Skip to main content

Showing 1–14 of 14 results for author: Acs, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.03908  [pdf, other

    cs.CR cs.LG

    Client-specific Property Inference against Secure Aggregation in Federated Learning

    Authors: Raouf Kerkouche, Gergely Ács, Mario Fritz

    Abstract: Federated learning has become a widely used paradigm for collaboratively training a common model among different participants with the help of a central server that coordinates the training. Although only the model parameters or other model updates are exchanged during the federated training instead of the participant's data, many attacks have shown that it is still possible to infer sensitive inf… ▽ More

    Submitted 27 October, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: Workshop on Privacy in the Electronic Society (WPES'23), held in conjunction with CCS'23

  2. arXiv:2210.08871  [pdf, other

    cs.LG stat.ML

    Industry-Scale Orchestrated Federated Learning for Drug Discovery

    Authors: Martijn Oldenhof, Gergely Ács, Balázs Pejó, Ansgar Schuffenhauer, Nicholas Holway, Noé Sturm, Arne Dieckmann, Oliver Fortmeier, Eric Boniface, Clément Mayer, Arnaud Gohier, Peter Schmidtke, Ritsuya Niwayama, Dieter Kopecky, Lewis Mervin, Prakash Chandra Rathi, Lukas Friedrich, András Formanek, Peter Antal, Jordon Rahaman, Adam Zalewski, Wouter Heyndrickx, Ezron Oluoch, Manuel Stößel, Michal Vančo , et al. (22 additional authors not shown)

    Abstract: To apply federated learning to drug discovery we developed a novel platform in the context of European Innovative Medicines Initiative (IMI) project MELLODDY (grant n°831472), which was comprised of 10 pharmaceutical companies, academic research labs, large industrial companies and startups. The MELLODDY platform was the first industry-scale platform to enable the creation of a global federated mo… ▽ More

    Submitted 12 December, 2022; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: 9 pages, 4 figures, to appear in AAAI-23 ([IAAI-23 track] Deployed Highly Innovative Applications of AI)

  3. arXiv:2205.06506  [pdf, other

    cs.CR cs.LG

    Collaborative Drug Discovery: Inference-level Data Protection Perspective

    Authors: Balazs Pejo, Mina Remeli, Adam Arany, Mathieu Galtier, Gergely Acs

    Abstract: Pharmaceutical industry can better leverage its data assets to virtualize drug discovery through a collaborative machine learning platform. On the other hand, there are non-negligible risks stemming from the unintended leakage of participants' training data, hence, it is essential for such a platform to be secure and privacy-preserving. This paper describes a privacy risk assessment for collaborat… ▽ More

    Submitted 9 June, 2022; v1 submitted 13 May, 2022; originally announced May 2022.

  4. arXiv:2103.00342  [pdf, other

    cs.CR cs.AI cs.LG

    Constrained Differentially Private Federated Learning for Low-bandwidth Devices

    Authors: Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès

    Abstract: Federated learning becomes a prominent approach when different entities want to learn collaboratively a common model without sharing their training data. However, Federated learning has two main drawbacks. First, it is quite bandwidth inefficient as it involves a lot of message exchanges between the aggregating server and the participating entities. This bandwidth and corresponding processing cost… ▽ More

    Submitted 27 February, 2021; originally announced March 2021.

    Comments: arXiv admin note: text overlap with arXiv:2011.05578

  5. arXiv:2011.05578  [pdf, ps, other

    cs.LG cs.CR

    Compression Boosts Differentially Private Federated Learning

    Authors: Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès

    Abstract: Federated Learning allows distributed entities to train a common model collaboratively without sharing their own data. Although it prevents data collection and aggregation by exchanging only parameter updates, it remains vulnerable to various inference and reconstruction attacks where a malicious entity can learn private information about the participants' training data from the captured gradients… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: text overlap with arXiv:2010.07808

  6. arXiv:2010.07808  [pdf, other

    cs.CR cs.DC cs.LG

    Federated Learning in Adversarial Settings

    Authors: Raouf Kerkouche, Gergely Ács, Claude Castelluccia

    Abstract: Federated Learning enables entities to collaboratively learn a shared prediction model while kee** their training data locally. It prevents data collection and aggregation and, therefore, mitigates the associated privacy risks. However, it still remains vulnerable to various security attacks where malicious participants aim at degrading the generated model, inserting backdoors, or inferring othe… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

  7. arXiv:2008.01665  [pdf, other

    cs.CR

    In Search of Lost Utility: Private Location Data

    Authors: Szilvia Lestyán, Gergely Ács, Gergely Biczók

    Abstract: The unavailability of training data is a permanent source of much frustration in research, especially when it is due to privacy concerns. This is particularly true for location data since previous techniques all suffer from the inherent sparseness and high dimensionality of location trajectories which render most techniques impractical, resulting in unrealistic traces and unscalable methods. Moreo… ▽ More

    Submitted 14 March, 2022; v1 submitted 4 August, 2020; originally announced August 2020.

    Comments: Accepted at PETS '22

  8. arXiv:1911.09508  [pdf, other

    cs.CR cs.LG eess.SP stat.ML

    Automatic Driver Identification from In-Vehicle Network Logs

    Authors: Mina Remeli, Szilvia Lestyan, Gergely Acs, Gergely Biczok

    Abstract: Data generated by cars is growing at an unprecedented scale. As cars gradually become part of the Internet of Things (IoT) ecosystem, several stakeholders discover the value of in-vehicle network logs containing the measurements of the multitude of sensors deployed within the car. This wealth of data is also expected to be exploitable by third parties for the purpose of profiling drivers in order… ▽ More

    Submitted 25 October, 2019; originally announced November 2019.

  9. arXiv:1902.08956  [pdf, other

    cs.CR eess.SP

    Extracting vehicle sensor signals from CAN logs for driver re-identification

    Authors: Szilvia Lestyan, Gergely Acs, Gergely Biczok, Zsolt Szalay

    Abstract: Data is the new oil for the car industry. Cars generate data about how they are used and who's behind the wheel which gives rise to a novel way of profiling individuals. Several prior works have successfully demonstrated the feasibility of driver re-identification using the in-vehicle network data captured on the vehicle's CAN (Controller Area Network) bus. However, all of them used signals (e.g.,… ▽ More

    Submitted 25 October, 2019; v1 submitted 24 February, 2019; originally announced February 2019.

    Comments: 10 pages

  10. arXiv:1709.04514  [pdf, other

    cs.LG cs.CR

    Differentially Private Mixture of Generative Neural Networks

    Authors: Gergely Acs, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro

    Abstract: Generative models are used in a wide range of applications building on large amounts of contextually rich information. Due to possible privacy violations of the individuals whose data is used to train these models, however, publishing or sharing generative models is not always viable. In this paper, we present a novel technique for privately releasing generative models and entire high-dimensional… ▽ More

    Submitted 13 July, 2018; v1 submitted 13 September, 2017; originally announced September 2017.

    Comments: A shorter version of this paper appeared at the 17th IEEE International Conference on Data Mining (ICDM 2017). This is the full version, published in IEEE Transactions on Knowledge and Data Engineering (TKDE)

  11. Near-Optimal Fingerprinting with Constraints

    Authors: Gabor Gyorgy Gulyas, Gergely Acs, Claude Castelluccia

    Abstract: Several recent studies have demonstrated that people show large behavioural uniqueness. This has serious privacy implications as most individuals become increasingly re-identifiable in large datasets or can be tracked while they are browsing the web using only a couple of their attributes, called as their fingerprints. Often, the success of these attacks depend on explicit constraints on the numbe… ▽ More

    Submitted 3 June, 2016; v1 submitted 27 May, 2016; originally announced May 2016.

  12. arXiv:1507.07851  [pdf, other

    cs.CR

    On the Unicity of Smartphone Applications

    Authors: Jagdish Prasad Achara, Gergely Acs, Claude Castelluccia

    Abstract: Prior works have shown that the list of apps installed by a user reveal a lot about user interests and behavior. These works rely on the semantics of the installed apps and show that various user traits could be learnt automatically using off-the-shelf machine-learning techniques. In this work, we focus on the re-identifiability issue and thoroughly study the unicity of smartphone apps on a datase… ▽ More

    Submitted 29 October, 2015; v1 submitted 28 July, 2015; originally announced July 2015.

    Comments: 10 pages, 9 Figures, Appeared at ACM CCS Workshop on Privacy in Electronic Society (WPES) 2015

  13. arXiv:1404.4533  [pdf, other

    cs.CR cs.CY cs.NI

    Retargeting Without Tracking

    Authors: Minh-Dung Tran, Gergely Acs, Claude Castelluccia

    Abstract: Retargeting ads are increasingly prevalent on the Internet as their effectiveness has been shown to outperform conventional targeted ads. Retargeting ads are not only based on users' interests, but also on their intents, i.e. commercial products users have shown interest in. Existing retargeting systems heavily rely on tracking, as retargeting companies need to know not only the websites a user ha… ▽ More

    Submitted 17 April, 2014; originally announced April 2014.

  14. arXiv:1201.2531  [pdf, ps, other

    cs.CR

    DREAM: DiffeRentially privatE smArt Metering

    Authors: Gergely Acs, Claude Castelluccia

    Abstract: This paper presents a new privacy-preserving smart metering system. Our scheme is private under the differential privacy model and therefore provides strong and provable guarantees. With our scheme, an (electricity) supplier can periodically collect data from smart meters and derive aggregated statistics while learning only limited information about the activities of individual households. For exa… ▽ More

    Submitted 12 January, 2012; originally announced January 2012.

    Comments: Shorter version appeared on Information Hiding Conference 2011