Skip to main content

Showing 1–13 of 13 results for author: Blanco-Justicia, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.02062  [pdf, other

    cs.CR cs.AI cs.LG

    Digital Forgetting in Large Language Models: A Survey of Unlearning Methods

    Authors: Alberto Blanco-Justicia, Najeeb Jebreel, Benet Manzanares, David Sánchez, Josep Domingo-Ferrer, Guillem Collell, Kuan Eeik Tan

    Abstract: The objective of digital forgetting is, given a model with undesirable knowledge or behavior, obtain a new model where the detected issues are no longer present. The motivations for forgetting include privacy protection, copyright protection, elimination of biases and discrimination, and prevention of harmful content generation. Effective digital forgetting has to be effective (meaning how well th… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: 70 pages

    MSC Class: 68 ACM Class: K.4.1; I.2.6; I.2.7

  2. arXiv:2311.03171  [pdf, other

    cs.CR cs.LG

    An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census Microdata

    Authors: David Sánchez, Najeeb Jebreel, Josep Domingo-Ferrer, Krishnamurty Muralidhar, Alberto Blanco-Justicia

    Abstract: The alleged threat of reconstruction attacks has led the U.S. Census Bureau (USCB) to replace in the Decennial Census 2020 the traditional statistical disclosure limitation based on rank swap** with one based on differential privacy (DP). This has resulted in substantial accuracy loss of the released statistics. Worse yet, it has been shown that the reconstruction attacks used as an argument to… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: 20 pages, 5 figures, 4 tables

  3. arXiv:2211.01656  [pdf

    cs.LG cs.AI cs.CR

    GRAIMATTER Green Paper: Recommendations for disclosure control of trained Machine Learning (ML) models from Trusted Research Environments (TREs)

    Authors: Emily Jefferson, James Liley, Maeve Malone, Smarti Reel, Alba Crespi-Boixader, Xaroula Kerasidou, Francesco Tava, Andrew McCarthy, Richard Preen, Alberto Blanco-Justicia, Esma Mansouri-Benssassi, Josep Domingo-Ferrer, Jillian Beggs, Antony Chuter, Christian Cole, Felix Ritchie, Angela Daly, Simon Rogers, Jim Smith

    Abstract: TREs are widely, and increasingly used to support statistical analysis of sensitive data across a range of sectors (e.g., health, police, tax and education) as they enable secure and transparent research whilst protecting data confidentiality. There is an increasing desire from academia and industry to train AI models in TREs. The field of AI is develo** quickly with applications including spott… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

  4. Enhanced Security and Privacy via Fragmented Federated Learning

    Authors: Najeeb Moharram Jebreel, Josep Domingo-Ferrer, Alberto Blanco-Justicia, David Sanchez

    Abstract: In federated learning (FL), a set of participants share updates computed on their local data with an aggregator server that combines updates into a global model. However, reconciling accuracy with privacy and security is a challenge to FL. On the one hand, good updates sent by honest participants may reveal their private local information, whereas poisoned updates sent by malicious participants ma… ▽ More

    Submitted 19 November, 2022; v1 submitted 13 July, 2022; originally announced July 2022.

    Comments: IEEE Transactions on Neural Networks and Learning Systems (To Appear)

  5. arXiv:2207.01982  [pdf, other

    cs.CR cs.LG

    Defending against the Label-flip** Attack in Federated Learning

    Authors: Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia

    Abstract: Federated learning (FL) provides autonomy and privacy by design to participating peers, who cooperatively build a machine learning (ML) model while kee** their private data in their devices. However, that same autonomy opens the door for malicious peers to poison the model by conducting either untargeted or targeted poisoning attacks. The label-flip** (LF) attack is a targeted poisoning attack… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

  6. arXiv:2206.04621  [pdf, ps, other

    cs.CR cs.LG

    A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning

    Authors: Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar

    Abstract: We review the use of differential privacy (DP) for privacy protection in machine learning (ML). We show that, driven by the aim of preserving the accuracy of the learned models, DP-based ML implementations are so loose that they do not offer the ex ante privacy guarantees of DP. Instead, what they deliver is basically noise addition similar to the traditional (and often criticized) statistical dis… ▽ More

    Submitted 5 July, 2022; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: ACM Computing Surveys (to appear)

    ACM Class: I.2.6

    Journal ref: ACM Computing Surveys, vol. 55, no. 8, pp. 1-26, 2023

  7. arXiv:2108.01913  [pdf, other

    cs.CR cs.DC cs.GT cs.LG

    Secure and Privacy-Preserving Federated Learning via Co-Utility

    Authors: Josep Domingo-Ferrer, Alberto Blanco-Justicia, Jesús Manjón, David Sánchez

    Abstract: The decentralized nature of federated learning, that often leverages the power of edge devices, makes it vulnerable to attacks against privacy and security. The privacy risk for a peer is that the model update she computes on her private data may, when sent to the model manager, leak information on those private data. Even more obvious are security attacks, whereby one or several malicious peers r… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: IEEE Internet of Things Journal, to appear

    MSC Class: 68P27; 68Txx; 91 ACM Class: I.2.11; K.6.5

  8. arXiv:2012.06810  [pdf

    cs.CR cs.AI

    Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions

    Authors: Alberto Blanco-Justicia, Josep Domingo-Ferrer, Sergio Martínez, David Sánchez, Adrian Flanagan, Kuan Eeik Tan

    Abstract: Federated learning (FL) allows a server to learn a machine learning (ML) model across multiple decentralized clients that privately store their own training data. In contrast with centralized ML approaches, FL saves computation to the server and does not require the clients to outsource their private data to the server. However, FL is not free of issues. On the one hand, the model updates sent by… ▽ More

    Submitted 12 December, 2020; originally announced December 2020.

    Comments: 40 pages, 19 figures

  9. arXiv:2011.02352  [pdf, ps, other

    cs.CR

    The Limits of Differential Privacy (and its Misuse in Data Release and Machine Learning)

    Authors: Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia

    Abstract: Differential privacy (DP) is a neat privacy definition that can co-exist with certain well-defined data uses in the context of interactive queries. However, DP is neither a silver bullet for all privacy problems nor a replacement for all previous privacy models. In fact, extreme care should be exercised when trying to extend its use beyond the setting it was designed for. This paper reviews the li… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: Communications of the ACM, to appear

  10. arXiv:1503.00454  [pdf, ps, other

    cs.CR

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Authors: Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia

    Abstract: Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving i… ▽ More

    Submitted 2 March, 2015; originally announced March 2015.

    Comments: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appear

    MSC Class: 94A60 ACM Class: D.4.6; K.6.5

  11. arXiv:1412.0529  [pdf, ps, other

    cs.CR

    Group Discounts Compatible with Buyer Privacy

    Authors: Josep Domingo-Ferrer, Alberto Blanco-Justicia

    Abstract: We show how group discounts can be offered without forcing buyers to surrender their anonymity, as long as buyers can use their own computing devices (e.g. smartphone, tablet or computer) to perform a purchase. Specifically, we present a protocol for privacy-preserving group discounts. The protocol allows a group of buyers to prove how many they are without disclosing their identities. Coupled wit… ▽ More

    Submitted 1 December, 2014; originally announced December 2014.

    Comments: Presented at 9th DPM International Workshop on Data Privacy Management (DPM 2014, Sep. 10,2014). To appear in workshop proceedings, LNCS, Springer

  12. arXiv:1411.3961  [pdf, ps, other

    cs.CR

    Privacy-preserving Loyalty Programs

    Authors: Alberto Blanco-Justicia, Josep Domingo-Ferrer

    Abstract: Loyalty programs are promoted by vendors to incentivize loyalty in buyers. Although such programs have become widespread, they have been criticized by business experts and consumer associations: loyalty results in profiling and hence in loss of privacy of consumers. We propose a protocol for privacy-preserving loyalty programs that allows vendors and consumers to enjoy the benefits of loyalty (ret… ▽ More

    Submitted 1 December, 2014; v1 submitted 14 November, 2014; originally announced November 2014.

    Comments: Presented at the 9th DPM International Workshop on Data Privacy Management (DPM 2014, held on Sep. 10, 2014). To appear in workshop proceedings, LNCS, Springer

  13. arXiv:1308.2435  [pdf, ps, other

    cs.CR

    Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

    Authors: Oriol Farràs, Josep Domingo-Ferrer, Alberto Blanco-Justicia

    Abstract: Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms make use of digital credentials and certificates in order to establish trust among these strangers. We address the problem of choosing which cred… ▽ More

    Submitted 11 August, 2013; originally announced August 2013.

    Comments: The material in this paper will be presented in part at the 8th DPM International Workshop on Data Privacy Management (DPM 2013)