Skip to main content

Showing 1–13 of 13 results for author: Boutet, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.10209  [pdf, other

    cs.LG cs.CR

    On the Alignment of Group Fairness with Attribute Privacy

    Authors: Jan Aalmoes, Vasisht Duddu, Antoine Boutet

    Abstract: Group fairness and privacy are fundamental aspects in designing trustworthy machine learning models. Previous research has highlighted conflicts between group fairness and different privacy notions. We are the first to demonstrate the alignment of group fairness with the specific privacy notion of attribute privacy in a blackbox setting. Attribute privacy, quantified by the resistance to attribute… ▽ More

    Submitted 5 March, 2024; v1 submitted 18 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2202.02242

  2. arXiv:2208.09967  [pdf, other

    cs.CR cs.LG

    Inferring Sensitive Attributes from Model Explanations

    Authors: Vasisht Duddu, Antoine Boutet

    Abstract: Model explanations provide transparency into a trained machine learning model's blackbox behavior to a model builder. They indicate the influence of different input attributes to its corresponding model prediction. The dependency of explanations on input raises privacy concerns for sensitive user data. However, current literature has limited discussion on privacy risks of model explanations. We… ▽ More

    Submitted 7 September, 2022; v1 submitted 21 August, 2022; originally announced August 2022.

    Comments: ACM CIKM 2022

  3. arXiv:2208.08361  [pdf

    q-bio.GN cs.CR cs.DC cs.IR

    I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies

    Authors: Túlio Pascoal, Jérémie Decouchant, Antoine Boutet, Marcus Völp

    Abstract: Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS statistics might give rise to privacy attacks. Several works attempted to reconcile secure processing with privacy-preserving releases of GWASes. However, we highlight that these approaches remain… ▽ More

    Submitted 20 September, 2022; v1 submitted 17 August, 2022; originally announced August 2022.

  4. arXiv:2202.02242   

    cs.CR cs.LG

    Dikaios: Privacy Auditing of Algorithmic Fairness via Attribute Inference Attacks

    Authors: Jan Aalmoes, Vasisht Duddu, Antoine Boutet

    Abstract: Machine learning (ML) models have been deployed for high-stakes applications. Due to class imbalance in the sensitive attribute observed in the datasets, ML models are unfair on minority subgroups identified by a sensitive attribute, such as race and sex. In-processing fairness algorithms ensure model predictions are independent of sensitive attribute. Furthermore, ML models are vulnerable to attr… ▽ More

    Submitted 24 November, 2022; v1 submitted 4 February, 2022; originally announced February 2022.

    Comments: The paper's results and conclusions underwent significant changes. The updated paper can be found at arXiv:2211.10209

  5. MixNN: Protection of Federated Learning Against Inference Attacks by Mixing Neural Network Layers

    Authors: Antoine Boutet, Thomas Lebrun, Jan Aalmoes, Adrien Baud

    Abstract: Machine Learning (ML) has emerged as a core technology to provide learning models to perform complex tasks. Boosted by Machine Learning as a Service (MLaaS), the number of applications relying on ML capabilities is ever increasing. However, ML models are the source of different privacy violations through passive or active attacks from different entities. In this paper, we present MixNN a proxy-bas… ▽ More

    Submitted 26 September, 2021; originally announced September 2021.

  6. Privacy Assessment of Federated Learning using Private Personalized Layers

    Authors: Théo Jourdan, Antoine Boutet, Carole Frindel

    Abstract: Federated Learning (FL) is a collaborative scheme to train a learning model across multiple participants without sharing data. While FL is a clear step forward towards enforcing users' privacy, different inference attacks have been developed. In this paper, we quantify the utility and privacy trade-off of a FL scheme using private personalized layers. While this scheme has been proposed as local a… ▽ More

    Submitted 25 September, 2021; v1 submitted 15 June, 2021; originally announced June 2021.

    Journal ref: MLSP 2021 - Machine Learning for Signal Processing

  7. GECKO: Reconciling Privacy, Accuracy and Efficiency in Embedded Deep Learning

    Authors: Vasisht Duddu, Antoine Boutet, Virat Shejwalkar

    Abstract: Embedded systems demand on-device processing of data using Neural Networks (NNs) while conforming to the memory, power and computation constraints, leading to an efficiency and accuracy tradeoff. To bring NNs to edge devices, several optimizations such as model compression through pruning, quantization, and off-the-shelf architectures with efficient design have been extensively adopted. These algo… ▽ More

    Submitted 9 January, 2022; v1 submitted 2 October, 2020; originally announced October 2020.

    Comments: 10 pages. The 37th ACM/SIGAPP Symposium on Applied Computing (SAC'22), 2022

  8. Quantifying Privacy Leakage in Graph Embedding

    Authors: Vasisht Duddu, Antoine Boutet, Virat Shejwalkar

    Abstract: Graph embeddings have been proposed to map graph data to low dimensional space for downstream processing (e.g., node classification or link prediction). With the increasing collection of personal data, graph embeddings can be trained on private and sensitive data. For the first time, we quantify the privacy leakage in graph embeddings through three inference attacks targeting Graph Neural Networks… ▽ More

    Submitted 26 April, 2021; v1 submitted 2 October, 2020; originally announced October 2020.

    Comments: 11 pages

    Journal ref: MobiQuitous 2020 - 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

  9. arXiv:2008.01621  [pdf, other

    cs.CR

    DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems

    Authors: Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, Cédric Lauradoux, Daniel Le Métayer, Vincent Roca

    Abstract: This document presents an evolution of the ROBERT protocol that decentralizes most of its operations on the mobile devices. DESIRE is based on the same architecture than ROBERT but implements major privacy improvements. In particular, it introduces the concept of Private Encounter Tokens, that are secret and cryptographically generated, to encode encounters. In the DESIRE protocol, the temporary I… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

  10. arXiv:2003.10325  [pdf, other

    cs.CR cs.AI cs.LG eess.SP

    DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks

    Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin

    Abstract: With the widespread adoption of the quantified self movement, an increasing number of users rely on mobile applications to monitor their physical activity through their smartphones. Granting to applications a direct access to sensor data expose users to privacy risks. Indeed, usually these motion sensor data are transmitted to analytics applications hosted on the cloud leveraging machine learning… ▽ More

    Submitted 8 October, 2020; v1 submitted 23 March, 2020; originally announced March 2020.

  11. X-Search: Revisiting Private Web Search using Intel SGX

    Authors: Sonia Ben Mokhtar, Antoine Boutet, Pascal Felber, Marcelo Pasin, Rafael Pires, Valerio Schiavoni

    Abstract: The exploitation of user search queries by search engines is at the heart of their economic model. As consequence, offering private Web search functionalities is essential to the users who care about their privacy. Nowadays, there exists no satisfactory approach to enable users to access search engines in a privacy-preserving way. Existing solutions are either too costly due to the heavy use of cr… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference. Las Vegas, NV, USA, December 11-15, 2017, 11 pages

    Journal ref: 2017 In Proceedings of Middleware '17

  12. CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions

    Authors: Rafael Pires, David Goltzsche, Sonia Ben Mokhtar, Sara Bouchenak, Antoine Boutet, Pascal Felber, Rüdiger Kapitza, Marcelo Pasin, Valerio Schiavoni

    Abstract: By regularly querying Web search engines, users (unconsciously) disclose large amounts of their personal data as part of their search queries, among which some might reveal sensitive information (e.g. health issues, sexual, political or religious preferences). Several solutions exist to allow users querying search engines while improving privacy protection. However, these solutions suffer from a n… ▽ More

    Submitted 27 July, 2018; v1 submitted 3 May, 2018; originally announced May 2018.

    Journal ref: 38th IEEE International Conference on Distributed Computing Systems (ICDCS 2018)

  13. arXiv:1609.07349  [pdf, other

    cs.CR

    Adaptive Location Privacy with ALP

    Authors: Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Lionel Brunie

    Abstract: With the increasing amount of mobility data being collected on a daily basis by location-based services (LBSs) comes a new range of threats for users, related to the over-sharing of their location information. To deal with this issue, several location privacy protection mechanisms (LPPMs) have been proposed in the past years. However, each of these mechanisms comes with different configuration par… ▽ More

    Submitted 23 September, 2016; originally announced September 2016.

    Comments: 35th Symposium on Reliable Distributed Systems, Sep 2016, Budapest, Hungary