacy

    Authors: Emre Yilmaz, Tianxi Ji, Erman Ayday, Pan Li

    Abstract: Privacy-preserving genomic data sharing is prominent to increase the pace of genomic research, and hence to pave the way towards personalized genomic medicine. In this paper, we introduce ($ε, T$)-dependent local differential privacy (LDP) for privacy-preserving sharing of correlated data and propose a genomic data sharing mechanism under this privacy definition. We first show that the original de… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  18. arXiv:2101.08879  [pdf, other

    cs.CR

    Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies

    Authors: Anisa Halimi, Leonard Dervishi, Erman Ayday, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux, Xiaoqian Jiang, Jaideep Vaidya

    Abstract: Providing provenance in scientific workflows is essential for reproducibility and auditability purposes. Workflow systems model and record provenance describing the steps performed to obtain the final results of a computation. In this work, we propose a framework that verifies the correctness of the statistical test results that are conducted by a researcher while protecting individuals' privacy i… ▽ More

    Submitted 7 November, 2022; v1 submitted 21 January, 2021; originally announced January 2021.

    Comments: Appeared in the Proceedings on Privacy Enhancing Technologies Symposium (PETS) 2022

  19. arXiv:2009.03698  [pdf, other

    cs.CR cs.SI

    Efficient Quantification of Profile Matching Risk in Social Networks

    Authors: Anisa Halimi, Erman Ayday

    Abstract: Anonymous data sharing has been becoming more challenging in today's interconnected digital world, especially for individuals that have both anonymous and identified online activities. The most prominent example of such data sharing platforms today are online social networks (OSNs). Many individuals have multiple profiles in different OSNs, including anonymous and identified ones (depending on the… ▽ More

    Submitted 7 September, 2020; originally announced September 2020.

    Comments: arXiv admin note: text overlap with arXiv:2008.09608

    Journal ref: Proceedings of the 25th European Symposium on Research in Computer Security (ESORICS 2020)

  20. arXiv:2008.09608  [pdf, other

    cs.SI cs.CR

    Profile Matching Across Online Social Networks

    Authors: Anisa Halimi, Erman Ayday

    Abstract: In this work, we study the privacy risk due to profile matching across online social networks (OSNs), in which anonymous profiles of OSN users are matched to their real identities using auxiliary information about them. We consider different attributes that are publicly shared by users. Such attributes include both strong identifiers such as user name and weak identifiers such as interest or senti… ▽ More

    Submitted 19 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1711.01815

    Journal ref: Proceedings of the 22nd International Conference on Information and Communications Security (ICICS 2020)

  21. arXiv:2003.13073  [pdf, other

    cs.CR

    Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a Virus

    Authors: Didem Demirag, Erman Ayday

    Abstract: Today, tracking and controlling the spread of a virus is a crucial need for almost all countries. Doing this early would save millions of lives and help countries keep a stable economy. The easiest way to control the spread of a virus is to immediately inform the individuals who recently had close contact with the diagnosed patients. However, to achieve this, a centralized authority (e.g., a healt… ▽ More

    Submitted 23 October, 2020; v1 submitted 29 March, 2020; originally announced March 2020.

  22. arXiv:2001.09555  [pdf, other

    cs.CR

    Collusion-Resilient Probabilistic Fingerprinting Scheme for Correlated Data

    Authors: Emre Yilmaz, Erman Ayday

    Abstract: In order to receive personalized services, individuals share their personal data with a wide range of service providers, ho** that their data will remain confidential. Thus, in case of an unauthorized distribution of their personal data by these service providers (or in case of a data breach) data owners want to identify the source of such data leakage. Digital fingerprinting schemes have been d… ▽ More

    Submitted 26 January, 2020; originally announced January 2020.

  23. arXiv:2001.08852  [pdf, other

    cs.CR

    Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons

    Authors: Kerem Ayoz, Erman Ayday, A. Ercument Cicek

    Abstract: Sharing genome data in a privacy-preserving way stands as a major bottleneck in front of the scientific progress promised by the big data era in genomics. A community-driven protocol named genomic data-sharing beacon protocol has been widely adopted for sharing genomic data. The system aims to provide a secure, easy to implement, and standardized interface for data sharing by only allowing yes/no… ▽ More

    Submitted 21 August, 2020; v1 submitted 23 January, 2020; originally announced January 2020.

  24. arXiv:1912.02045  [pdf, other

    cs.CR

    Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud

    Authors: Xiaojie Zhu, Erman Ayday, Roman Vitenberg, Narasimha Raghavan Veeraragavan

    Abstract: In this paper, we attempt to provide a privacy-preserving and efficient solution for the "similar patient search" problem among several parties (e.g., hospitals) by addressing the shortcomings of previous attempts. We consider a scenario in which each hospital has its own genomic dataset and the goal of a physician (or researcher) is to search for a patient similar to a given one (based on a genom… ▽ More

    Submitted 3 February, 2020; v1 submitted 4 December, 2019; originally announced December 2019.

  25. Key Protected Classification for Collaborative Learning

    Authors: Mert Bülent Sarıyıldız, Ramazan Gökberk Cinbiş, Erman Ayday

    Abstract: Large-scale datasets play a fundamental role in training deep learning models. However, dataset collection is difficult in domains that involve sensitive information. Collaborative learning techniques provide a privacy-preserving solution, by enabling training over a number of private datasets that are not shared by their owners. However, recently, it has been shown that the existing collaborative… ▽ More

    Submitted 22 April, 2020; v1 submitted 27 August, 2019; originally announced August 2019.

    Comments: Accepted to Pattern Recognition

  26. arXiv:1907.00935  [pdf, other

    cs.CR

    One-Time Programs made Practical

    Authors: Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark

    Abstract: A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adh… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  27. Privacy-Preserving Aggregate Queries for Optimal Location Selection

    Authors: Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy

    Abstract: Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. However, location data owners cannot share their data with other businesses, mainly due to privacy and… ▽ More

    Submitted 6 January, 2018; originally announced January 2018.

    Comments: IEEE Transactions on Dependable and Secure Computing, 2017

    Journal ref: IEEE Transactions on Dependable and Secure Computing, 16(2), 329-343, 2019

  28. arXiv:1711.01815  [pdf, other

    cs.CR cs.SI

    Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures

    Authors: Anisa Halimi, Erman Ayday

    Abstract: In this work, we propose a profile matching (or deanonymization) attack for unstructured online social networks (OSNs) in which similarity in graphical structure cannot be used for profile matching. We consider different attributes that are publicly shared by users. Such attributes include both obvious identifiers such as the user name and non-obvious identifiers such as interest similarity or sen… ▽ More

    Submitted 6 November, 2017; originally announced November 2017.

    Comments: 17 pages, 15 figures

  29. arXiv:1708.01023  [pdf, other

    cs.CR

    Collusion-Secure Watermarking for Sequential Data

    Authors: Arif Yilmaz, Erman Ayday

    Abstract: In this work, we address the liability issues that may arise due to unauthorized sharing of personal data. We consider a scenario in which an individual shares his sequential data (such as genomic data or location patterns) with several service providers (SPs). In such a scenario, if his data is shared with other third parties without his consent, the individual wants to determine the service prov… ▽ More

    Submitted 18 August, 2017; v1 submitted 3 August, 2017; originally announced August 2017.

  30. arXiv:1605.05847  [pdf, ps, other

    cs.CR cs.CY

    Privacy-Related Consequences of Turkish Citizen Database Leak

    Authors: Erin Avllazagaj, Erman Ayday, A. Ercument Cicek

    Abstract: Personal data is collected and stored more than ever by the governments and companies in the digital age. Even though the data is only released after anonymization, deanonymization is possible by joining different datasets. This puts the privacy of individuals in jeopardy. Furthermore, data leaks can unveil personal identifiers of individuals when security is breached. Processing the leaked datase… ▽ More

    Submitted 19 May, 2016; originally announced May 2016.

    Comments: 12 pages, 5 figures

  31. arXiv:1405.1891  [pdf, other

    cs.CR

    Privacy in the Genomic Era

    Authors: Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang

    Abstract: Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has… ▽ More

    Submitted 17 June, 2015; v1 submitted 8 May, 2014; originally announced May 2014.

    ACM Class: K.6.5

  32. arXiv:1306.1264  [pdf, other

    cs.CR

    The Chills and Thrills of Whole Genome Sequencing

    Authors: Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik

    Abstract: In recent years, Whole Genome Sequencing (WGS) evolved from a futuristic-sounding research project to an increasingly affordable technology for determining complete genome sequences of complex organisms, including humans. This prompts a wide range of revolutionary applications, as WGS promises to improve modern healthcare and provide a better understanding of the human genome -- in particular, its… ▽ More

    Submitted 16 February, 2015; v1 submitted 5 June, 2013; originally announced June 2013.

    Comments: A slightly different version of this article appears in IEEE Computer Magazine, Vol. 48, No. 2, February 2015, under the title "Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare"

  33. arXiv:1209.5335  [pdf, ps, other

    cs.LG

    BPRS: Belief Propagation Based Iterative Recommender System

    Authors: Erman Ayday, Arash Einolghozati, Faramarz Fekri

    Abstract: In this paper we introduce the first application of the Belief Propagation (BP) algorithm in the design of recommender systems. We formulate the recommendation problem as an inference problem and aim to compute the marginal probability distributions of the variables which represent the ratings to be predicted. However, computing these marginal probability functions is computationally prohibitive f… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.