Skip to main content

Showing 1–7 of 7 results for author: Freudiger, J

.
  1. arXiv:2102.08503  [pdf, other

    cs.LG

    Federated Evaluation and Tuning for On-Device Personalization: System Design & Applications

    Authors: Matthias Paulik, Matt Seigel, Henry Mason, Dominic Telaar, Joris Kluivers, Rogier van Dalen, Chi Wai Lau, Luke Carlson, Filip Granqvist, Chris Vandevelde, Sudeep Agarwal, Julien Freudiger, Andrew Byde, Abhishek Bhowmick, Gaurav Kapoor, Si Beaumont, Áine Cahill, Dominic Hughes, Omid Javidbakht, Fei Dong, Rehan Rishi, Stanley Hung

    Abstract: We describe the design of our federated task processing system. Originally, the system was created to support two specific federated tasks: evaluation and tuning of on-device ML systems, primarily for the purpose of personalizing these systems. In recent years, support for an additional federated task has been added: federated learning (FL) of deep neural networks. To our knowledge, only one other… ▽ More

    Submitted 16 February, 2021; originally announced February 2021.

    Comments: 11 pages, 1 figure

  2. arXiv:1812.00984  [pdf, other

    stat.ML cs.LG

    Protection Against Reconstruction and Its Applications in Private Federated Learning

    Authors: Abhishek Bhowmick, John Duchi, Julien Freudiger, Gaurav Kapoor, Ryan Rogers

    Abstract: In large-scale statistical learning, data collection and model fitting are moving increasingly toward peripheral devices---phones, watches, fitness trackers---away from centralized data collection. Concomitant with this rise in decentralized data are increasing challenges of maintaining privacy while allowing enough information to fit accurate, useful statistical models. This motivates local notio… ▽ More

    Submitted 3 June, 2019; v1 submitted 3 December, 2018; originally announced December 2018.

  3. arXiv:1502.05337  [pdf, other

    cs.CR cs.NI

    Controlled Data Sharing for Collaborative Predictive Blacklisting

    Authors: Julien Freudiger, Emiliano De Cristofaro, Alex Brito

    Abstract: Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges. In this paper, we investigate whether collaborative threat mitigation can be realized via a controlled data sharing approach, whereby organizations make informed decisions as to w… ▽ More

    Submitted 16 April, 2015; v1 submitted 18 February, 2015; originally announced February 2015.

    Comments: A preliminary version of this paper appears in DIMVA 2015. This is the full version. arXiv admin note: substantial text overlap with arXiv:1403.2123

  4. arXiv:1405.1328  [pdf, other

    cs.CR

    What's the Gist? Privacy-Preserving Aggregation of User Profiles

    Authors: Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun

    Abstract: Over the past few years, online service providers have started gathering increasing amounts of personal information to build user profiles and monetize them with advertisers and data brokers. Users have little control of what information is processed and are often left with an all-or-nothing decision between receiving free services or refusing to be profiled. This paper explores an alternative app… ▽ More

    Submitted 25 June, 2014; v1 submitted 6 May, 2014; originally announced May 2014.

    Comments: To appear in the Proceedings of ESORICS 2014

  5. arXiv:1403.2123   

    cs.CR cs.NI

    Privacy-Friendly Collaboration for Cyber Threat Mitigation

    Authors: Julien Freudiger, Emiliano De Cristofaro, Alex Brito

    Abstract: Sharing of security data across organizational boundaries has often been advocated as a promising way to enhance cyber threat mitigation. However, collaborative security faces a number of important challenges, including privacy, trust, and liability concerns with the potential disclosure of sensitive data. In this paper, we focus on data sharing for predictive blacklisting, i.e., forecasting attac… ▽ More

    Submitted 1 March, 2017; v1 submitted 9 March, 2014; originally announced March 2014.

    Comments: This paper has been withdrawn as it has been superseded by arXiv:1502.05337

  6. arXiv:1309.5344  [pdf, other

    cs.CR cs.HC

    A Comparative Usability Study of Two-Factor Authentication

    Authors: Emiliano De Cristofaro, Honglu Du, Julien Freudiger, Greg Norcie

    Abstract: Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process. In this paper, we present an exploratory… ▽ More

    Submitted 31 January, 2014; v1 submitted 20 September, 2013; originally announced September 2013.

    Comments: A preliminary version of this paper appears in USEC 2014

  7. Secure Vehicular Communication Systems: Design and Architecture

    Authors: P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, J. -P. Hubaux

    Abstract: Significant developments have taken place over the past few years in the area of vehicular communication (VC) systems. Now, it is well understood in the community that security and protection of private user information are a prerequisite for the deployment of the technology. This is so, precisely because the benefits of VC systems, with the mission to enhance transportation safety and efficienc… ▽ More

    Submitted 30 December, 2009; originally announced December 2009.

    Journal ref: IEEE Communcations Magazine, vol. 46, no. 11, pp. 100--109, November 2008