Skip to main content

Showing 1–35 of 35 results for author: Pouwelse, J

.
  1. arXiv:2404.12237  [pdf, ps, other

    cs.IR cs.AI cs.DC

    De-DSI: Decentralised Differentiable Search Index

    Authors: Petru Neague, Marcel Gregoriadis, Johan Pouwelse

    Abstract: This study introduces De-DSI, a novel framework that fuses large language models (LLMs) with genuine decentralization for information retrieval, particularly employing the differentiable search index (DSI) concept in a decentralized setting. Focused on efficiently connecting novel user queries with document identifiers without direct document access, De-DSI operates solely on query-docid pairs. To… ▽ More

    Submitted 19 April, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

    Comments: Accepted at the 4th Workshop on Machine Learning and Systems (EuroMLSys), EuroSys 2024

    ACM Class: I.2.7; I.2.11; H.3.3; C.2.4

  2. arXiv:2401.05239  [pdf, ps, other

    cs.DC cs.CR

    Failures of public key infrastructure: 53 year survey

    Authors: Adrian-Tudor Dumitrescu, Johan Pouwelse

    Abstract: The Public Key Infrastructure existed in critical infrastructure systems since the expansion of the World Wide Web, but to this day its limitations have not been completely solved. With the rise of government-driven digital identity in Europe, it is more important than ever to understand how PKI can be an efficient frame for eID and to learn from mistakes encountered by other countries in such cri… ▽ More

    Submitted 11 January, 2024; v1 submitted 10 January, 2024; originally announced January 2024.

    Comments: 9 pages, 1 table, 1 figure

  3. arXiv:2311.04658  [pdf, other

    cs.NI

    Mass Adoption of NATs: Survey and experiments on carrier-grade NATs

    Authors: Orestis Kanaris, Johan Pouwelse

    Abstract: In recent times, the prevalence of home NATs and the widespread implementation of Carrier-Grade NATs have posed significant challenges to various applications, particularly those relying on Peer-to-Peer communication. This paper addresses these issues by conducting a thorough review of related literature and exploring potential techniques to mitigate the problems. The literature review focuses on… ▽ More

    Submitted 15 November, 2023; v1 submitted 8 November, 2023; originally announced November 2023.

    Comments: 12 pages, 9 figures

  4. arXiv:2309.16459  [pdf, other

    cs.CL cs.AI cs.LG

    Augmenting LLMs with Knowledge: A survey on hallucination prevention

    Authors: Konstantinos Andriopoulos, Johan Pouwelse

    Abstract: Large pre-trained language models have demonstrated their proficiency in storing factual knowledge within their parameters and achieving remarkable results when fine-tuned for downstream natural language processing tasks. Nonetheless, their capacity to access and manipulate knowledge with precision remains constrained, resulting in performance disparities on knowledge-intensive tasks when compared… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

  5. arXiv:2308.07148  [pdf, other

    cs.DC

    Sustainable Cooperation in Peer-To-Peer Networks

    Authors: Bulat Nasrulin, Rowdy Chotkan, Johan Pouwelse

    Abstract: Traditionally, peer-to-peer systems have relied on altruism and reciprocity. Although incentive-based models have gained prominence in new-generation peer-to-peer systems, it is essential to recognize the continued importance of cooperative principles in achieving performance, fairness, and correctness. The lack of this acknowledgment has paved the way for selfish peers to gain unfair advantages i… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

  6. arXiv:2307.02081  [pdf, other

    cs.CR cs.DC

    LØ: An Accountable Mempool for MEV Resistance

    Authors: Bulat Nasrulin, Georgy Ishmaev, Jérémie Decouchant, Johan Pouwelse

    Abstract: Possible manipulation of user transactions by miners in a permissionless blockchain systems is a growing concern. This problem is a pervasive and systemic issue, known as Miner Extractable Value (MEV), incurs highs costs on users of decentralised applications. Furthermore, transaction manipulations create other issues in blockchain systems such as congestion, higher fees, and system instability. D… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

  7. arXiv:2307.01411  [pdf, other

    cs.DC

    Web3Recommend: Decentralised recommendations with trust and relevance

    Authors: Rohan Madhwal, Johan Pouwelse

    Abstract: Web3Recommend is a decentralized Social Recommender System implementation that enables Web3 Platforms on Android to generate recommendations that balance trust and relevance. Generating recommendations in decentralized networks is a non-trivial problem because these networks lack a global perspective due to the absence of a central authority. Further, decentralized networks are prone to Sybil Atta… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  8. arXiv:2306.15044  [pdf, other

    cs.DC cs.CR cs.LG

    Towards Sybil Resilience in Decentralized Learning

    Authors: Thomas Werthenbach, Johan Pouwelse

    Abstract: Federated learning is a privacy-enforcing machine learning technology but suffers from limited scalability. This limitation mostly originates from the internet connection and memory capacity of the central parameter server, and the complexity of the model aggregation function. Decentralized learning has recently been emerging as a promising alternative to federated learning. This novel technology… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  9. arXiv:2302.13837  [pdf, other

    cs.DC

    Decentralized Learning Made Practical with Client Sampling

    Authors: Martijn de Vos, Akash Dhasade, Anne-Marie Kermarrec, Erick Lavoie, Johan Pouwelse, Rishi Sharma

    Abstract: Decentralized learning (DL) leverages edge devices for collaborative model training while avoiding coordination by a central server. Due to privacy concerns, DL has become an attractive alternative to centralized learning schemes since training data never leaves the device. In a round of DL, all nodes participate in model training and exchange their model with some other nodes. Performing DL in la… ▽ More

    Submitted 7 May, 2024; v1 submitted 27 February, 2023; originally announced February 2023.

  10. arXiv:2301.12530  [pdf, other

    cs.LG

    G-Rank: Unsupervised Continuous Learn-to-Rank for Edge Devices in a P2P Network

    Authors: Andrew Gold, Johan Pouwelse

    Abstract: Ranking algorithms in traditional search engines are powered by enormous training data sets that are meticulously engineered and curated by a centralized entity. Decentralized peer-to-peer (p2p) networks such as torrenting applications and Web3 protocols deliberately eschew centralized databases and computational architectures when designing services and features. As such, robust search-and-rank a… ▽ More

    Submitted 29 January, 2023; originally announced January 2023.

    Comments: 12 pages, 9 figures, Johan Pouwelse is my thesis supervisor

  11. arXiv:2301.06938  [pdf, other

    cs.DC

    The Universal Trust Machine: A survey on the Web3 path towards enabling long term digital cooperation through decentralised trust

    Authors: Rohan Madhwal, Johan Pouwelse

    Abstract: Since the dawn of human civilization, trust has been the core challenge of social organization. Trust functions to reduce the effort spent in constantly monitoring others' actions in order to verify their assertions, thus facilitating cooperation by allowing groups to function with reduced complexity. To date, in modern societies, large scale trust is almost exclusively provided by large centraliz… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  12. arXiv:2301.04508  [pdf, other

    cs.DC

    A Deployment-First Methodology to Mechanism Design and Refinement in Distributed Systems

    Authors: Martijn de Vos, Georgy Ishmaev, Johan Pouwelse, Stefanie Roos

    Abstract: Catalyzed by the popularity of blockchain technology, there has recently been a renewed interest in the design, implementation and evaluation of decentralized systems. Most of these systems are intended to be deployed at scale and in heterogeneous environments with real users and unpredictable workloads. Nevertheless, most research in this field evaluates such systems in controlled environments th… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

    Comments: Accepted for publication at the PerFail'23 workshop

  13. arXiv:2212.06436  [pdf, other

    cs.DC

    Survey on social reputation mechanisms: Someone told me I can trust you

    Authors: Thomas Werthenbach, Johan Pouwelse

    Abstract: Nowadays, most business and social interactions have moved to the internet, highlighting the relevance of creating online trust. One way to obtain a measure of trust is through reputation mechanisms, which record one's past performance and interactions to generate a reputational value. We observe that numerous existing reputation mechanisms share similarities with actual social phenomena; we call… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

    Comments: 10 pages, 3 figures, 1 table

    ACM Class: A.1

  14. arXiv:2210.02987  [pdf, other

    cs.DC cs.CY

    TrustVault: A privacy-first data wallet for the European Blockchain Services Infrastructure

    Authors: Sharif Jacobino, Johan Pouwelse

    Abstract: The European Union is on course to introduce a European Digital Identity that will be available to all EU citizens and businesses. This will have a huge impact on how citizens and businesses interact online. Big Tech companies currently dictate how digital identities are used. As a result, they have amassed vast amounts of private user data. Movements like Self-Sovereign Identity aim to give users… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  15. arXiv:2208.11254  [pdf, other

    cs.DC cs.PF

    Gromit: Benchmarking the Performance and Scalability of Blockchain Systems

    Authors: Bulat Nasrulin, Martijn De Vos, Georgy Ishmaev, Johan Pouwelse

    Abstract: The growing number of implementations of blockchain systems stands in stark contrast with still limited research on a systematic comparison of performance characteristics of these solutions. Such research is crucial for evaluating fundamental trade-offs introduced by novel consensus protocols and their implementations. These performance limitations are commonly analyzed with ad-hoc benchmarking fr… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

  16. arXiv:2208.05339  [pdf, other

    cs.DC cs.CR

    Distributed Attestation Revocation in Self-Sovereign Identity

    Authors: Rowdy Chotkan, Jérémie Decouchant, Johan Pouwelse

    Abstract: Self-Sovereign Identity (SSI) aspires to create a standardised identity layer for the Internet by placing citizens at the centre of their data, thereby weakening the grip of big tech on current digital identities. However, as millions of both physical and digital identities are lost annually, it is also necessary for SSIs to possibly be revoked to prevent misuse. Previous attempts at designing a r… ▽ More

    Submitted 12 August, 2022; v1 submitted 10 August, 2022; originally announced August 2022.

    Comments: 8 pages, accepted at Local Computer Networks 2022, LCN 2022

  17. arXiv:2207.09950  [pdf, other

    cs.DC

    MeritRank: Sybil Tolerant Reputation for Merit-based Tokenomics

    Authors: Bulat Nasrulin, Georgy Ishmaev, Johan Pouwelse

    Abstract: Decentralized reputation schemes present a promising area of experimentation in blockchain applications. These solutions aim to overcome the shortcomings of simple monetary incentive mechanisms of naive tokenomics. However, there is a significant research gap regarding the limitations and benefits of such solutions. We formulate these trade-offs as a conjecture on the irreconcilability of three de… ▽ More

    Submitted 20 July, 2022; originally announced July 2022.

  18. arXiv:2204.06831  [pdf, other

    cs.CR cs.DC

    Double spending prevention of digital Euros using a web-of-trust

    Authors: Atanas Marinov, Jurriaan Den Toonder, Joep de Jong, Pieter Tolsma, Nils van den Honert, Johan Pouwelse

    Abstract: In order to provide more security on double-spending, we have implemented a system allowing for a web-of-trust. In this paper, we explore different approaches taken against double-spending and implement our own version to avoid this within TrustChain as part of the ecosystem of EuroToken, the digital version of the euro. We have used the EVA protocol as a means to transfer data between users, buil… ▽ More

    Submitted 18 April, 2022; v1 submitted 14 April, 2022; originally announced April 2022.

  19. arXiv:2203.00398  [pdf, other

    cs.DC cs.CR cs.CY

    Web3: A Decentralized Societal Infrastructure for Identity, Trust, Money, and Data

    Authors: Joost Bambacht, Johan Pouwelse

    Abstract: A movement for a more transparent and decentralized Internet is globally attracting more attention. People are becoming more privacy-aware of their online identities and data. The Internet is constantly evolving. Web2 focused on companies that provide services in exchange for personal user data. Web3 commits to user-centricity using decentralization and zero-server architectures. The current digit… ▽ More

    Submitted 3 March, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

  20. arXiv:2110.11006  [pdf, other

    cs.DC cs.LG

    Bristle: Decentralized Federated Learning in Byzantine, Non-i.i.d. Environments

    Authors: Joost Verbraeken, Martijn de Vos, Johan Pouwelse

    Abstract: Federated learning (FL) is a privacy-friendly type of machine learning where devices locally train a model on their private data and typically communicate model updates with a server. In decentralized FL (DFL), peers communicate model updates with each other instead. However, DFL is challenging since (1) the training data possessed by different peers is often non-i.i.d. (i.e., distributed differen… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

  21. arXiv:2104.02612  [pdf, other

    cs.CR cs.SE

    ASTANA: Practical String Deobfuscation for Android Applications Using Program Slicing

    Authors: Martijn de Vos, Johan Pouwelse

    Abstract: Software obfuscation is widely used by Android developers to protect the source code of their applications against adversarial reverse-engineering efforts. A specific type of obfuscation, string obfuscation, transforms the content of all string literals in the source code to non-interpretable text and inserts logic to deobfuscate these string literals at runtime. In this work, we demonstrate that… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

  22. A Truly Self-Sovereign Identity System

    Authors: Quinten Stokkink, Georgy Ishmaev, Dick Epema, Johan Pouwelse

    Abstract: Existing digital identity management systems fail to deliver the desirable properties of control by the users of their own identity data, credibility of disclosed identity data, and network-level anonymity. The recently proposed Self-Sovereign Identity (SSI) approach promises to give users these properties. However, we argue that without addressing privacy at the network level, SSI systems cannot… ▽ More

    Submitted 28 September, 2021; v1 submitted 1 July, 2020; originally announced July 2020.

    Comments: Accepted for publication at the 46th IEEE Conference on Local Computer Networks (LCN), October 4-7, 2021

  23. arXiv:2004.05046  [pdf, other

    cs.DC

    XChange: A Blockchain-based Mechanism for Generic Asset Trading In Resource-constrained Environments

    Authors: Martijn de Vos, Can Umut Ileri, Johan Pouwelse

    Abstract: An increasing number of industries rely on Internet-of-Things devices to track physical resources. Blockchain technology provides primitives to represent these resources as digital assets on a secure distributed ledger. Due to the proliferation of blockchain-based assets, there is an increasing need for a generic mechanism to trade assets between isolated platforms. To date, there is no such mecha… ▽ More

    Submitted 10 April, 2020; originally announced April 2020.

  24. arXiv:1903.05900  [pdf, other

    cs.DC

    A Random Walk based Trust Ranking in Distributed Systems

    Authors: Alexander Stannat, Johan Pouwelse

    Abstract: Honest cooperation among individuals in a network can be achieved in different ways. In online networks with some kind of central authority, such as Ebay, Airbnb, etc. honesty is achieved through a reputation system, which is maintained and secured by the central authority. These systems usually rely on review mechanisms, through which agents can evaluate the trustworthiness of their interaction p… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

    Comments: 13 pages, 15 figures

  25. arXiv:1806.01926  [pdf, other

    cs.DC cs.CR cs.CY

    Deployment of a Blockchain-Based Self-Sovereign Identity

    Authors: Quinten Stokkink, Johan Pouwelse

    Abstract: Digital identity is unsolved: after many years of research there is still no trusted communication over the Internet. To provide identity within the context of mutual distrust, this paper presents a blockchain-based digital identity solution. Without depending upon a single trusted third party, the proposed solution achieves passport-level legally valid identity. This solution for making identitie… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

    Comments: 2018 IEEE International Conference on Blockchain

  26. arXiv:1706.03744  [pdf, other

    cs.CR cs.CV

    Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems

    Authors: J. S. Hammudoglu, J. Sparreboom, J. I. Rauhamaa, J. K. Faber, L. C. Guerchi, I. P. Samiotis, S. P. Rao, J. A. Pouwelse

    Abstract: We devised a mobile biometric-based authentication system only relying on local processing. Our Android open source solution explores the capability of current smartphones to acquire, process and match fingerprints using only its built-in hardware. Our architecture is specifically designed to run completely locally and autonomously, not requiring any cloud service, server, or permissioned access t… ▽ More

    Submitted 12 June, 2017; originally announced June 2017.

    Comments: Delft University of Technology student project report

  27. arXiv:1705.11046  [pdf, ps, other

    cs.DC

    Implicit Consensus: Blockchain with Unbounded Throughput

    Authors: Zhijie Ren, Kelong Cong, Johan Pouwelse, Zekeriya Erkin

    Abstract: Recently, the blockchain technique was put in the spotlight as it introduced a systematic approach for multiple parties to reach consensus without needing trust. However, the application of this technique in practice is severely restricted due to its limitations in throughput. In this paper, we propose a novel consensus model, namely the implicit consensus, with a distinctive blockchain-based dist… ▽ More

    Submitted 14 July, 2017; v1 submitted 31 May, 2017; originally announced May 2017.

    ACM Class: C.2.4

  28. arXiv:1512.00071  [pdf, other

    cs.CR cs.CY

    Survey of robust and resilient social media tools on Android

    Authors: P. W. G. Brussee, J. A. Pouwelse

    Abstract: We present an overview of robust and resilient social media tools to overcome natural disasters, censorship and Internet kill switches. These social media tools use Android devices to communicate during disasters and aim to overcome attacks on freedom of expression. There is an abundance of projects that aim to provide resilient communication, enhance privacy, and provide anonymity. We focus speci… ▽ More

    Submitted 30 November, 2015; originally announced December 2015.

    Comments: 11 pages, 9 figures, 1 table

  29. arXiv:1511.00444  [pdf, other

    cs.CY cs.CR

    Autonomous smartphone apps: self-compilation, mutation, and viral spreading

    Authors: Paul Brussee, Johan Pouwelse

    Abstract: We present the first smart phone tool that is capable of self-compilation, mutation and viral spreading. Our autonomous app does not require a host computer to alter its functionality, change its appearance and lacks the normal necessity of a central app store to spread among hosts. We pioneered survival skills for mobile software in order to overcome disrupted Internet access due to natural disas… ▽ More

    Submitted 4 November, 2015; v1 submitted 2 November, 2015; originally announced November 2015.

    Comments: 7 pages, 5 figures; addition section 2

  30. arXiv:1507.05501  [pdf

    cs.DC

    A survey of P2P multidimensional indexing structures

    Authors: Ewout Bongers, Johan Pouwelse

    Abstract: Traditional databases have long since reaped the benefits of multidimensional indexes. Numerous proposals in the literature describe multidimensional index designs for P2P systems. However, none of these designs have had real world implementations. Several proposals for P2P multidimensional indexes are reviewed and analyzed. Znet and VBI-tree are the most promising from a technical standpoint. All… ▽ More

    Submitted 20 July, 2015; originally announced July 2015.

    Comments: Course IN4306 - Literature Survey

  31. arXiv:1507.00245  [pdf, other

    cs.DC cs.CR

    Performance analysis of a Tor-like onion routing implementation

    Authors: Quinten Stokkink, Harmjan Treep, Johan Pouwelse

    Abstract: The current onion routing implementation of Tribler works as expected but throttles the overall throughput of the Tribler system. This article discusses a measuring procedure to reproducibly profile the tunnel implementation so further optimizations of the tunnel community can be made. Our work has been integrated into the Tribler eco-system.

    Submitted 1 July, 2015; originally announced July 2015.

    Comments: 6 pages, 6 figures

    MSC Class: 68M14

  32. arXiv:1505.07370  [pdf, other

    cs.CR

    Anonymous online purchases with exhaustive operational security

    Authors: Vincent Van Mieghem, Johan Pouwelse

    Abstract: This paper describes the process of remaining anonymous online and its concurrent operational security that has to be performed. It focusses particularly on remaining anonymous while purchasing online goods, resulting in anonymously bought items. Different aspects of the operational security process as well as anonymously funding with cryptocurrencies are described. Eventually it is shown how to a… ▽ More

    Submitted 27 May, 2015; originally announced May 2015.

  33. arXiv:1502.01625  [pdf, other

    cs.CR

    A Self-Compiling Android Data Obfuscation Tool

    Authors: Olivier Hokke, Alex Kolpa, Joris van den Oever, Alex Walterbos, Johan Pouwelse

    Abstract: Smartphones are becoming more significant in storing and transferring data. However, techniques ensuring this data is not compromised after a confiscation of the device are not readily available. DroidStealth is an open source Android application which combines data encryption and application obfuscation techniques to provide users with a way to securely hide content on their smartphones. This inc… ▽ More

    Submitted 9 February, 2015; v1 submitted 5 February, 2015; originally announced February 2015.

    Comments: Johan Pouwelse was the Course Supervisor

  34. arXiv:1406.5440  [pdf, other

    cs.CR cs.CY cs.DC

    Operational Distributed Regulation for Bitcoin

    Authors: Dinesh, Erlich, Gilfoyle, Jared, Richard, Johan Pouwelse

    Abstract: On February 2014, $650.000.000 worth of Bitcoins disappeared. Currently it is unclear whether hackers or MtGox, the largest Bitcoin exchange, are to be blamed. In either case, the anonymous and unregulated nature of the Bitcoin system makes it practically impossible for innocent victims to get their money back. We have investigated the technical possibilities, solutions and implications of introdu… ▽ More

    Submitted 20 June, 2014; originally announced June 2014.

    Comments: 9 pages report by students who desire to remain anonymous

  35. arXiv:1404.4818  [pdf, other

    cs.CY cs.CR cs.NI

    The fifteen year struggle of decentralizing privacy-enhancing technology

    Authors: Rolf Jagerman, Wendo Sabée, Laurens Versluis, Martijn de Vos, Johan Pouwelse

    Abstract: Ever since the introduction of the internet, it has been void of any privacy. The majority of internet traffic currently is and always has been unencrypted. A number of anonymous communication overlay networks exist whose aim it is to provide privacy to its users. However, due to the nature of the internet, there is major difficulty in getting these networks to become both decentralized and anonym… ▽ More

    Submitted 18 April, 2014; originally announced April 2014.