Skip to main content

Showing 1–11 of 11 results for author: Goldberg, I

.
  1. arXiv:2102.05196  [pdf, other

    cs.CR

    Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation

    Authors: Rob Jansen, Justin Tracey, Ian Goldberg

    Abstract: Tor is a popular low-latency anonymous communication system that focuses on usability and performance: a faster network will attract more users, which in turn will improve the anonymity of everyone using the system. The standard practice for previous research attempting to enhance Tor performance is to draw conclusions from the observed results of a single simulation for standard Tor and for each… ▽ More

    Submitted 24 March, 2021; v1 submitted 9 February, 2021; originally announced February 2021.

  2. arXiv:2010.12112  [pdf, other

    cs.CR cs.LG

    Investigating Membership Inference Attacks under Data Dependencies

    Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum

    Abstract: Training machine learning models on privacy-sensitive data has become a popular practice, driving innovation in ever-expanding fields. This has opened the door to new attacks that can have serious privacy implications. One such attack, the Membership Inference Attack (MIA), exposes whether or not a particular data point was used to train a model. A growing body of literature uses Differentially Pr… ▽ More

    Submitted 14 June, 2023; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: IEEE 36th Computer Security Foundations Symposium (CSF)

  3. arXiv:1908.09165  [pdf, other

    cs.CR cs.HC

    Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information

    Authors: Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg

    Abstract: Smartphones store a significant amount of personal and private information, and are playing an increasingly important role in people's lives. It is important for authentication techniques to be more resistant against two known attacks called shoulder surfing and smudge attacks. In this work, we propose a new technique called 3D Pattern. Our 3D Pattern technique takes advantage of a new input parad… ▽ More

    Submitted 24 August, 2019; originally announced August 2019.

  4. arXiv:1710.00960  [pdf

    q-bio.TO

    A Circulating Biomarker-based Framework for Diagnosis of Hepatocellular Carcinoma in a Clinically Relevant Model of Non-alcoholic Steatohepatitis; An OAD to NASH

    Authors: ** Zhou, Anne Hwang, Christopher Shi, Edward Zhu, Farha Naaz, Zainab Rasheed, Michelle Liu, Lindsey S. Jung, **gsong Li, Kai Jiang, Latha Paka, Michael A. Yamin, Itzhak D. Goldberg, Prakash Narayan

    Abstract: Although cirrhosis is a key risk factor for the development of hepatocellular carcinoma (HCC), mounting evidence indicates that in a subset of patients presenting with non-alcoholic steatohepatitis (NASH), HCC manifests in the absence of cirrhosis. Given the sheer size of the non-alcoholic fatty liver disease (NAFLD) epidemic, and the dismal prognosis associated with late-stage primary liver cance… ▽ More

    Submitted 19 November, 2017; v1 submitted 2 October, 2017; originally announced October 2017.

  5. arXiv:1709.05748  [pdf, other

    cs.CR cs.DC

    Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions

    Authors: Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg

    Abstract: Path-based transaction (PBT) networks, which settle payments from one user to another via a path of intermediaries, are a growing area of research. They overcome the scalability and privacy issues in cryptocurrencies like Bitcoin and Ethereum by replacing expensive and slow on-chain blockchain operations with inexpensive and fast off-chain transfers. In the form of credit networks such as Ripple a… ▽ More

    Submitted 13 December, 2017; v1 submitted 17 September, 2017; originally announced September 2017.

    Comments: 15 pages, 3 figures

  6. arXiv:1702.06612  [pdf, ps, other

    math.CO cs.CR

    Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

    Authors: Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson

    Abstract: A $(t, s, v)$-all-or-nothing transform is a bijective map** defined on $s$-tuples over an alphabet of size $v$, which satisfies the condition that the values of any $t$ input co-ordinates are completely undetermined, given only the values of any $s-t$ output co-ordinates. The main question we address in this paper is: for which choices of parameters does a $(t, s, v)$-all-or-nothing transform (A… ▽ More

    Submitted 21 February, 2017; originally announced February 2017.

    Comments: 13 pages

  7. arXiv:1611.02317  [pdf

    q-bio.TO

    Renal Parenchymal Area and Kidney Collagen Content

    Authors: Jake A. Nieto, Janice Zhu, Bin Duan, **gsong Li, ** Zhou, Latha Paka, Michael A. Yamin, Itzhak D. Goldberg, Prakash Narayan

    Abstract: The extent of renal scarring in chronic kidney disease (CKD) can only be ascertained by highly invasive, painful and sometimes risky tissue biopsy. Interestingly, CKD-related abnormalities in kidney size can often be visualized using ultrasound. Nevertheless, not only does the ellipsoid formula used today underestimate true renal size but also the relation governing renal size and collagen content… ▽ More

    Submitted 10 November, 2016; v1 submitted 7 November, 2016; originally announced November 2016.

    Comments: 17 pages, 6 figures, 3 equations

  8. An Empirical Biomarker-based Calculator for Autosomal Recessive Polycystic Kidney Disease - The Nieto-Narayan Formula

    Authors: Jake A. Nieto, Michael A. Yamin, Itzhak D. Goldberg, Prakash Narayan

    Abstract: Autosomal polycystic kidney disease (ARPKD) is associated with progressive enlargement of the kidneys fuelled by the formation and expansion of fluid-filled cysts. The disease is congenital and children that do not succumb to it during the neonatal period will, by age 10 years, more often than not, require nephrectomy+renal replacement therapy for management of both pain and renal insufficiency. S… ▽ More

    Submitted 26 July, 2016; v1 submitted 25 July, 2016; originally announced July 2016.

    Comments: 3 tables and 8 figures

  9. arXiv:1604.00223  [pdf, other

    cs.IR cs.CR

    Lower-Cost epsilon-Private Information Retrieval

    Authors: Raphael R. Toledo, George Danezis, Ian Goldberg

    Abstract: Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduous to scale. We explore lower-cost relaxations of information-theoretic PIR, based on dummy queries, sparse vectors, and compositions with an anonymity system. We prove the security of each scheme using a flexible differentially private definition for private queries that can capture notions of impe… ▽ More

    Submitted 1 April, 2016; originally announced April 2016.

  10. Censorship Resistance: Let a Thousand Flowers Bloom?

    Authors: Tariq Elahi, Steven J. Murdoch, Ian Goldberg

    Abstract: This paper argues that one of the most important decisions in designing and deploying censorship resistance systems is whether one set of system options should be selected (the best), or whether there should be several sets of good ones. We model the problem of choosing these options as a cat-and-mouse game and show that the best strategy depends on the value the censor associates with total syste… ▽ More

    Submitted 4 December, 2014; originally announced December 2014.

  11. arXiv:1107.1072  [pdf, other

    cs.CR cs.DC

    Adding Query Privacy to Robust DHTs

    Authors: Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft

    Abstract: Interest in anonymous communication over distributed hash tables (DHTs) has increased in recent years. However, almost all known solutions solely aim at achieving sender or requestor anonymity in DHT queries. In many application scenarios, it is crucial that the queried key remains secret from intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy… ▽ More

    Submitted 3 April, 2012; v1 submitted 6 July, 2011; originally announced July 2011.

    Comments: To appear at ACM ASIACCS 2012