Skip to main content

Showing 1–15 of 15 results for author: Halimi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.07420  [pdf, other

    cs.LG cs.CY

    FairSISA: Ensemble Post-Processing to Improve Fairness of Unlearning in LLMs

    Authors: Swanand Ravindra Kadhe, Anisa Halimi, Ambrish Rawat, Nathalie Baracaldo

    Abstract: Training large language models (LLMs) is a costly endeavour in terms of time and computational resources. The large amount of training data used during the unsupervised pre-training phase makes it difficult to verify all data and, unfortunately, undesirable data may be ingested during training. Re-training from scratch is impractical and has led to the creation of the 'unlearning' discipline where… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Accepted in NeurIPS 2023 Workshop on Socially Responsible Language Modelling Research (SoLaR)

  2. arXiv:2302.02162  [pdf, other

    cs.LG cs.CR

    AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against White-Box Models

    Authors: Abdullah Caglar Oksuz, Anisa Halimi, Erman Ayday

    Abstract: Explainable Artificial Intelligence (XAI) encompasses a range of techniques and procedures aimed at elucidating the decision-making processes of AI models. While XAI is valuable in understanding the reasoning behind AI models, the data used for such revelations poses potential security and privacy vulnerabilities. Existing literature has identified privacy risks targeting machine learning models,… ▽ More

    Submitted 6 May, 2023; v1 submitted 4 February, 2023; originally announced February 2023.

  3. arXiv:2207.05521  [pdf, other

    cs.LG cs.CR

    Federated Unlearning: How to Efficiently Erase a Client in FL?

    Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo

    Abstract: With privacy legislation empowering the users with the right to be forgotten, it has become essential to make a model amenable for forgetting some of its training data. However, existing unlearning methods in the machine learning context can not be directly applied in the context of distributed settings like federated learning due to the differences in learning protocol and the presence of multipl… ▽ More

    Submitted 20 October, 2023; v1 submitted 12 July, 2022; originally announced July 2022.

  4. arXiv:2203.12445  [pdf, ps, other

    cs.DC cs.SI

    ShareTrace: Contact Tracing with the Actor Model

    Authors: Ryan Tatton, Erman Ayday, Young** Yoo, Anisa Halimi

    Abstract: Proximity-based contact tracing relies on mobile-device interaction to estimate the spread of disease. ShareTrace is one such approach that improves the efficacy of tracking disease spread by considering direct and indirect forms of contact. In this work, we utilize the actor model to provide an efficient and scalable formulation of ShareTrace with asynchronous, concurrent message passing on a tem… ▽ More

    Submitted 18 September, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

    Comments: To be published in IEEE HealthCom 2022 Conference Proceedings; added mathematical detail about message reachability; improved explanations of algorithms and figures, updated conclusion, fixed typos, results unchanged; 6 pages with 3 figures

    ACM Class: F.1.2; G.2.2; J.3; G.3

  5. arXiv:2203.05664  [pdf, other

    cs.CR

    Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy

    Authors: Leonard Dervishi, Xinyue Wang, Wentao Li, Anisa Halimi, Jaideep Vaidya, Xiaoqian Jiang, Erman Ayday

    Abstract: With the reduction of sequencing costs and the pervasiveness of computing devices, genomic data collection is continually growing. However, data collection is highly fragmented and the data is still siloed across different repositories. Analyzing all of this data would be transformative for genomics research. However, the data is sensitive, and therefore cannot be easily centralized. Furthermore,… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

    Comments: 10 pages, 3 figures

  6. A Bayesian Based Deep Unrolling Algorithm for Single-Photon Lidar Systems

    Authors: Jakeoung Koo, Abderrahim Halimi, Stephen McLaughlin

    Abstract: Deploying 3D single-photon Lidar imaging in real world applications faces multiple challenges including imaging in high noise environments. Several algorithms have been proposed to address these issues based on statistical or learning-based frameworks. Statistical methods provide rich information about the inferred parameters but are limited by the assumed model correlation structures, while deep… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  7. Real-time, low-cost multi-person 3D pose estimation

    Authors: Alice Ruget, Max Tyler, Germán Mora Martín, Stirling Scholes, Feng Zhu, Istvan Gyongy, Brent Hearn, Steve McLaughlin, Abderrahim Halimi, Jonathan Leach

    Abstract: The process of tracking human anatomy in computer vision is referred to pose estimation, and it is used in fields ranging from gaming to surveillance. Three-dimensional pose estimation traditionally requires advanced equipment, such as multiple linked intensity cameras or high-resolution time-of-flight cameras to produce depth images. However, there are applications, e.g.~consumer electronics, whe… ▽ More

    Submitted 24 August, 2022; v1 submitted 11 October, 2021; originally announced October 2021.

  8. arXiv:2107.13407  [pdf, other

    eess.IV cs.CV physics.optics

    High-speed object detection with a single-photon time-of-flight image sensor

    Authors: Germán Mora-Martín, Alex Turpin, Alice Ruget, Abderrahim Halimi, Robert Henderson, Jonathan Leach, Istvan Gyongy

    Abstract: 3D time-of-flight (ToF) imaging is used in a variety of applications such as augmented reality (AR), computer interfaces, robotics and autonomous systems. Single-photon avalanche diodes (SPADs) are one of the enabling technologies providing accurate depth data even over long ranges. By develo** SPADs in array format with integrated processing combined with pulsed, flood-type illumination, high-s… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Comments: 13 pages, 5 figures, 3 tables

  9. arXiv:2101.08879  [pdf, other

    cs.CR

    Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies

    Authors: Anisa Halimi, Leonard Dervishi, Erman Ayday, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux, Xiaoqian Jiang, Jaideep Vaidya

    Abstract: Providing provenance in scientific workflows is essential for reproducibility and auditability purposes. Workflow systems model and record provenance describing the steps performed to obtain the final results of a computation. In this work, we propose a framework that verifies the correctness of the statistical test results that are conducted by a researcher while protecting individuals' privacy i… ▽ More

    Submitted 7 November, 2022; v1 submitted 21 January, 2021; originally announced January 2021.

    Comments: Appeared in the Proceedings on Privacy Enhancing Technologies Symposium (PETS) 2022

  10. arXiv:2011.11444  [pdf, other

    eess.IV cs.CV

    Robust super-resolution depth imaging via a multi-feature fusion deep network

    Authors: Alice Ruget, Stephen McLaughlin, Robert K. Henderson, Istvan Gyongy, Abderrahim Halimi, Jonathan Leach

    Abstract: Three-dimensional imaging plays an important role in imaging applications where it is necessary to record depth. The number of applications that use depth imaging is increasing rapidly, and examples include self-driving autonomous vehicles and auto-focus assist on smartphone cameras. Light detection and ranging (LIDAR) via single-photon sensitive detector (SPAD) arrays is an emerging technology th… ▽ More

    Submitted 1 February, 2021; v1 submitted 20 November, 2020; originally announced November 2020.

  11. arXiv:2009.03698  [pdf, other

    cs.CR cs.SI

    Efficient Quantification of Profile Matching Risk in Social Networks

    Authors: Anisa Halimi, Erman Ayday

    Abstract: Anonymous data sharing has been becoming more challenging in today's interconnected digital world, especially for individuals that have both anonymous and identified online activities. The most prominent example of such data sharing platforms today are online social networks (OSNs). Many individuals have multiple profiles in different OSNs, including anonymous and identified ones (depending on the… ▽ More

    Submitted 7 September, 2020; originally announced September 2020.

    Comments: arXiv admin note: text overlap with arXiv:2008.09608

    Journal ref: Proceedings of the 25th European Symposium on Research in Computer Security (ESORICS 2020)

  12. arXiv:2008.09608  [pdf, other

    cs.SI cs.CR

    Profile Matching Across Online Social Networks

    Authors: Anisa Halimi, Erman Ayday

    Abstract: In this work, we study the privacy risk due to profile matching across online social networks (OSNs), in which anonymous profiles of OSN users are matched to their real identities using auxiliary information about them. We consider different attributes that are publicly shared by users. Such attributes include both strong identifiers such as user name and weak identifiers such as interest or senti… ▽ More

    Submitted 19 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1711.01815

    Journal ref: Proceedings of the 22nd International Conference on Information and Communications Security (ICICS 2020)

  13. arXiv:1711.01815  [pdf, other

    cs.CR cs.SI

    Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures

    Authors: Anisa Halimi, Erman Ayday

    Abstract: In this work, we propose a profile matching (or deanonymization) attack for unstructured online social networks (OSNs) in which similarity in graphical structure cannot be used for profile matching. We consider different attributes that are publicly shared by users. Such attributes include both obvious identifiers such as the user name and non-obvious identifiers such as interest similarity or sen… ▽ More

    Submitted 6 November, 2017; originally announced November 2017.

    Comments: 17 pages, 15 figures

  14. arXiv:1602.01729  [pdf, ps, other

    stat.ML cs.CV cs.NE

    Correntropy Maximization via ADMM - Application to Robust Hyperspectral Unmixing

    Authors: Fei Zhu, Abderrahim Halimi, Paul Honeine, Badong Chen, Nanning Zheng

    Abstract: In hyperspectral images, some spectral bands suffer from low signal-to-noise ratio due to noisy acquisition and atmospheric effects, thus requiring robust techniques for the unmixing problem. This paper presents a robust supervised spectral unmixing approach for hyperspectral images. The robustness is achieved by writing the unmixing problem as the maximization of the correntropy criterion subject… ▽ More

    Submitted 4 February, 2016; originally announced February 2016.

    Comments: 23 pages

  15. Estimating the Intrinsic Dimension of Hyperspectral Images Using an Eigen-Gap Approach

    Authors: A. Halimi, P. Honeine, M. Kharouf, C. Richard, J. -Y. Tourneret

    Abstract: Linear mixture models are commonly used to represent hyperspectral datacube as a linear combinations of endmember spectra. However, determining of the number of endmembers for images embedded in noise is a crucial task. This paper proposes a fully automatic approach for estimating the number of endmembers in hyperspectral images. The estimation is based on recent results of random matrix theory re… ▽ More

    Submitted 22 January, 2015; originally announced January 2015.

    Comments: 21 pages, 4 figures and 4 tables