Skip to main content

Showing 1–19 of 19 results for author: Melis, L

.
  1. arXiv:2406.16565  [pdf, other

    cs.CR cs.LG

    Noisy Neighbors: Efficient membership inference attacks against LLMs

    Authors: Filippo Galli, Luca Melis, Tommaso Cucinotta

    Abstract: The potential of transformer-based LLMs risks being hindered by privacy concerns due to their reliance on extensive datasets, possibly including sensitive information. Regulatory measures like GDPR and CCPA call for using robust auditing tools to address potential privacy issues, with Membership Inference Attacks (MIA) being the primary method for assessing LLMs' privacy risks. Differently from tr… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  2. arXiv:2309.13793  [pdf, other

    cs.LG

    ReMasker: Imputing Tabular Data with Masked Autoencoding

    Authors: Tianyu Du, Luca Melis, Ting Wang

    Abstract: We present ReMasker, a new method of imputing missing values in tabular data by extending the masked autoencoding framework. Compared with prior work, ReMasker is both simple -- besides the missing values (i.e., naturally masked), we randomly ``re-mask'' another set of values, optimize the autoencoder by reconstructing this re-masked set, and apply the trained model to predict the missing values;… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

  3. Self-consistent equilibrium models of prominence thin threads heated by Alfvén waves propagating from the photosphere

    Authors: Llorenç Melis, Roberto Soler, Jaume Terradas

    Abstract: The fine structure of solar prominences is made by thin threads that outline the magnetic field lines. Observations show that transverse waves of Alfvénic nature are ubiquitous in prominence threads. These waves are driven at the photosphere and propagate to prominences suspended in the corona. Heating due to Alfvén wave dissipation could be a relevant mechanism in the cool and partially ionized p… ▽ More

    Submitted 23 June, 2023; originally announced June 2023.

    Comments: 12 pages, 11 figures

    Journal ref: A&A 676, A25 (2023)

  4. arXiv:2306.05275  [pdf, ps, other

    cs.LG cs.CR cs.IT stat.ML

    Federated Linear Contextual Bandits with User-level Differential Privacy

    Authors: Ruiquan Huang, Huanyu Zhang, Luca Melis, Milan Shen, Meisam Hajzinia, **g Yang

    Abstract: This paper studies federated linear contextual bandits under the notion of user-level differential privacy (DP). We first introduce a unified federated bandits framework that can accommodate various definitions of DP in the sequential decision-making setting. We then formally introduce user-level central DP (CDP) and local DP (LDP) in the federated bandits framework, and investigate the fundamenta… ▽ More

    Submitted 9 June, 2023; v1 submitted 8 June, 2023; originally announced June 2023.

    Comments: Accepted by ICML 2023

  5. arXiv:2305.12997  [pdf, other

    cs.LG cs.AI cs.CR

    Evaluating Privacy Leakage in Split Learning

    Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock

    Abstract: Privacy-Preserving machine learning (PPML) can help us train and deploy models that utilize private information. In particular, on-device machine learning allows us to avoid sharing raw data with a third-party server during inference. On-device models are typically less accurate when compared to their server counterparts due to the fact that (1) they typically only rely on a small set of on-device… ▽ More

    Submitted 19 January, 2024; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: 10 pages

  6. arXiv:2304.12667  [pdf, other

    cs.AI

    Disagreement amongst counterfactual explanations: How transparency can be deceptive

    Authors: Dieter Brughmans, Lissa Melis, David Martens

    Abstract: Counterfactual explanations are increasingly used as an Explainable Artificial Intelligence (XAI) technique to provide stakeholders of complex machine learning algorithms with explanations for data-driven decisions. The popularity of counterfactual explanations resulted in a boom in the algorithms generating them. However, not every algorithm creates uniform explanations for the same instance. Eve… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

  7. arXiv:2206.03852  [pdf, other

    cs.IR cs.LG

    FEL: High Capacity Learning for Recommendation and Ranking via Federated Ensemble Learning

    Authors: Meisam Hejazinia, Dzmitry Huba, Ilias Leontiadis, Kiwan Maeng, Mani Malek, Luca Melis, Ilya Mironov, Milad Nasr, Kaikai Wang, Carole-Jean Wu

    Abstract: Federated learning (FL) has emerged as an effective approach to address consumer privacy needs. FL has been successfully applied to certain machine learning tasks, such as training smart keyboard models and keyword spotting. Despite FL's initial success, many important deep learning use cases, such as ranking and recommendation tasks, have been limited from on-device learning. One of the key chall… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

  8. arXiv:2206.02633  [pdf, other

    cs.IR cs.LG

    Towards Fair Federated Recommendation Learning: Characterizing the Inter-Dependence of System and Data Heterogeneity

    Authors: Kiwan Maeng, Haiyu Lu, Luca Melis, John Nguyen, Mike Rabbat, Carole-Jean Wu

    Abstract: Federated learning (FL) is an effective mechanism for data privacy in recommender systems by running machine learning model training on-device. While prior FL optimizations tackled the data and system heterogeneity challenges faced by FL, they assume the two are independent of each other. This fundamental assumption is not reflective of real-world, large-scale recommender systems -- data and syste… ▽ More

    Submitted 30 May, 2022; originally announced June 2022.

  9. Alfven wave heating in partially ionized thin threads of solar prominences

    Authors: Llorenc Melis, Roberto Soler, Jose Luis Ballester

    Abstract: There is observational evidence of the presence of small-amplitude transverse magnetohydrodynamic (MHD) waves with a wide range of frequencies in the threads of solar prominences. It is believed that the waves are driven at the photosphere and propagate along the magnetic field lines up to prominences suspended in the corona. The dissipation of MHD wave energy in the partially ionized prominence p… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Journal ref: A&A 650, A45 (2021)

  10. arXiv:2103.06641  [pdf, other

    cs.LG cs.CR

    Differentially Private Query Release Through Adaptive Projection

    Authors: Sergul Aydore, William Brown, Michael Kearns, Krishnaram Kenthapadi, Luca Melis, Aaron Roth, Ankit Siva

    Abstract: We propose, implement, and evaluate a new algorithm for releasing answers to very large numbers of statistical queries like $k$-way marginals, subject to differential privacy. Our algorithm makes adaptive use of a continuous relaxation of the Projection Mechanism, which answers queries on the private dataset using simple perturbation, and then attempts to find the synthetic dataset that most close… ▽ More

    Submitted 23 June, 2021; v1 submitted 11 March, 2021; originally announced March 2021.

  11. arXiv:2102.12002  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Adversarial Robustness with Non-uniform Perturbations

    Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore

    Abstract: Robustness of machine learning models is critical for security related applications, where real-world adversaries are uniquely focused on evading neural network based detectors. Prior work mainly focus on crafting adversarial examples (AEs) with small uniform norm-bounded perturbations across features to maintain the requirement of imperceptibility. However, uniform perturbations do not result in… ▽ More

    Submitted 29 October, 2021; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: Accepted to NeurIPS 2021

  12. arXiv:1810.02649  [pdf, other

    cs.CR

    On Collaborative Predictive Blacklisting

    Authors: Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro

    Abstract: Collaborative predictive blacklisting (CPB) allows to forecast future attack sources based on logs and alerts contributed by multiple organizations. Unfortunately, however, research on CPB has only focused on increasing the number of predicted attacks but has not considered the impact on false positives and false negatives. Moreover, sharing alerts is often hindered by confidentiality, trust, and… ▽ More

    Submitted 5 October, 2018; originally announced October 2018.

    Comments: A preliminary version of this paper appears in ACM SIGCOMM's Computer Communication Review (Volume 48 Issue 5, October 2018). This is the full version

  13. arXiv:1805.04049  [pdf, other

    cs.CR cs.AI

    Exploiting Unintended Feature Leakage in Collaborative Learning

    Authors: Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov

    Abstract: Collaborative machine learning and related techniques such as federated learning allow multiple participants, each with his own training dataset, to build a joint model by training locally and periodically exchanging model updates. We demonstrate that these updates leak unintended information about participants' training data and develop passive and active inference attacks to exploit this leakage… ▽ More

    Submitted 1 November, 2018; v1 submitted 10 May, 2018; originally announced May 2018.

    Comments: Proceedings of 40th IEEE Symposium on Security & Privacy (S&P 2019)

  14. arXiv:1709.04514  [pdf, other

    cs.LG cs.CR

    Differentially Private Mixture of Generative Neural Networks

    Authors: Gergely Acs, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro

    Abstract: Generative models are used in a wide range of applications building on large amounts of contextually rich information. Due to possible privacy violations of the individuals whose data is used to train these models, however, publishing or sharing generative models is not always viable. In this paper, we present a novel technique for privately releasing generative models and entire high-dimensional… ▽ More

    Submitted 13 July, 2018; v1 submitted 13 September, 2017; originally announced September 2017.

    Comments: A shorter version of this paper appeared at the 17th IEEE International Conference on Data Mining (ICDM 2017). This is the full version, published in IEEE Transactions on Knowledge and Data Engineering (TKDE)

  15. arXiv:1705.07663  [pdf, other

    cs.CR cs.LG

    LOGAN: Membership Inference Attacks Against Generative Models

    Authors: Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro

    Abstract: Generative models estimate the underlying distribution of a dataset to generate realistic samples according to that distribution. In this paper, we present the first membership inference attacks against generative models: given a data point, the adversary determines whether or not it was used to train the model. Our attacks leverage Generative Adversarial Networks (GANs), which combine a discrimin… ▽ More

    Submitted 21 August, 2018; v1 submitted 22 May, 2017; originally announced May 2017.

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2019, Issue 1

  16. arXiv:1605.03772  [pdf, other

    cs.CR cs.NI

    SplitBox: Toward Efficient Private Network Function Virtualization

    Authors: Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kaafar, Laurent Mathy

    Abstract: This paper presents SplitBox, a scalable system for privately processing network functions that are outsourced as software processes to the cloud. Specifically, providers processing the network functions do not learn the network policies instructing how the functions are to be processed. We first propose an abstract model of a generic network function based on match-action pairs, assuming that thi… ▽ More

    Submitted 12 May, 2016; originally announced May 2016.

    Comments: An earlier version of this paper appears in the Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization (HotMiddleBox 2016). This is the full version

  17. Private Processing of Outsourced Network Functions: Feasibility and Constructions

    Authors: Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar

    Abstract: Aiming to reduce the cost and complexity of maintaining networking infrastructures, organizations are increasingly outsourcing their network functions (e.g., firewalls, traffic shapers and intrusion detection systems) to the cloud, and a number of industrial players have started to offer network function virtualization (NFV)-based solutions. Alas, outsourcing network functions in its current setti… ▽ More

    Submitted 24 January, 2016; originally announced January 2016.

    Comments: A preliminary version of this paper appears in the 1st ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. This is the full version

  18. arXiv:1512.04114   

    cs.CR cs.AI

    Building and Measuring Privacy-Preserving Predictive Blacklists

    Authors: Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro

    Abstract: (Withdrawn) Collaborative security initiatives are increasingly often advocated to improve timeliness and effectiveness of threat mitigation. Among these, collaborative predictive blacklisting (CPB) aims to forecast attack sources based on alerts contributed by multiple organizations that might be targeted in similar ways. Alas, CPB proposals thus far have only focused on improving hit counts, but… ▽ More

    Submitted 7 October, 2018; v1 submitted 13 December, 2015; originally announced December 2015.

    Comments: Obsolete paper. For more up-to-date work on collaborative predictive blacklisting, see arXiv:1810.02649

  19. arXiv:1508.06110  [pdf, other

    cs.CR

    Efficient Private Statistics with Succinct Sketches

    Authors: Luca Melis, George Danezis, Emiliano De Cristofaro

    Abstract: Large-scale collection of contextual information is often essential in order to gather statistics, train machine learning models, and extract knowledge from data. The ability to do so in a {\em privacy-preserving} way -- i.e., without collecting fine-grained user data -- enables a number of additional computational scenarios that would be hard, or outright impossible, to realize without strong pri… ▽ More

    Submitted 6 January, 2016; v1 submitted 25 August, 2015; originally announced August 2015.

    Comments: To appear in NDSS 2016