Skip to main content

Showing 1–13 of 13 results for author: Chamikara, M A P

.
  1. arXiv:2311.04544  [pdf, other

    cs.CR cs.AI cs.SE

    Local Differential Privacy for Smart Meter Data Sharing

    Authors: Yashothara Shanmugarasa, M. A. P. Chamikara, Hye-young Paik, Salil S. Kanhere, Liming Zhu

    Abstract: Energy disaggregation techniques, which use smart meter data to infer appliance energy usage, can provide consumers and energy companies valuable insights into energy management. However, these techniques also present privacy risks, such as the potential for behavioral profiling. Local differential privacy (LDP) methods provide strong privacy guarantees with high efficiency in addressing privacy c… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: 18 pages, 9 figures

  2. arXiv:2306.03379  [pdf, other

    cs.CR cs.DB

    OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy

    Authors: M. A. P. Chamikara, Seung Ick Jang, Ian Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David

    Abstract: Tabular data sharing serves as a common method for data exchange. However, sharing sensitive information without adequate privacy protection can compromise individual privacy. Thus, ensuring privacy-preserving data sharing is crucial. Differential privacy (DP) is regarded as the gold standard in data privacy. Despite this, current DP methods tend to generate privacy-preserving tabular datasets tha… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  3. arXiv:2202.10320  [pdf, other

    cs.CV cs.CR cs.LG

    Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches

    Authors: Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, Mahathir Almashor

    Abstract: Biometric data, such as face images, are often associated with sensitive information (e.g medical, financial, personal government records). Hence, a data breach in a system storing such information can have devastating consequences. Deep learning is widely utilized for face recognition (FR); however, such models are vulnerable to backdoor attacks executed by malicious parties. Backdoor attacks cau… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: 15 pages

  4. arXiv:2202.06053  [pdf, other

    cs.CR cs.DB

    Local Differential Privacy for Federated Learning

    Authors: M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertok, Ibrahim Khalil

    Abstract: Advanced adversarial attacks such as membership inference and model memorization can make federated learning (FL) vulnerable and potentially leak sensitive private data. Local differentially private (LDP) approaches are gaining more popularity due to stronger privacy notions and native support for data distribution compared to other differentially private (DP) solutions. However, DP approaches ass… ▽ More

    Submitted 3 August, 2022; v1 submitted 12 February, 2022; originally announced February 2022.

    Comments: 17 pages

  5. arXiv:2011.14818  [pdf, other

    cs.LG cs.AI cs.CR

    Advancements of federated learning towards privacy preservation: from federated learning to split learning

    Authors: Chandra Thapa, M. A. P. Chamikara, Seyit A. Camtepe

    Abstract: In the distributed collaborative machine learning (DCML) paradigm, federated learning (FL) recently attracted much attention due to its applications in health, finance, and the latest innovations such as industry 4.0 and smart vehicles. FL provides privacy-by-design. It trains a machine learning model collaboratively over several distributed clients (ranging from two to millions) such as mobile ph… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.

    Comments: Authors' preprint version (before any peer-review) of a book chapter to appear in the Book series "Studies in Computational Intelligence", Book title "Federated Learning Systems: Towards Next-generation AI", Book eds. Muhammad Habib ur Rehman and Mohamed Medhat Gaber, Publisher "Springer Nature Switzerland AG Gewerbestrasse 11, 6330 Cham, Switzerland."

  6. Privacy Preserving Face Recognition Utilizing Differential Privacy

    Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe

    Abstract: Facial recognition technologies are implemented in many areas, including but not limited to, citizen surveillance, crime control, activity monitoring, and facial expression evaluation. However, processing biometric information is a resource-intensive task that often involves third-party servers, which can be accessed by adversaries with malicious intent. Biometric information delivered to untruste… ▽ More

    Submitted 4 July, 2020; v1 submitted 21 May, 2020; originally announced May 2020.

  7. Privacy Preserving Distributed Machine Learning with Federated Learning

    Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe

    Abstract: Edge computing and distributed machine learning have advanced to a level that can revolutionize a particular organization. Distributed devices such as the Internet of Things (IoT) often produce a large amount of data, eventually resulting in big data that can be vital in uncovering hidden patterns, and other insights in numerous fields such as healthcare, banking, and policing. Data related to are… ▽ More

    Submitted 25 February, 2021; v1 submitted 25 April, 2020; originally announced April 2020.

  8. arXiv:2004.12088  [pdf, other

    cs.LG

    SplitFed: When Federated Learning Meets Split Learning

    Authors: Chandra Thapa, M. A. P. Chamikara, Seyit Camtepe, Lichao Sun

    Abstract: Federated learning (FL) and split learning (SL) are two popular distributed machine learning approaches. Both follow a model-to-data scenario; clients train and test machine learning models without sharing raw data. SL provides better model privacy than FL due to the machine learning model architecture split between clients and the server. Moreover, the split model makes SL a better option for res… ▽ More

    Submitted 16 February, 2022; v1 submitted 25 April, 2020; originally announced April 2020.

    Comments: Accepted at AAAI 2022, Authors preprint version, 14 pages

  9. Local Differential Privacy for Deep Learning

    Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman

    Abstract: The internet of things (IoT) is transforming major industries including but not limited to healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually improving with innovations such as the amalgamation of software-defined networks (SDN) and network function virtualization (NFV) in the edge-cloud interplay. Deep learning (DL) is becoming popular due to its remarkabl… ▽ More

    Submitted 9 November, 2019; v1 submitted 8 August, 2019; originally announced August 2019.

  10. An Efficient and Scalable Privacy Preserving Algorithm for Big Data and Data Streams

    Authors: M. A. P. Chamikara, P. Bertok, D. Liu, S. Camtepe, I. Khalil

    Abstract: A vast amount of valuable data is produced and is becoming available for analysis as a result of advancements in smart cyber-physical systems. The data comes from various sources, such as healthcare, smart homes, smart vehicles, and often includes private, potentially sensitive information that needs appropriate sanitization before being released for analysis. The incremental and fast nature of da… ▽ More

    Submitted 31 July, 2019; originally announced July 2019.

    Journal ref: Computers & Security, 101570 (2019)

  11. Efficient privacy preservation of big data for accurate data mining

    Authors: M. A. P. Chamikara, P. Bertok, D. Liu, S. Camtepe, I. Khalil

    Abstract: Computing technologies pervade physical spaces and human lives, and produce a vast amount of data that is available for analysis. However, there is a growing concern that potentially sensitive data may become public if the collected data are not appropriately sanitized before being released for investigation. Although there are more than a few privacy-preserving methods available, they are not eff… ▽ More

    Submitted 19 June, 2019; originally announced June 2019.

    Comments: Information Sciences

  12. Efficient Data Perturbation for Privacy Preserving and Accurate Data Stream Mining

    Authors: M. A. P. Chamikara, P. Bertok, D. Liu, S. Camtepe, I. Khalil

    Abstract: The widespread use of the Internet of Things (IoT) has raised many concerns, including the protection of private information. Existing privacy preservation methods cannot provide a good balance between data utility and privacy, and also have problems with efficiency and scalability. This paper proposes an efficient data stream perturbation method (named as $P^2RoCAl$). $P^2RoCAl$ offers better dat… ▽ More

    Submitted 19 June, 2018; v1 submitted 15 June, 2018; originally announced June 2018.

    Comments: Pervasive and Mobile Computing 2018

  13. arXiv:1412.7680  [pdf

    cs.CV

    A Fuzzy Based Model to Identify Printed Sinhala Characters (ICIAfS14)

    Authors: G. I. Gunarathna, M. A. P. Chamikara, R. G. Ragel

    Abstract: Character recognition techniques for printed documents are widely used for English language. However, the systems that are implemented to recognize Asian languages struggle to increase the accuracy of recognition. Among other Asian languages (such as Arabic, Tamil, Chinese), Sinhala characters are unique, mainly because they are round in shape. This unique feature makes it a challenge to extend th… ▽ More

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: The 7th International Conference on Information and Automation for Sustainability (ICIAfS) 2014