Skip to main content

Showing 1–13 of 13 results for author: Geambasu, R

.
  1. arXiv:2405.16719  [pdf, other

    cs.CR

    Alistair: Efficient On-device Budgeting for Differentially-Private Ad-Measurement Systems

    Authors: Pierre Tholoniat, Kelly Kostopoulou, Peter McNeely, Prabhpreet Singh Sodhi, Anirudh Varanasi, Benjamin Case, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: With the impending removal of third-party cookies from major browsers and the introduction of new privacy-preserving advertising APIs, the research community has a timely opportunity to assist industry in qualitatively improving the Web's privacy. This paper discusses our efforts, within a W3C community group, to enhance existing privacy-preserving advertising measurement APIs. We analyze designs… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

  2. Turbo: Effective Caching in Differentially-Private Databases

    Authors: Kelly Kostopoulou, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: Differentially-private (DP) databases allow for privacy-preserving analytics over sensitive datasets or data streams. In these systems, user privacy is a limited resource that must be conserved with each query. We propose Turbo, a novel, state-of-the-art caching layer for linear query workloads over DP databases. Turbo builds upon private multiplicative weights (PMW), a DP mechanism that is powerf… ▽ More

    Submitted 23 October, 2023; v1 submitted 28 June, 2023; originally announced June 2023.

    Comments: Extended version of a paper presented at the 29th ACM Symposium on Operating Systems Principles (SOSP '23)

  3. arXiv:2304.06929  [pdf

    cs.CR

    Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment

    Authors: Rachel Cummings, Damien Desfontaines, David Evans, Roxana Geambasu, Yangsibo Huang, Matthew Jagielski, Peter Kairouz, Gautam Kamath, Sewoong Oh, Olga Ohrimenko, Nicolas Papernot, Ryan Rogers, Milan Shen, Shuang Song, Weijie Su, Andreas Terzis, Abhradeep Thakurta, Sergei Vassilvitskii, Yu-Xiang Wang, Li Xiong, Sergey Yekhanin, Da Yu, Huanyu Zhang, Wanrong Zhang

    Abstract: In this article, we present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP), with a focus of advancing DP's deployment in real-world applications. Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier," a workshop held in July 20… ▽ More

    Submitted 12 March, 2024; v1 submitted 14 April, 2023; originally announced April 2023.

  4. arXiv:2212.13228  [pdf, other

    cs.CR cs.LG

    Packing Privacy Budget Efficiently

    Authors: Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang

    Abstract: Machine learning (ML) models can leak information about users, and differential privacy (DP) provides a rigorous way to bound that leakage under a given budget. This DP budget can be regarded as a new type of compute resource in workloads of multiple ML models training on user data. Once it is used, the DP budget is forever consumed. Therefore, it is crucial to allocate it most efficiently to trai… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

  5. arXiv:2205.06369  [pdf, other

    cs.LG cs.CR

    How to Combine Membership-Inference Attacks on Multiple Updated Models

    Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu

    Abstract: A large body of research has shown that machine learning models are vulnerable to membership inference (MI) attacks that violate the privacy of the participants in the training data. Most MI research focuses on the case of a single standalone model, while production machine-learning platforms often update models over time, on data that often shifts in distribution, giving the attacker more informa… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Comments: 31 pages, 9 figures

  6. arXiv:2201.12328  [pdf, other

    cs.LG

    Toward Training at ImageNet Scale with Differential Privacy

    Authors: Alexey Kurakin, Shuang Song, Steve Chien, Roxana Geambasu, Andreas Terzis, Abhradeep Thakurta

    Abstract: Differential privacy (DP) is the de facto standard for training machine learning (ML) models, including neural networks, while ensuring the privacy of individual examples in the training set. Despite a rich literature on how to train ML models with differential privacy, it remains extremely challenging to train real-life, large neural networks with both reasonable accuracy and privacy. We set ou… ▽ More

    Submitted 8 February, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: 25 pages, 7 figures. Code available at https://github.com/google-research/dp-imagenet

  7. arXiv:2106.15335  [pdf, other

    cs.CR cs.DC cs.LG

    Privacy Budget Scheduling

    Authors: Tao Luo, Mingen Pan, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: Machine learning (ML) models trained on personal data have been shown to leak information about users. Differential privacy (DP) enables model training with a guaranteed bound on this leakage. Each new model trained with DP increases the bound on data leakage and can be seen as consuming part of a global privacy budget that should not be exceeded. This budget is a scarce resource that must be care… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: Extended version of a paper presented at the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI '21)

  8. arXiv:2005.11498  [pdf, other

    cs.SE cs.LG

    Pythia: Grammar-Based Fuzzing of REST APIs with Coverage-guided Feedback and Learning-based Mutations

    Authors: Vaggelis Atlidakis, Roxana Geambasu, Patrice Godefroid, Marina Polishchuk, Baishakhi Ray

    Abstract: This paper introduces Pythia, the first fuzzer that augments grammar-based fuzzing with coverage-guided feedback and a learning-based mutation strategy for stateful REST API fuzzing. Pythia uses a statistical model to learn common usage patterns of a target REST API from structurally valid seed inputs. It then generates learning-based mutations by injecting a small amount of noise deviating from c… ▽ More

    Submitted 23 May, 2020; originally announced May 2020.

  9. arXiv:1909.01502  [pdf, other

    stat.ML cs.CR cs.LG

    Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform

    Authors: Mathias Lecuyer, Riley Spahn, Kiran Vodrahalli, Roxana Geambasu, Daniel Hsu

    Abstract: Companies increasingly expose machine learning (ML) models trained over sensitive user data to untrusted domains, such as end-user devices and wide-access model stores. We present Sage, a differentially private (DP) ML platform that bounds the cumulative leakage of training data through models. Sage builds upon the rich literature on DP ML algorithms and contributes pragmatic solutions to two of t… ▽ More

    Submitted 6 September, 2019; v1 submitted 3 September, 2019; originally announced September 2019.

    Comments: Extended version of a paper presented at the 27th ACM Symposium on Operating Systems Principles (SOSP '19)

  10. arXiv:1802.03471  [pdf, other

    stat.ML cs.AI cs.CR cs.LG

    Certified Robustness to Adversarial Examples with Differential Privacy

    Authors: Mathias Lecuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana

    Abstract: Adversarial examples that fool machine learning models, particularly deep neural networks, have been a topic of intense research interest, with attacks and defenses being developed in a tight back-and-forth. Most past defenses are best effort and have been shown to be vulnerable to sophisticated attacks. Recently a set of certified defenses have been introduced, which provide guarantees of robustn… ▽ More

    Submitted 29 May, 2019; v1 submitted 9 February, 2018; originally announced February 2018.

  11. arXiv:1705.07512  [pdf, other

    cs.CR

    Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization

    Authors: Mathias Lecuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen

    Abstract: Protecting vast quantities of data poses a daunting challenge for the growing number of organizations that collect, stockpile, and monetize it. The ability to distinguish data that is actually needed from data collected "just in case" would help these organizations to limit the latter's exposure to attack. A natural approach might be to monitor data use and retain only the working-set of in-use da… ▽ More

    Submitted 21 May, 2017; originally announced May 2017.

  12. arXiv:1510.02377  [pdf, other

    cs.CY

    FairTest: Discovering Unwarranted Associations in Data-Driven Applications

    Authors: Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin

    Abstract: In a world where traditional notions of privacy are increasingly challenged by the myriad companies that collect and analyze our data, it is important that decision-making entities are held accountable for unfair treatments arising from irresponsible data usage. Unfortunately, a lack of appropriate methodologies and tools means that even identifying unfair or discriminatory effects can be a challe… ▽ More

    Submitted 16 August, 2016; v1 submitted 8 October, 2015; originally announced October 2015.

    Comments: 27 pages, 12 figures

  13. arXiv:1407.2323  [pdf, other

    cs.NI cs.CY

    XRay: Enhancing the Web's Transparency with Differential Correlation

    Authors: Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, Roxana Geambasu

    Abstract: Today's Web services - such as Google, Amazon, and Facebook - leverage user data for varied purposes, including personalizing recommendations, targeting advertisements, and adjusting prices. At present, users have little insight into how their data is being used. Hence, they cannot make informed choices about the services they choose. To increase transparency, we developed XRay, the first fine-gra… ▽ More

    Submitted 7 October, 2014; v1 submitted 8 July, 2014; originally announced July 2014.

    Comments: Extended version of a paper presented at the 23rd USENIX Security Symposium (USENIX Security 14)