Skip to main content

Showing 1–4 of 4 results for author: Doyle, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.10765  [pdf, other

    cs.LG cs.CR

    Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection

    Authors: Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller

    Abstract: Federated Learning (FL) is a data-minimization approach enabling collaborative model training across diverse clients with local data, avoiding direct data exchange. However, state-of-the-art FL solutions to identify fraudulent financial transactions exhibit a subset of the following limitations. They (1) lack a formal security definition and proof, (2) assume prior freezing of suspicious customers… ▽ More

    Submitted 22 January, 2024; v1 submitted 19 January, 2024; originally announced January 2024.

  2. arXiv:2003.06080  [pdf

    cs.LG eess.IV stat.ML

    Coronary Artery Segmentation from Intravascular Optical Coherence Tomography Using Deep Capsules

    Authors: Arjun Balaji, Lachlan Kelsey, Kamran Majeed, Carl Schultz, Barry Doyle

    Abstract: The segmentation and analysis of coronary arteries from intravascular optical coherence tomography (IVOCT) is an important aspect of diagnosing and managing coronary artery disease. Current image processing methods are hindered by the time needed to generate expert-labelled datasets and the potential for bias during the analysis. Therefore, automated, robust, unbiased and timely geometry extractio… ▽ More

    Submitted 7 April, 2021; v1 submitted 12 March, 2020; originally announced March 2020.

    Comments: This version has been accepted in Artificial Intelligence in Medicine. Main paper: 28 pages, 9 figures, 4 tables. Supplementary Material: 3 pages, 3 figures

  3. arXiv:1711.01625  [pdf, other

    cs.CR

    Trustware: A Device-based Protocol for Verifying Client Legitimacy

    Authors: Ben Doyle, Patrick Korth, Kyle Nekritz, Zane Salem

    Abstract: Online services commonly attempt to verify the legitimacy of users with CAPTCHAs. However, CAPTCHAs are annoying for users, often difficult for users to solve, and can be defeated using cheap labor or, increasingly, with improved algorithms. We propose a new protocol for clients to prove their legitimacy, allowing the client's devices to vouch for the client. The client's devices, and those in clo… ▽ More

    Submitted 5 November, 2017; originally announced November 2017.

  4. arXiv:0801.2618  [pdf, ps, other

    cs.SE cs.IR cs.NI

    Survey of Technologies for Web Application Development

    Authors: Barry Doyle, Cristina Videira Lopes

    Abstract: Web-based application developers face a dizzying array of platforms, languages, frameworks and technical artifacts to choose from. We survey, classify, and compare technologies supporting Web application development. The classification is based on (1) foundational technologies; (2)integration with other information sources; and (3) dynamic content generation. We further survey and classify softw… ▽ More

    Submitted 17 January, 2008; originally announced January 2008.

    Comments: 43 pages

    ACM Class: A.1; D.1.0; D.1.1; D.2.11; H.3.5; H.5.4