Skip to main content

Showing 1–11 of 11 results for author: Harkous, H

.
  1. arXiv:2407.07669  [pdf, other

    cs.NI

    Joint UPF and Edge Applications Placement and Routing in 5G & Beyond

    Authors: Endri Goshi, Hasanin Harkous, Shohreh Ahvar, Rastin Pries, Fidan Mehmeti, Wolfgang Kellerer

    Abstract: The development of 5G networks has enabled support for a vast number of applications with stringent traffic requirements, both in terms of communication and computation. Furthermore, the proximity of the entities, such as edge servers and User Plane Functions (UPFs) that provide these resources is of paramount importance. However, with the ever-increasing demand from these applications, operators… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  2. arXiv:2403.02292  [pdf, other

    cs.LG cs.HC

    A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends

    Authors: Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin

    Abstract: We present an analysis of 12 million instances of privacy-relevant reviews publicly visible on the Google Play Store that span a 10 year period. By leveraging state of the art NLP techniques, we examine what users have been writing about privacy along multiple dimensions: time, countries, app types, diverse privacy topics, and even across a spectrum of emotions. We find consistent growth of privac… ▽ More

    Submitted 15 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: This is the extended version of the paper accepted to USENIX Security 2024

  3. arXiv:2204.04221  [pdf, other

    cs.CR

    CookieEnforcer: Automated Cookie Notice Analysis and Enforcement

    Authors: Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz

    Abstract: Online websites use cookie notices to elicit consent from the users, as required by recent privacy regulations like the GDPR and the CCPA. Prior work has shown that these notices use dark patterns to manipulate users into making website-friendly choices which put users' privacy at risk. In this work, we develop CookieEnforcer, a new system for automatically discovering cookie notices and deciding… ▽ More

    Submitted 14 April, 2022; v1 submitted 8 April, 2022; originally announced April 2022.

  4. arXiv:2004.06577  [pdf, other

    cs.CL

    Have Your Text and Use It Too! End-to-End Neural Data-to-Text Generation with Semantic Fidelity

    Authors: Hamza Harkous, Isabel Groves, Amir Saffari

    Abstract: End-to-end neural data-to-text (D2T) generation has recently emerged as an alternative to pipeline-based architectures. However, it has faced challenges in generalizing to new domains and generating semantically consistent text. In this work, we present DataTuner, a neural, end-to-end data-to-text generation system that makes minimal assumptions about the data representation and the target domain.… ▽ More

    Submitted 10 November, 2020; v1 submitted 8 April, 2020; originally announced April 2020.

    Comments: 28th International Conference on Computational Linguistics (COLING 2020), Online, December 8-13, 2020

  5. arXiv:1809.08396  [pdf, other

    cs.CR cs.CL cs.CY

    The Privacy Policy Landscape After the GDPR

    Authors: Thomas Linden, Rishabh Khandelwal, Hamza Harkous, Kassem Fawaz

    Abstract: The EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations of all time. A year after it went into effect, we study its impact on the landscape of privacy policies online. We conduct the first longitudinal, in-depth, and at-scale assessment of privacy policies before and after the GDPR. We gauge the complete consumption cycle of these policie… ▽ More

    Submitted 24 June, 2019; v1 submitted 22 September, 2018; originally announced September 2018.

  6. arXiv:1802.02561  [pdf, other

    cs.CL cs.CR cs.HC

    Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning

    Authors: Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, Karl Aberer

    Abstract: Privacy policies are the primary channel through which companies inform users about their data collection and sharing practices. These policies are often long and difficult to comprehend. Short notices based on information extracted from privacy policies have been shown to be useful but face a significant scalability hurdle, given the number of policies and their evolution over time. Companies, us… ▽ More

    Submitted 29 June, 2018; v1 submitted 7 February, 2018; originally announced February 2018.

    Comments: Published at USENIX Security 2018; associated website: https://pribot.org

  7. arXiv:1704.07626  [pdf, other

    cs.AI cs.CL cs.IR

    Taxonomy Induction using Hypernym Subsequences

    Authors: Amit Gupta, Rémi Lebret, Hamza Harkous, Karl Aberer

    Abstract: We propose a novel, semi-supervised approach towards domain taxonomy induction from an input vocabulary of seed terms. Unlike all previous approaches, which typically extract direct hypernym edges for terms, our approach utilizes a novel probabilistic framework to extract hypernym subsequences. Taxonomy induction from extracted subsequences is cast as an instance of the minimumcost flow problem on… ▽ More

    Submitted 14 September, 2017; v1 submitted 25 April, 2017; originally announced April 2017.

  8. arXiv:1704.07624  [pdf, other

    cs.CL cs.AI cs.IR

    280 Birds with One Stone: Inducing Multilingual Taxonomies from Wikipedia using Character-level Classification

    Authors: Amit Gupta, Rémi Lebret, Hamza Harkous, Karl Aberer

    Abstract: We propose a simple, yet effective, approach towards inducing multilingual taxonomies from Wikipedia. Given an English taxonomy, our approach leverages the interlanguage links of Wikipedia followed by character-level classifiers to induce high-precision, high-coverage taxonomies in other languages. Through experiments, we demonstrate that our approach significantly outperforms the state-of-the-art… ▽ More

    Submitted 12 September, 2017; v1 submitted 25 April, 2017; originally announced April 2017.

  9. "If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps

    Authors: Hamza Harkous, Karl Aberer

    Abstract: Cloud storage services, like Dropbox and Google Drive, have growing ecosystems of 3rd party apps that are designed to work with users' cloud files. Such apps often request full access to users' files, including files shared with collaborators. Hence, whenever a user grants access to a new vendor, she is inflicting a privacy loss on herself and on her collaborators too. Based on analyzing a real da… ▽ More

    Submitted 24 March, 2017; v1 submitted 27 February, 2017; originally announced February 2017.

    Comments: Authors' extended version of the paper published at CODASPY 2017

  10. The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps

    Authors: Hamza Harkous, Rameez Rahman, Bojan Karlas, Karl Aberer

    Abstract: Third party apps that work on top of personal cloud services such as Google Drive and Dropbox, require access to the user's data in order to provide some functionality. Through detailed analysis of a hundred popular Google Drive apps from Google's Chrome store, we discover that the existing permission model is quite often misused: around two thirds of analyzed apps are over-privileged, i.e., they… ▽ More

    Submitted 18 August, 2016; originally announced August 2016.

    Journal ref: Proceedings on Privacy Enhancing Technologies. Volume 2016, Issue 4, Pages 123-143, ISSN (Online) 2299-0984

  11. arXiv:1107.5419  [pdf, other

    cs.DC cs.CC cs.CR

    Scalable and Secure Aggregation in Distributed Networks

    Authors: Sebastien Gambs, Rachid Guerraoui, Hamza Harkous, Florian Huc, Anne-Marie Kermarrec

    Abstract: We consider the problem of computing an aggregation function in a \emph{secure} and \emph{scalable} way. Whereas previous distributed solutions with similar security guarantees have a communication cost of $O(n^3)$, we present a distributed protocol that requires only a communication complexity of $O(n\log^3 n)$, which we prove is near-optimal. Our protocol ensures perfect security against a compu… ▽ More

    Submitted 23 November, 2011; v1 submitted 27 July, 2011; originally announced July 2011.