Skip to main content

Showing 1–3 of 3 results for author: Gabrielli, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.04604  [pdf, other

    cs.LG cs.CR cs.DC

    A Survey on Decentralized Federated Learning

    Authors: Edoardo Gabrielli, Giovanni Pica, Gabriele Tolomei

    Abstract: In recent years, federated learning (FL) has become a very popular paradigm for training distributed, large-scale, and privacy-preserving machine learning (ML) systems. In contrast to standard ML, where data must be collected at the exact location where training is performed, FL takes advantage of the computational capabilities of millions of edge devices to collaboratively train a shared, global… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  2. arXiv:2303.16668  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection

    Authors: Edoardo Gabrielli, Dimitri Belli, Vittorio Miori, Gabriele Tolomei

    Abstract: Current defense mechanisms against model poisoning attacks in federated learning (FL) systems have proven effective up to a certain threshold of malicious clients. In this work, we introduce FLANDERS, a novel pre-aggregation filter for FL resilient to large-scale model poisoning attacks, i.e., when malicious clients far exceed legitimate participants. FLANDERS treats the sequence of local models s… ▽ More

    Submitted 27 May, 2024; v1 submitted 29 March, 2023; originally announced March 2023.

  3. arXiv:1402.1940  [pdf, other

    cs.CR

    No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone

    Authors: Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi

    Abstract: It is generally recognized that the traffic generated by an individual connected to a network acts as his biometric signature. Several tools exploit this fact to fingerprint and monitor users. Often, though, these tools assume to access the entire traffic, including IP addresses and payloads. This is not feasible on the grounds that both performance and privacy would be negatively affected. In rea… ▽ More

    Submitted 9 February, 2014; originally announced February 2014.