Skip to main content

Showing 1–7 of 7 results for author: Bennati, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.05995  [pdf, other

    cs.AI cs.CY cs.DC cs.IR cs.MA

    Collective Privacy Recovery: Data-sharing Coordination via Decentralized Artificial Intelligence

    Authors: Evangelos Pournaras, Mark Christopher Ballandies, Stefano Bennati, Chien-fei Chen

    Abstract: Collective privacy loss becomes a colossal problem, an emergency for personal freedoms and democracy. But, are we prepared to handle personal data as scarce resource and collectively share data under the doctrine: as little as possible, as much as necessary? We hypothesize a significant privacy recovery if a population of individuals, the data collective, coordinates to share minimum data for runn… ▽ More

    Submitted 10 July, 2023; v1 submitted 14 January, 2023; originally announced January 2023.

    Comments: Contains Supplementary Information

  2. arXiv:2011.09218  [pdf, other

    cs.CR

    Modelling imperfect knowledge via location semantics for realistic privacy risks estimation in trajectory data

    Authors: Stefano Bennati, Aleksandra Kovacevic

    Abstract: Mobility patterns of vehicles and people provide powerful data sources for location-based services such as fleet optimization and traffic flow analysis. Location-based service providers must balance the value they extract from trajectory data with protecting the privacy of the individuals behind those trajectories. Reaching this goal requires measuring accurately the values of utility and privacy.… ▽ More

    Submitted 7 December, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

  3. arXiv:1805.09090  [pdf, other

    cs.MA

    Volunteers in the Smart City: Comparison of Contribution Strategies on Human-Centered Measures

    Authors: Stefano Bennati, Ivana Dusparic, Rhythima Shinde, Catholijn M. Jonker

    Abstract: Several smart city services rely on users contribution, e.g., data, which can be costly for the users in terms of privacy. High costs lead to reduced user participation, which undermine the success of smart city technologies. This work develops a scenario-independent design principle, based on public good theory, for resource management in smart city applications, where provision of a service depe… ▽ More

    Submitted 23 May, 2018; originally announced May 2018.

  4. arXiv:1703.07150  [pdf, other

    cs.DC cs.CR

    PriMaL: A Privacy-Preserving Machine Learning Method for Event Detection in Distributed Sensor Networks

    Authors: Stefano Bennati, Catholijn M. Jonker

    Abstract: This paper introduces PriMaL, a general PRIvacy-preserving MAchine-Learning method for reducing the privacy cost of information transmitted through a network. Distributed sensor networks are often used for automated classification and detection of abnormal events in high-stakes situations, e.g. fire in buildings, earthquakes, or crowd disasters. Such networks might transmit privacy-sensitive infor… ▽ More

    Submitted 21 March, 2017; originally announced March 2017.

  5. Privacy-enhancing Aggregation of Internet of Things Data via Sensors Grou**

    Authors: Stefano Bennati, Evangelos Pournaras

    Abstract: Big data collection practices using Internet of Things (IoT) pervasive technologies are often privacy-intrusive and result in surveillance, profiling, and discriminatory actions over citizens that in turn undermine the participation of citizens to the development of sustainable smart cities. Nevertheless, real-time data analytics and aggregate information from IoT devices open up tremendous opport… ▽ More

    Submitted 1 March, 2018; v1 submitted 28 February, 2017; originally announced February 2017.

  6. On the Role of Collective Sensing and Evolution in Group Formation

    Authors: Stefano Bennati

    Abstract: Collective sensing is an emergent phenomenon which enables individuals to estimate a hidden property of the environment through the observation of social interactions. Previous work on collective sensing shows that gregarious individuals obtain an evolutionary advantage by exploiting collective sensing when competing against solitary individuals. This work addresses the question of whether collect… ▽ More

    Submitted 15 February, 2018; v1 submitted 22 February, 2016; originally announced February 2016.

  7. arXiv:1507.01930  [pdf, other

    cs.CR

    Malware Task Identification: A Data Driven Approach

    Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch

    Abstract: Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - includin… ▽ More

    Submitted 7 July, 2015; originally announced July 2015.

    Comments: 8 pages full paper, accepted FOSINT-SI (2015)