-
Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders
Authors:
Sulthana Shams,
Douglas Leith
Abstract:
This paper proposes a novel method for detecting shilling attacks in Matrix Factorization (MF)-based Recommender Systems (RS), in which attackers use false user-item feedback to promote a specific item. Unlike existing methods that use either use supervised learning to distinguish between attack and genuine profiles or analyse target item rating distributions to detect false ratings, our method us…
▽ More
This paper proposes a novel method for detecting shilling attacks in Matrix Factorization (MF)-based Recommender Systems (RS), in which attackers use false user-item feedback to promote a specific item. Unlike existing methods that use either use supervised learning to distinguish between attack and genuine profiles or analyse target item rating distributions to detect false ratings, our method uses an unsupervised technique to detect false ratings by examining shifts in item preference vectors that exploit rating deviations and user characteristics, making it a promising new direction. The experimental results demonstrate the effectiveness of our approach in various attack scenarios, including those involving obfuscation techniques.
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
High Accuracy and Low Regret for User-Cold-Start Using Latent Bandits
Authors:
David Young,
Douglas Leith
Abstract:
We develop a novel latent-bandit algorithm for tackling the cold-start problem for new users joining a recommender system. This new algorithm significantly outperforms the state of the art, simultaneously achieving both higher accuracy and lower regret.
We develop a novel latent-bandit algorithm for tackling the cold-start problem for new users joining a recommender system. This new algorithm significantly outperforms the state of the art, simultaneously achieving both higher accuracy and lower regret.
△ Less
Submitted 12 May, 2023;
originally announced May 2023.
-
Evaluating Impact of User-Cluster Targeted Attacks in Matrix Factorisation Recommenders
Authors:
Sulthana Shams,
Douglas Leith
Abstract:
In practice, users of a Recommender System (RS) fall into a few clusters based on their preferences. In this work, we conduct a systematic study on user-cluster targeted data poisoning attacks on Matrix Factorisation (MF) based RS, where an adversary injects fake users with falsely crafted user-item feedback to promote an item to a specific user cluster. We analyse how user and item feature matric…
▽ More
In practice, users of a Recommender System (RS) fall into a few clusters based on their preferences. In this work, we conduct a systematic study on user-cluster targeted data poisoning attacks on Matrix Factorisation (MF) based RS, where an adversary injects fake users with falsely crafted user-item feedback to promote an item to a specific user cluster. We analyse how user and item feature matrices change after data poisoning attacks and identify the factors that influence the effectiveness of the attack on these feature matrices. We demonstrate that the adversary can easily target specific user clusters with minimal effort and that some items are more susceptible to attacks than others. Our theoretical analysis has been validated by the experimental results obtained from two real-world datasets. Our observations from the study could serve as a motivating point to design a more robust RS.
△ Less
Submitted 20 June, 2024; v1 submitted 8 May, 2023;
originally announced May 2023.
-
Android OS Privacy Under the Loupe -- A Tale from the East
Authors:
Haoyu Liu,
Douglas J. Leith,
Paul Patras
Abstract:
China is currently the country with the largest number of Android smartphone users. We use a combination of static and dynamic code analysis techniques to study the data transmitted by the preinstalled system apps on Android smartphones from three of the most popular vendors in China. We find that an alarming number of preinstalled system, vendor and third-party apps are granted dangerous privileg…
▽ More
China is currently the country with the largest number of Android smartphone users. We use a combination of static and dynamic code analysis techniques to study the data transmitted by the preinstalled system apps on Android smartphones from three of the most popular vendors in China. We find that an alarming number of preinstalled system, vendor and third-party apps are granted dangerous privileges. Through traffic analysis, we find these packages transmit to many third-party domains privacy sensitive information related to the user's device (persistent identifiers), geolocation (GPS coordinates, network-related identifiers), user profile (phone number, app usage) and social relationships (e.g., call history), without consent or even notification. This poses serious deanonymization and tracking risks that extend outside China when the user leaves the country, and calls for a more rigorous enforcement of the recently adopted data privacy legislation.
△ Less
Submitted 3 February, 2023;
originally announced February 2023.
-
Bandit Convex Optimisation Revisited: FTRL Achieves $\tilde{O}(t^{1/2})$ Regret
Authors:
David Young,
Douglas Leith,
George Iosifidis
Abstract:
We show that a kernel estimator using multiple function evaluations can be easily converted into a sampling-based bandit estimator with expectation equal to the original kernel estimate. Plugging such a bandit estimator into the standard FTRL algorithm yields a bandit convex optimisation algorithm that achieves $\tilde{O}(t^{1/2})$ regret against adversarial time-varying convex loss functions.
We show that a kernel estimator using multiple function evaluations can be easily converted into a sampling-based bandit estimator with expectation equal to the original kernel estimate. Plugging such a bandit estimator into the standard FTRL algorithm yields a bandit convex optimisation algorithm that achieves $\tilde{O}(t^{1/2})$ regret against adversarial time-varying convex loss functions.
△ Less
Submitted 24 June, 2023; v1 submitted 1 February, 2023;
originally announced February 2023.
-
Two Models are Better than One: Federated Learning Is Not Private For Google GBoard Next Word Prediction
Authors:
Mohamed Suliman,
Douglas Leith
Abstract:
In this paper we present new attacks against federated learning when used to train natural language text models. We illustrate the effectiveness of the attacks against the next word prediction model used in Google's GBoard app, a widely used mobile keyboard app that has been an early adopter of federated learning for production use. We demonstrate that the words a user types on their mobile handse…
▽ More
In this paper we present new attacks against federated learning when used to train natural language text models. We illustrate the effectiveness of the attacks against the next word prediction model used in Google's GBoard app, a widely used mobile keyboard app that has been an early adopter of federated learning for production use. We demonstrate that the words a user types on their mobile handset, e.g. when sending text messages, can be recovered with high accuracy under a wide range of conditions and that counter-measures such a use of mini-batches and adding local noise are ineffective. We also show that the word order (and so the actual sentences typed) can be reconstructed with high fidelity. This raises obvious privacy concerns, particularly since GBoard is in production use.
△ Less
Submitted 9 October, 2023; v1 submitted 30 October, 2022;
originally announced October 2022.
-
Online Caching with no Regret: Optimistic Learning via Recommendations
Authors:
Naram Mhaisen,
George Iosifidis,
Douglas Leith
Abstract:
The design of effective online caching policies is an increasingly important problem for content distribution networks, online social networks and edge computing services, among other areas. This paper proposes a new algorithmic toolbox for tackling this problem through the lens of \emph{optimistic} online learning. We build upon the Follow-the-Regularized-Leader (FTRL) framework, which is develop…
▽ More
The design of effective online caching policies is an increasingly important problem for content distribution networks, online social networks and edge computing services, among other areas. This paper proposes a new algorithmic toolbox for tackling this problem through the lens of \emph{optimistic} online learning. We build upon the Follow-the-Regularized-Leader (FTRL) framework, which is developed further here to include predictions for the file requests, and we design online caching algorithms for bipartite networks with pre-reserved or dynamic storage subject to time-average budget constraints. The predictions are provided by a content recommendation system that influences the users viewing activity and hence can naturally reduce the caching network's uncertainty about future requests. We also extend the framework to learn and utilize the best request predictor in cases where many are available. We prove that the proposed {optimistic} learning caching policies can achieve \emph{sub-zero} performance loss (regret) for perfect predictions, and maintain the sub-linear regret bound $O(\sqrt T)$, which is the best achievable bound for policies that do not use predictions, even for arbitrary-bad predictions. The performance of the proposed algorithms is evaluated with detailed trace-driven numerical tests.
△ Less
Submitted 20 October, 2022; v1 submitted 20 April, 2022;
originally announced April 2022.
-
Penalised FTRL With Time-Varying Constraints
Authors:
Douglas J. Leith,
George Iosifidis
Abstract:
In this paper we extend the classical Follow-The-Regularized-Leader (FTRL) algorithm to encompass time-varying constraints, through adaptive penalization. We establish sufficient conditions for the proposed Penalized FTRL algorithm to achieve $O(\sqrt{t})$ regret and violation with respect to strong benchmark $\hat{X}^{max}_t$. Lacking prior knowledge of the constraints, this is probably the large…
▽ More
In this paper we extend the classical Follow-The-Regularized-Leader (FTRL) algorithm to encompass time-varying constraints, through adaptive penalization. We establish sufficient conditions for the proposed Penalized FTRL algorithm to achieve $O(\sqrt{t})$ regret and violation with respect to strong benchmark $\hat{X}^{max}_t$. Lacking prior knowledge of the constraints, this is probably the largest benchmark set that we can reasonably hope for. Our sufficient conditions are necessary in the sense that when they are violated there exist examples where $O(\sqrt{t})$ regret and violation is not achieved. Compared to the best existing primal-dual algorithms, Penalized FTRL substantially extends the class of problems for which $O(\sqrt{t})$ regret and violation performance is achievable.
△ Less
Submitted 6 April, 2022; v1 submitted 5 April, 2022;
originally announced April 2022.
-
Online Caching with Optimistic Learning
Authors:
Naram Mhaisen,
George Iosifidis,
Douglas Leith
Abstract:
The design of effective online caching policies is an increasingly important problem for content distribution networks, online social networks and edge computing services, among other areas. This paper proposes a new algorithmic toolbox for tackling this problem through the lens of optimistic online learning. We build upon the Follow-the-Regularized-Leader (FTRL) framework which is developed furth…
▽ More
The design of effective online caching policies is an increasingly important problem for content distribution networks, online social networks and edge computing services, among other areas. This paper proposes a new algorithmic toolbox for tackling this problem through the lens of optimistic online learning. We build upon the Follow-the-Regularized-Leader (FTRL) framework which is developed further here to include predictions for the file requests, and we design online caching algorithms for bipartite networks with fixed-size caches or elastic leased caches subject to time-average budget constraints. The predictions are provided by a content recommendation system that influences the users viewing activity, and hence can naturally reduce the caching network's uncertainty about future requests. We prove that the proposed optimistic learning caching policies can achieve sub-zero performance loss (regret) for perfect predictions, and maintain the best achievable regret bound $O(\sqrt T)$ even for arbitrary-bad predictions. The performance of the proposed algorithms is evaluated with detailed trace-driven numerical tests.
△ Less
Submitted 20 April, 2022; v1 submitted 21 February, 2022;
originally announced February 2022.
-
Lazy Lagrangians with Predictions for Online Learning
Authors:
Daron Anderson,
George Iosifidis,
Douglas J. Leith
Abstract:
We consider the general problem of online convex optimization with time-varying additive constraints in the presence of predictions for the next cost and constraint functions. A novel primal-dual algorithm is designed by combining a Follow-The-Regularized-Leader iteration with prediction-adaptive dynamic steps. The algorithm achieves $\mathcal O(T^{\frac{3-β}{4}})$ regret and…
▽ More
We consider the general problem of online convex optimization with time-varying additive constraints in the presence of predictions for the next cost and constraint functions. A novel primal-dual algorithm is designed by combining a Follow-The-Regularized-Leader iteration with prediction-adaptive dynamic steps. The algorithm achieves $\mathcal O(T^{\frac{3-β}{4}})$ regret and $\mathcal O(T^{\frac{1+β}{2}})$ constraint violation bounds that are tunable via parameter $β\!\in\![1/2,1)$ and have constant factors that shrink with the predictions quality, achieving eventually $\mathcal O(1)$ regret for perfect predictions. Our work extends the FTRL framework for this constrained OCO setting and outperforms the respective state-of-the-art greedy-based solutions, without imposing conditions on the quality of predictions, the cost functions or the geometry of constraints, beyond convexity.
△ Less
Submitted 8 January, 2022;
originally announced January 2022.
-
Selective Edge Computing for Mobile Analytics
Authors:
Apostolos Galanopoulos,
George Iosifidis,
Theodoros Salonidis,
Douglas J. Leith
Abstract:
An increasing number of mobile applications rely on Machine Learning (ML) routines for analyzing data. Executing such tasks at the user devices saves the energy spent on transmitting and processing large data volumes at distant cloud-deployed servers. However, due to memory and computing limitations, the devices often cannot support the required resource-intensive routines and fail to accurately e…
▽ More
An increasing number of mobile applications rely on Machine Learning (ML) routines for analyzing data. Executing such tasks at the user devices saves the energy spent on transmitting and processing large data volumes at distant cloud-deployed servers. However, due to memory and computing limitations, the devices often cannot support the required resource-intensive routines and fail to accurately execute the tasks. In this work, we address the problem of edge-assisted analytics in resource-constrained systems by proposing and evaluating a rigorous selective offloading framework. The devices execute their tasks locally and outsource them to cloudlet servers only when they predict a significant performance improvement. We consider the practical scenario where the offloading gain and resource costs are time-varying; and propose an online optimization algorithm that maximizes the service performance without requiring to know this information. Our approach relies on an approximate dual subgradient method combined with a primal-averaging scheme, and works under minimal assumptions about the system stochasticity. We fully implement the proposed algorithm in a wireless testbed and evaluate its performance using a state-of-the-art image recognition application, finding significant performance gains and cost savings.
△ Less
Submitted 8 January, 2022;
originally announced January 2022.
-
Modelling Downlink Packet Aggregation in Paced 802.11ac WLANs
Authors:
Francesco Gringoli,
Douglas J. Leith
Abstract:
We derive an analytic model of packet aggregation on the the downlink of an 802.11ac WLAN when packet arrivals are paced. The model is closed-form and so suitable for both analysis and design of next generation edge architectures that aim to achieve high rate and low delay. The model is validated against both simulations and experimental measurements and found to be remarkably accurate despite its…
▽ More
We derive an analytic model of packet aggregation on the the downlink of an 802.11ac WLAN when packet arrivals are paced. The model is closed-form and so suitable for both analysis and design of next generation edge architectures that aim to achieve high rate and low delay. The model is validated against both simulations and experimental measurements and found to be remarkably accurate despite its simplicity.
△ Less
Submitted 19 January, 2021;
originally announced January 2021.
-
Measurement-Based Evaluation Of Google/Apple Exposure Notification API For Proximity Detection in a Commuter Bus
Authors:
Douglas J. Leith,
Stephen Farrell
Abstract:
We report on the results of a measurement study carried out on a commuter bus in Dublin, Ireland using the Google/Apple Exposure Notification (GAEN) API. This API is likely to be widely used by Covid-19 contact tracing apps. Measurements were collected between 60 pairs of handset locations and are publicly available. We find that the attenuation level reported by the GAEN API need not increase wit…
▽ More
We report on the results of a measurement study carried out on a commuter bus in Dublin, Ireland using the Google/Apple Exposure Notification (GAEN) API. This API is likely to be widely used by Covid-19 contact tracing apps. Measurements were collected between 60 pairs of handset locations and are publicly available. We find that the attenuation level reported by the GAEN API need not increase with distance between handsets, consistent with there being a complex radio environment inside a bus caused by the metal-rich environment. Changing the people holding a pair of handsets, with the location of the handsets otherwise remaining unchanged, can cause variations of +/-10dB in the attenuation level reported by the GAEN API. Applying the rule used by the Swiss Covid-19 contact tracing app to trigger an exposure notification to our bus measurements we find that no exposure notifications would have been triggered despite the fact that all pairs of handsets were within 2m of one another for at least 15 mins. Applying an alternative threshold-based exposure notification rule can somewhat improve performance to a detection rate of 5% when an exposure duration threshold of 15 minutes is used, increasing to 8% when the exposure duration threshold is reduced to 10 mins. Stratifying the data by distance between pairs of handsets indicates that there is only a weak dependence of detection rate on distance.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
Coronavirus Contact Tracing: Evaluating The Potential Of Using Bluetooth Received Signal Strength For Proximity Detection
Authors:
Douglas J. Leith,
Stephen Farrell
Abstract:
We report on measurements of Bluetooth Low Energy (LE) received signal strength taken on mobile handsets in a variety of common, real-world settings. We note that a key difficulty is obtaining the ground truth as to when people are in close proximity to one another. Knowledge of this ground truth is important for accurately evaluating the accuracy with which contact events are detected by Bluetoot…
▽ More
We report on measurements of Bluetooth Low Energy (LE) received signal strength taken on mobile handsets in a variety of common, real-world settings. We note that a key difficulty is obtaining the ground truth as to when people are in close proximity to one another. Knowledge of this ground truth is important for accurately evaluating the accuracy with which contact events are detected by Bluetooth LE. We approach this by adopting a scenario-based approach. In summary, we find that the Bluetooth LE received signal strength can vary substantially depending on the relative orientation of handsets, on absorption by the human body, reflection/absorption of radio signals in buildings and trains. Indeed we observe that the received signal strength need not decrease with increasing distance. This suggests that the development of accurate methods for proximity detection based on Bluetooth LE received signal strength is likely to be challenging. Our measurements also suggest that combining use of Bluetooth LE contact tracing apps with adoption of new social protocols may yield benefits but this requires further investigation. For example, placing phones on the table during meetings is likely to simplify proximity detection using received signal strength. Similarly, carrying handbags with phones placed close to the outside surface. In locations where the complexity of signal propagation makes proximity detection using received signal strength problematic entry/exit from the location might instead be logged in an app by e.g. scanning a time-varying QR code or the like.
△ Less
Submitted 19 May, 2020;
originally announced June 2020.
-
Lazy Online Gradient Descent is Universal on Polytopes
Authors:
Daron Anderson,
Douglas Leith
Abstract:
We prove the familiar Lazy Online Gradient Descent algorithm is universal on polytope domains. That means it gets $O(1)$ pseudo-regret against i.i.d opponents, while simultaneously achieving the well-known $O(\sqrt N)$ worst-case regret bound. For comparison the bulk of the literature focuses on variants of the Hedge (exponential weights) algorithm on the simplex. These can in principle be lifted…
▽ More
We prove the familiar Lazy Online Gradient Descent algorithm is universal on polytope domains. That means it gets $O(1)$ pseudo-regret against i.i.d opponents, while simultaneously achieving the well-known $O(\sqrt N)$ worst-case regret bound. For comparison the bulk of the literature focuses on variants of the Hedge (exponential weights) algorithm on the simplex. These can in principle be lifted to general polytopes; however the process is computationally unfeasible for many important classes where the number of vertices grows quickly with the dimension. The lifting procedure also ignores any Euclidean bounds on the cost vectors, and can create extra factors of dimension in the pseudo-regret bound. Gradient Descent is simpler than the handful of purpose-built algorithms for polytopes in the literature, and works in a broader setting. In particular existing algorithms assume the optimiser is unique, while our bound allows for several optimal vertices.
△ Less
Submitted 31 August, 2022; v1 submitted 3 April, 2020;
originally announced April 2020.
-
Improving IoT Analytics through Selective Edge Execution
Authors:
A. Galanopoulos,
A. G. Tasiopoulos,
G. Iosifidis,
T. Salonidis,
D. J. Leith
Abstract:
A large number of emerging IoT applications rely on machine learning routines for analyzing data. Executing such tasks at the user devices improves response time and economizes network resources. However, due to power and computing limitations, the devices often cannot support such resource-intensive routines and fail to accurately execute the analytics. In this work, we propose to improve the per…
▽ More
A large number of emerging IoT applications rely on machine learning routines for analyzing data. Executing such tasks at the user devices improves response time and economizes network resources. However, due to power and computing limitations, the devices often cannot support such resource-intensive routines and fail to accurately execute the analytics. In this work, we propose to improve the performance of analytics by leveraging edge infrastructure. We devise an algorithm that enables the IoT devices to execute their routines locally; and then outsource them to cloudlet servers, only if they predict they will gain a significant performance improvement. It uses an approximate dual subgradient method, making minimal assumptions about the statistical properties of the system's parameters. Our analysis demonstrates that our proposed algorithm can intelligently leverage the cloudlet, adapting to the service requirements.
△ Less
Submitted 7 March, 2020;
originally announced March 2020.
-
Measurement-driven Analysis of an Edge-Assisted Object Recognition System
Authors:
A. Galanopoulos,
V. Valls,
G. Iosifidis,
D. J. Leith
Abstract:
We develop an edge-assisted object recognition system with the aim of studying the system-level trade-offs between end-to-end latency and object recognition accuracy. We focus on develo** techniques that optimize the transmission delay of the system and demonstrate the effect of image encoding rate and neural network size on these two performance metrics. We explore optimal trade-offs between th…
▽ More
We develop an edge-assisted object recognition system with the aim of studying the system-level trade-offs between end-to-end latency and object recognition accuracy. We focus on develo** techniques that optimize the transmission delay of the system and demonstrate the effect of image encoding rate and neural network size on these two performance metrics. We explore optimal trade-offs between these metrics by measuring the performance of our real time object recognition application. Our measurements reveal hitherto unknown parameter effects and sharp trade-offs, hence paving the road for optimizing this key service. Finally, we formulate two optimization problems using our measurement-based models and following a Pareto analysis we find that careful tuning of the system operation yields at least 33% better performance for real time conditions, over the standard transmission method.
△ Less
Submitted 7 March, 2020;
originally announced March 2020.
-
Learning The Best Expert Efficiently
Authors:
Daron Anderson,
Douglas J. Leith
Abstract:
We consider online learning problems where the aim is to achieve regret which is efficient in the sense that it is the same order as the lowest regret amongst K experts. This is a substantially stronger requirement that achieving $O(\sqrt{n})$ or $O(\log n)$ regret with respect to the best expert and standard algorithms are insufficient, even in easy cases where the regrets of the available action…
▽ More
We consider online learning problems where the aim is to achieve regret which is efficient in the sense that it is the same order as the lowest regret amongst K experts. This is a substantially stronger requirement that achieving $O(\sqrt{n})$ or $O(\log n)$ regret with respect to the best expert and standard algorithms are insufficient, even in easy cases where the regrets of the available actions are very different from one another. We show that a particular lazy form of the online subgradient algorithm can be used to achieve minimal regret in a number of "easy" regimes while retaining an $O(\sqrt{n})$ worst-case regret guarantee. We also show that for certain classes of problem minimal regret strategies exist for some of the remaining "hard" regimes.
△ Less
Submitted 11 November, 2019;
originally announced November 2019.
-
Low-Delay High-Rate Operation of 802.11ac WLAN Downlink: Nonlinear Controller Analysis & Design
Authors:
Francesco Gringoli,
Douglas J. Leith
Abstract:
In this paper we consider a next generation edge architecture where traffic is routed via a proxy located close to the network edge (e.g. within a cloudlet). This creates freedom to implement new transport layer behaviour over the wireless path between proxy and clients. We use this freedom to develop a novel traffic sha** controller for the downlink in 802.11ac WLANs that adjusts the send rate…
▽ More
In this paper we consider a next generation edge architecture where traffic is routed via a proxy located close to the network edge (e.g. within a cloudlet). This creates freedom to implement new transport layer behaviour over the wireless path between proxy and clients. We use this freedom to develop a novel traffic sha** controller for the downlink in 802.11ac WLANs that adjusts the send rate to each WLAN client so as to maintain a target number of packets aggregated in each transmitted frame. In this way robust low-delay operation at high data rates becomes genuinely feasible across a wide range of network conditions. Key to achieving robust operation is the design of an appropriate feedback controller, and it is this which is our focus. We develop a novel nonlinear control design inspired by the solution to an associated proportional fair optimisation problem. The controller compensates for system nonlinearities and so can be used for the full envelope of operation. The robust stability of the closed-loop system is analysed and the selection of control design parameters discussed. We develop an implementation of the nonlinear control design and use this to present a performance evaluation using both simulations and experimental measurements.
△ Less
Submitted 19 January, 2021; v1 submitted 21 October, 2019;
originally announced October 2019.
-
Optimality of the Subgradient Algorithm in the Stochastic Setting
Authors:
Daron Anderson,
Douglas Leith
Abstract:
We show that the Subgradient algorithm is universal for online learning on the simplex in the sense that it simultaneously achieves $O(\sqrt N)$ regret for adversarial costs and $O(1)$ pseudo-regret for i.i.d costs. To the best of our knowledge this is the first demonstration of a universal algorithm on the simplex that is not a variant of Hedge. Since Subgradient is a popular and widely used algo…
▽ More
We show that the Subgradient algorithm is universal for online learning on the simplex in the sense that it simultaneously achieves $O(\sqrt N)$ regret for adversarial costs and $O(1)$ pseudo-regret for i.i.d costs. To the best of our knowledge this is the first demonstration of a universal algorithm on the simplex that is not a variant of Hedge. Since Subgradient is a popular and widely used algorithm our results have immediate broad application.
△ Less
Submitted 27 November, 2020; v1 submitted 10 September, 2019;
originally announced September 2019.
-
3PS - Online Privacy through Group Identities
Authors:
Pol Mac Aonghusa,
Douglas Leith
Abstract:
Limiting online data collection to the minimum required for specific purposes is mandated by modern privacy legislation such as the General Data Protection Regulation (GDPR) and the California Consumer Protection Act. This is particularly true in online services where broad collection of personal information represents an obvious concern for privacy. We challenge the view that broad personal data…
▽ More
Limiting online data collection to the minimum required for specific purposes is mandated by modern privacy legislation such as the General Data Protection Regulation (GDPR) and the California Consumer Protection Act. This is particularly true in online services where broad collection of personal information represents an obvious concern for privacy. We challenge the view that broad personal data collection is required to provide personalised services. By first develo** formal models of privacy and utility, we show how users can obtain personalised content, while retaining an ability to plausibly deny their interests in topics they regard as sensitive using a system of proxy, group identities we call 3PS. Through extensive experiment on a prototype implementation, using openly accessible data sources, we show that 3PS provides personalised content to individual users over 98% of the time in our tests, while protecting plausible deniability effectively in the face of worst-case threats from a variety of attack types.
△ Less
Submitted 27 November, 2018;
originally announced November 2018.
-
Low Delay Scheduling of Objects Over Multiple Wireless Paths
Authors:
Kariem Fahmi,
Douglas Leith,
Stepan Kucera,
Holger Claussen
Abstract:
In this paper we consider the task of scheduling packet transmissions amongst multiple paths with uncertain, time-varying delay. We make the observation that the requirement is usually to transmit application layer objects (web pages, images, video frames etc) with low latency, and so it is the object delay rather than the per packet delay which is important. This has fundamental implications for…
▽ More
In this paper we consider the task of scheduling packet transmissions amongst multiple paths with uncertain, time-varying delay. We make the observation that the requirement is usually to transmit application layer objects (web pages, images, video frames etc) with low latency, and so it is the object delay rather than the per packet delay which is important. This has fundamental implications for multipath scheduler design. We introduce SOS (Stochastic Object-aware Scheduler), the first multipath scheduler that considers application layer object sizes and their relationship to link uncertainty. We demonstrate that SOS reduces the 95% percentile object delivery delay by 50-100% over production WiFi and LTE links compared to state-of-the art schedulers. We extend SOS to utilize FEC and to handle the scheduling multiple objects in parallel. We show that judicious priority scheduling of HTTP objects can lead to a 2-3x improvement in page load times
△ Less
Submitted 7 August, 2018;
originally announced August 2018.
-
Quick and Plenty: Achieving Low Delay and High Rate in 802.11ac Edge Networks
Authors:
Hamid Hassani,
Franceso Gringoli,
Douglas J. Leith
Abstract:
We consider transport layer approaches for achieving high rate, low delay communication over edge paths where the bottleneck is an 802.11ac WLAN. We first show that by regulating send rate so as to maintain a target aggregation level it is possible to realise high rate, low delay communication over 802.11ac WLANs. We then address two important practical issues arising in production networks, namel…
▽ More
We consider transport layer approaches for achieving high rate, low delay communication over edge paths where the bottleneck is an 802.11ac WLAN. We first show that by regulating send rate so as to maintain a target aggregation level it is possible to realise high rate, low delay communication over 802.11ac WLANs. We then address two important practical issues arising in production networks, namely that (i) many client devices are non-rooted mobile handsets/tablets and (ii) the bottleneck may lie in the backhaul rather than the WLAN, or indeed vary between the two over time. We show that both these issues can be resolved by use of simple and robust machine learning techniques. We present a prototype transport layer implementation of our low delay rate allocation approach and use this to evaluate performance under real radio conditions.
△ Less
Submitted 13 October, 2019; v1 submitted 20 June, 2018;
originally announced June 2018.
-
Joint Scheduling and Coding For Low In-Order Delivery Delay Over Lossy Paths With Delayed Feedback
Authors:
Pablo Garrido,
Douglas Leith,
Ramon Aguero
Abstract:
We consider the transmission of packets across a lossy end-to-end network path so as to achieve low in-order delivery delay. This can be formulated as a decision problem, namely deciding whether the next packet to send should be an information packet or a coded packet. Importantly, this decision is made based on delayed feedback from the receiver. While an exact solution to this decision problem i…
▽ More
We consider the transmission of packets across a lossy end-to-end network path so as to achieve low in-order delivery delay. This can be formulated as a decision problem, namely deciding whether the next packet to send should be an information packet or a coded packet. Importantly, this decision is made based on delayed feedback from the receiver. While an exact solution to this decision problem is challenging, we exploit ideas from queueing theory to derive scheduling policies based on prediction of a receiver queue length that, while suboptimal, can be efficiently implemented and offer substantially better performance than state of the art approaches. We obtain a number of useful analytic bounds that help characterise design trade-offs and our analysis highlights that the use of prediction plays a key role in achieving good performance in the presence of significant feedback delay. Our approach readily generalises to networks of paths and we illustrate this by application to multipath transport scheduler design.
△ Less
Submitted 14 December, 2018; v1 submitted 13 April, 2018;
originally announced April 2018.
-
ORLA/OLAA: Orthogonal Coexistence of LAA and WiFi in Unlicensed Spectrum
Authors:
Andres Garcia-Saavedra,
Paul Patras,
Victor Valls,
Xavier Costa-Perez,
Douglas J. Leith
Abstract:
Future mobile networks will exploit unlicensed spectrum to boost capacity and meet growing user demands cost-effectively. The 3GPP has recently defined a Licensed-Assisted Access (LAA) scheme to enable global Unlicensed LTE (U-LTE) deployment, aiming at ($i$) ensuring fair coexistence with incumbent WiFi networks, i.e., impacting on their performance no more than another WiFi device, and ($ii$) ac…
▽ More
Future mobile networks will exploit unlicensed spectrum to boost capacity and meet growing user demands cost-effectively. The 3GPP has recently defined a Licensed-Assisted Access (LAA) scheme to enable global Unlicensed LTE (U-LTE) deployment, aiming at ($i$) ensuring fair coexistence with incumbent WiFi networks, i.e., impacting on their performance no more than another WiFi device, and ($ii$) achieving superior airtime efficiency as compared to WiFi. In this paper we show the standardized LAA fails to simultaneously fulfill these objectives, and design an alternative orthogonal (collision-free) listen-before-talk coexistence paradigm that provides a substantial improvement in performance, yet imposes no penalty on existing WiFi networks. We derive two LAA optimal transmission policies, ORLA and OLAA, that maximize LAA throughput in both asynchronous and synchronous (i.e., with alignment to licensed anchor frame boundaries) modes of operation, respectively. We present a comprehensive performance evaluation through which we demonstrate that, when aggregating packets, IEEE 802.11ac WiFi can be more efficient than 3GPP LAA, whereas our proposals can attain 100% higher throughput, without harming WiFi. We further show that long U-LTE frames incur up to 92% throughput losses on WiFi when using 3GPP LAA, whilst ORLA/OLAA sustain $>$200% gains at no cost, even in the presence of non-saturated WiFi and/or in multi-rate scenarios.
△ Less
Submitted 5 February, 2018;
originally announced February 2018.
-
Multi-destination Aggregation with Binary Symmetric Broadcast Channel Based Coding in 802.11 WLANs
Authors:
Xiaomin Chen,
Douglas Leith
Abstract:
In this paper we consider the potential benefits of adopting a binary symmetric broadcast channel paradigm for multi-destination aggregation in 802.11 WLANs, as opposed to a more conventional packet erasure channel paradigm. We propose two approaches for multi-destination aggregation, i.e. superposition coding and a simpler time-sharing coding. Theoretical and simulation results for both unicast a…
▽ More
In this paper we consider the potential benefits of adopting a binary symmetric broadcast channel paradigm for multi-destination aggregation in 802.11 WLANs, as opposed to a more conventional packet erasure channel paradigm. We propose two approaches for multi-destination aggregation, i.e. superposition coding and a simpler time-sharing coding. Theoretical and simulation results for both unicast and multicast traffic demonstrate that increases in network throughput of more than 100% are possible over a wide range of network conditions and that the much simpler time-sharing scheme yields most of these gains and have minimal loss of performance. Importantly, these performance gains are achieved exclusively through software rather than hardware changes.
△ Less
Submitted 7 December, 2017;
originally announced December 2017.
-
Plausible Deniability in Web Search -- From Detection to Assessment
Authors:
Pol Mac Aonghusa,
Douglas J. Leith
Abstract:
We ask how to defend user ability to plausibly deny their interest in topics deemed sensitive in the face of search engine learning. We develop a practical and scalable tool called \PDE{} allowing a user to detect and assess threats to plausible deniability. We show that threats to plausible deniability of interest are readily detectable for all topics tested in an extensive testing program. Of pa…
▽ More
We ask how to defend user ability to plausibly deny their interest in topics deemed sensitive in the face of search engine learning. We develop a practical and scalable tool called \PDE{} allowing a user to detect and assess threats to plausible deniability. We show that threats to plausible deniability of interest are readily detectable for all topics tested in an extensive testing program. Of particular concern is observation of threats to deniability of interest in topics related to health and sexual preferences. We show this remains the case when attempting to disrupt search engine learning through noise query injection and click obfuscation. We design a defence technique exploiting uninteresting, proxy topics and show that it provides a more effective defence of plausible deniability in our experiments.
△ Less
Submitted 23 June, 2017; v1 submitted 9 March, 2017;
originally announced March 2017.
-
Optimal Differentially Private Mechanisms for Randomised Response
Authors:
Naoise Holohan,
Douglas J. Leith,
Oliver Mason
Abstract:
We examine a generalised Randomised Response (RR) technique in the context of differential privacy and examine the optimality of such mechanisms. Strict and relaxed differential privacy are considered for binary outputs. By examining the error of a statistical estimator, we present closed solutions for the optimal mechanism(s) in both cases. The optimal mechanism is also given for the specific cas…
▽ More
We examine a generalised Randomised Response (RR) technique in the context of differential privacy and examine the optimality of such mechanisms. Strict and relaxed differential privacy are considered for binary outputs. By examining the error of a statistical estimator, we present closed solutions for the optimal mechanism(s) in both cases. The optimal mechanism is also given for the specific case of the original RR technique as introduced by Warner in 1965.
△ Less
Submitted 16 December, 2016;
originally announced December 2016.
-
An Efficient Web Traffic Defence Against Timing-Analysis Attacks
Authors:
Saman Feghhi,
Douglas J. Leith
Abstract:
We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic…
▽ More
We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic load increases i.e. the tunnel is capacity-achieving. The additional latency incurred is less than 100ms. We build an experimental prototype of the tunnel and carry out an extensive performance evaluation that demonstrates its effectiveness under a range of network conditions and real web page fetches.
△ Less
Submitted 2 June, 2018; v1 submitted 23 October, 2016;
originally announced October 2016.
-
It wasn't me! Plausible Deniability in Web Search
Authors:
Pól Mac Aonghusa,
Douglas J. Leith
Abstract:
Our ability to control the flow of sensitive personal information to online systems is key to trust in personal privacy on the internet. We ask how to detect, assess and defend user privacy in the face of search engine personalisation? We develop practical and scalable tools allowing a user to detect, assess and defend against threats to plausible deniability. We show that threats to plausible den…
▽ More
Our ability to control the flow of sensitive personal information to online systems is key to trust in personal privacy on the internet. We ask how to detect, assess and defend user privacy in the face of search engine personalisation? We develop practical and scalable tools allowing a user to detect, assess and defend against threats to plausible deniability. We show that threats to plausible deniability of interest are readily detectable for all topics tested in an extensive testing program. We show this remains the case when attempting to disrupt search engine learning through noise query injection and click obfuscation are used. We use our model we design a defence technique exploiting uninteresting, proxy topics and show that it provides amore effective defence of plausible deniability in our experiments.
△ Less
Submitted 26 September, 2016;
originally announced September 2016.
-
Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi
Authors:
Cristina Cano,
Douglas J. Leith,
Andres Garcia-Saavedra,
Pablo Serrano
Abstract:
We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly with WiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this article we show tha…
▽ More
We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly with WiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this article we show that mixing scheduled and random access incurs and inherent throughput/delay cost, the cost of heterogeneity. We derive the joint proportional fair rate allocation, which casts useful light on current LTE/WiFi discussions. We present experimental results on inter-technology detection and consider the impact of imperfect carrier sensing.
△ Less
Submitted 2 May, 2016;
originally announced May 2016.
-
Proportional Fair Rate Allocation for Private Shared Networks
Authors:
Saman Feghhi,
Douglas J. Leith,
Mohammad Karzand
Abstract:
In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of the joint trade-off between privacy, throughput and delay in such a shared network as a utility fairness problem and derive the proportional fair rate allocation for networks of flows subject to privacy constraints and delay deadlines.
In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of the joint trade-off between privacy, throughput and delay in such a shared network as a utility fairness problem and derive the proportional fair rate allocation for networks of flows subject to privacy constraints and delay deadlines.
△ Less
Submitted 4 March, 2016;
originally announced March 2016.
-
srsLTE: An Open-Source Platform for LTE Evolution and Experimentation
Authors:
Ismael Gomez-Miguelez,
Andres Garcia-Saavedra,
Paul D. Sutton,
Pablo Serrano,
Cristina Cano,
Douglas J. Leith
Abstract:
Testbeds are essential for experimental evaluation as well as for product development. In the context of LTE networks, existing testbed platforms are limited either in functionality and/or extensibility or are too complex to modify and customise. In this work we present srsLTE, an open-source platform for LTE experimentation designed for maximum modularity and code reuse and fully compliant with L…
▽ More
Testbeds are essential for experimental evaluation as well as for product development. In the context of LTE networks, existing testbed platforms are limited either in functionality and/or extensibility or are too complex to modify and customise. In this work we present srsLTE, an open-source platform for LTE experimentation designed for maximum modularity and code reuse and fully compliant with LTE Release 8. We show the potential of the srsLTE library by extending the baseline code to allow LTE transmissions in the unlicensed bands and coexistence with WiFi. We also expand previous results on this emerging research area by showing how different vendor-specific mechanisms in WiFi cards might affect coexistence.
△ Less
Submitted 15 February, 2016;
originally announced February 2016.
-
Unlicensed LTE/WiFi Coexistence: Is LBT Inherently Fairer Than CSAT?
Authors:
Cristina Cano,
Douglas J. Leith
Abstract:
Ensuring fair co-existence between unlicensed LTE and WiFi networks is currently of major concern to both cellular operators and WiFi providers. Two main unlicensed LTE approaches currently being discussed, namely Carrier Sense Adaptive Transmission (CSAT) and Listen Before Talk (LBT). While these mechanisms differ in their compatibility with existing LTE specifications and regulatory compliance i…
▽ More
Ensuring fair co-existence between unlicensed LTE and WiFi networks is currently of major concern to both cellular operators and WiFi providers. Two main unlicensed LTE approaches currently being discussed, namely Carrier Sense Adaptive Transmission (CSAT) and Listen Before Talk (LBT). While these mechanisms differ in their compatibility with existing LTE specifications and regulatory compliance in different countries, they also use fundamentally different approaches to access the channel. Nevertheless, we show in this article that when optimally configured both approaches are capable of providing the same level of fairness to WiFi and that the choice between CSAT and LBT is solely driven by the LTE operator's interests.
△ Less
Submitted 19 November, 2015;
originally announced November 2015.
-
BLC: Private Matrix Factorization Recommenders via Automatic Group Learning
Authors:
Alessandro Checco,
Giuseppe Bianchi,
Doug Leith
Abstract:
We propose a privacy-enhanced matrix factorization recommender that exploits the fact that users can often be grouped together by interest. This allows a form of "hiding in the crowd" privacy. We introduce a novel matrix factorization approach suited to making recommendations in a shared group (or nym) setting and the BLC algorithm for carrying out this matrix factorization in a privacy-enhanced m…
▽ More
We propose a privacy-enhanced matrix factorization recommender that exploits the fact that users can often be grouped together by interest. This allows a form of "hiding in the crowd" privacy. We introduce a novel matrix factorization approach suited to making recommendations in a shared group (or nym) setting and the BLC algorithm for carrying out this matrix factorization in a privacy-enhanced manner. We demonstrate that the increased privacy does not come at the cost of reduced recommendation accuracy.
△ Less
Submitted 27 February, 2017; v1 submitted 18 September, 2015;
originally announced September 2015.
-
FEC for Lower In-Order Delivery Delay in Packet Networks
Authors:
Mohammad Karzand,
Douglas J. Leith,
Jason Cloud,
Muriel Medard
Abstract:
We consider use of FEC to reduce in-order delivery delay over packet erasure channels. We propose a class of streaming codes that is capacity achieving and provides a superior throughput-delay trade-off compared to block codes by introducing flexibility in where and when redundancy is placed. This flexibility results in significantly lower in-order delay for a given throughput for a wide range of…
▽ More
We consider use of FEC to reduce in-order delivery delay over packet erasure channels. We propose a class of streaming codes that is capacity achieving and provides a superior throughput-delay trade-off compared to block codes by introducing flexibility in where and when redundancy is placed. This flexibility results in significantly lower in-order delay for a given throughput for a wide range of network scenarios. Furthermore, a major contribution of this paper is the combination of queuing and coding theory to analyze the code's performance. Finally, we present simulation and experimental results illustrating the code's benefits.
△ Less
Submitted 2 September, 2016; v1 submitted 1 September, 2015;
originally announced September 2015.
-
Low Delay Random Linear Coding and Scheduling Over Multiple Interfaces
Authors:
Andres Garcia-Saavedra,
Mohammad Karzand,
Douglas J. Leith
Abstract:
Multipath transport protocols like MPTCP transfer data across multiple routes in parallel and deliver it in order at the receiver. When the delay on one or more of the paths is variable, as is commonly the case, out of order arrivals are frequent and head of line blocking leads to high latency. This is exacerbated when packet loss, which is also common with wireless links, is tackled using ARQ. Th…
▽ More
Multipath transport protocols like MPTCP transfer data across multiple routes in parallel and deliver it in order at the receiver. When the delay on one or more of the paths is variable, as is commonly the case, out of order arrivals are frequent and head of line blocking leads to high latency. This is exacerbated when packet loss, which is also common with wireless links, is tackled using ARQ. This paper introduces Stochastic Earliest Delivery Path First (S-EDPF), a resilient low delay packet scheduler for multipath transport protocols. S-EDPF takes explicit account of the stochastic nature of paths and uses this to minimise in-order delivery delay. S-EDPF also takes account of FEC, jointly scheduling transmission of information and coded packets and in this way allows lossy links to reduce delay and improve resiliency, rather than degrading performance as usually occurs with existing multipath systems. We implement S-EDPF as a multi-platform application that does not require administration privileges nor modifications to the operating system and has negligible impact on energy consumption. We present a thorough experimental evaluation in both controlled environments and into the wild, revealing dramatic gains in delay performance compared to existing approaches.
△ Less
Submitted 30 July, 2015;
originally announced July 2015.
-
Measurement-Based Modelling of LTE Performance in Dublin City
Authors:
Miguel Báguena Albaladejo,
Douglas J. Leith,
Pietro Manzoni
Abstract:
LTE/4G is the next generation of cellular network which specifically aims to improve the network performance for data traffic and is currently being rolled out by many network operators. We present results from an extensive LTE measurement campaign in Dublin, Ireland using a custom performance measurement tool. Performance data was measured at a variety of locations within the city (including cell…
▽ More
LTE/4G is the next generation of cellular network which specifically aims to improve the network performance for data traffic and is currently being rolled out by many network operators. We present results from an extensive LTE measurement campaign in Dublin, Ireland using a custom performance measurement tool. Performance data was measured at a variety of locations within the city (including cell edge locations, indoors, outdoors etc) as well as for mobile users on public transport within the city. Using this data we derive a model of the characteristics of link layer RTT and bandwidth vs link signal strength. This model is suited to use for performance evaluation of applications and services, and since it is based on real measurements it allows realistic evaluation of performance.
△ Less
Submitted 9 June, 2015;
originally announced June 2015.
-
Utility Fair Rate Allocation in LTE/802.11 Networks
Authors:
Bahar Partov,
Douglas J. Leith
Abstract:
We consider proportional fair rate allocation in a heterogeneous network with a mix of LTE and 802.11 cells which supports multipath and multihomed operation (simultaneous connection of a user device to multiple LTE BSs and 802.11 APs). We show that the utility fair optimisation problem is non-convex but that a global optimum can be found by solving a sequence of convex optimisations in a distribu…
▽ More
We consider proportional fair rate allocation in a heterogeneous network with a mix of LTE and 802.11 cells which supports multipath and multihomed operation (simultaneous connection of a user device to multiple LTE BSs and 802.11 APs). We show that the utility fair optimisation problem is non-convex but that a global optimum can be found by solving a sequence of convex optimisations in a distributed fashion. The result is a principled approach to offload from LTE to 802.11 and for exploiting LTE/802.11 path diversity to meet user traffic demands.
△ Less
Submitted 2 June, 2015;
originally announced June 2015.
-
Differentially Private Response Mechanisms on Categorical Data
Authors:
Naoise Holohan,
Doug Leith,
Oliver Mason
Abstract:
We study mechanisms for differential privacy on finite datasets. By deriving \emph{sufficient sets} for differential privacy we obtain necessary and sufficient conditions for differential privacy, a tight lower bound on the maximal expected error of a discrete mechanism and a characterisation of the optimal mechanism which minimises the maximal expected error within the class of mechanisms conside…
▽ More
We study mechanisms for differential privacy on finite datasets. By deriving \emph{sufficient sets} for differential privacy we obtain necessary and sufficient conditions for differential privacy, a tight lower bound on the maximal expected error of a discrete mechanism and a characterisation of the optimal mechanism which minimises the maximal expected error within the class of mechanisms considered.
△ Less
Submitted 27 May, 2015;
originally announced May 2015.
-
Don't let Google know I'm lonely!
Authors:
Pól Mac Aonghusa,
Douglas J. Leith
Abstract:
From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personal profiling? In particular we ask how can we improve detection of sensitive topic profiling by online systems? We propose a definition of privacy disclosure we call ε-indistinguishability from which we…
▽ More
From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personal profiling? In particular we ask how can we improve detection of sensitive topic profiling by online systems? We propose a definition of privacy disclosure we call ε-indistinguishability from which we construct scalable, practical tools to assess an adversaries learning potential. We demonstrate our results using openly available resources, detecting a learning rate in excess of 98% for a range of sensitive topics during our experiments.
△ Less
Submitted 19 August, 2016; v1 submitted 29 April, 2015;
originally announced April 2015.
-
Optimization-Based Linear Network Coding for General Connections of Continuous Flows
Authors:
Ying Cui,
Muriel Médard,
Edmund Yeh,
Douglas Leith,
Ken Duffy
Abstract:
For general connections, the problem of finding network codes and optimizing resources for those codes is intrinsically difficult and little is known about its complexity. Most of the existing solutions rely on very restricted classes of network codes in terms of the number of flows allowed to be coded together, and are not entirely distributed. In this paper, we consider a new method for construc…
▽ More
For general connections, the problem of finding network codes and optimizing resources for those codes is intrinsically difficult and little is known about its complexity. Most of the existing solutions rely on very restricted classes of network codes in terms of the number of flows allowed to be coded together, and are not entirely distributed. In this paper, we consider a new method for constructing linear network codes for general connections of continuous flows to minimize the total cost of edge use based on mixing. We first formulate the minimumcost network coding design problem. To solve the optimization problem, we propose two equivalent alternative formulations with discrete mixing and continuous mixing, respectively, and develop distributed algorithms to solve them. Our approach allows fairly general coding across flows and guarantees no greater cost than any solution without network coding.
△ Less
Submitted 27 February, 2015; v1 submitted 23 February, 2015;
originally announced February 2015.
-
A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem
Authors:
Ying Cui,
Muriel Médard,
Fan Lai,
Edmund Yeh,
Douglas Leith,
Ken Duffy,
Dhaivat Pandya
Abstract:
The problem of finding network codes for general connections is inherently difficult in capacity constrained networks. Resource minimization for general connections with network coding is further complicated. Existing methods for identifying solutions mainly rely on highly restricted classes of network codes, and are almost all centralized. In this paper, we introduce linear network mixing coeffic…
▽ More
The problem of finding network codes for general connections is inherently difficult in capacity constrained networks. Resource minimization for general connections with network coding is further complicated. Existing methods for identifying solutions mainly rely on highly restricted classes of network codes, and are almost all centralized. In this paper, we introduce linear network mixing coefficients for code constructions of general connections that generalize random linear network coding (RLNC) for multicast connections. For such code constructions, we pose the problem of cost minimization for the subgraph involved in the coding solution and relate this minimization to a path-based Constraint Satisfaction Problem (CSP) and an edge-based CSP. While CSPs are NP-complete in general, we present a path-based probabilistic distributed algorithm and an edge-based probabilistic distributed algorithm with almost sure convergence in finite time by applying Communication Free Learning (CFL). Our approach allows fairly general coding across flows, guarantees no greater cost than routing, and shows a possible distributed implementation. Numerical results illustrate the performance improvement of our approach over existing methods.
△ Less
Submitted 2 July, 2016; v1 submitted 23 February, 2015;
originally announced February 2015.
-
Rigorous and Practical Proportional-fair Allocation for Multi-rate Wi-Fi
Authors:
Paul Patras,
Andres Garcia-Saavedra,
David Malone,
Douglas J. Leith
Abstract:
Recent experimental studies confirm the prevalence of the widely known performance anomaly problem in current Wi-Fi networks, and report on the severe network utility degradation caused by this phenomenon. Although a large body of work addressed this issue, we attribute the refusal of prior solutions to their poor implementation feasibility with off-the-shelf hardware and their imprecise modelling…
▽ More
Recent experimental studies confirm the prevalence of the widely known performance anomaly problem in current Wi-Fi networks, and report on the severe network utility degradation caused by this phenomenon. Although a large body of work addressed this issue, we attribute the refusal of prior solutions to their poor implementation feasibility with off-the-shelf hardware and their imprecise modelling of the 802.11 protocol. Their applicability is further challenged today by very high throughput enhancements (802.11n/ac) whereby link speeds can vary by two orders of magnitude. Unlike earlier approaches, in this paper we introduce the first rigorous analytical model of 802.11 stations' throughput and airtime in multi-rate settings, without sacrificing accuracy for tractability. We use the proportional-fair allocation criterion to formulate network utility maximisation as a convex optimisation problem for which we give a closed-form solution. We present a fully functional light-weight implementation of our scheme on commodity access points and evaluate this extensively via experiments in a real deployment, over a broad range of network conditions. Results demonstrate that our proposal achieves up to 100\% utility gains, can double video streaming goodput and reduces TCP download times by 8x.
△ Less
Submitted 19 May, 2015; v1 submitted 24 November, 2014;
originally announced November 2014.
-
A Web Traffic Analysis Attack Using Only Timing Information
Authors:
Saman Feghhi,
Douglas J. Leith
Abstract:
We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences. In addition, unlike existing approaches this timing-only attack does not require knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the at…
▽ More
We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences. In addition, unlike existing approaches this timing-only attack does not require knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the attack against both wired and wireless traffic, achieving mean success rates in excess of 90%. In addition to being of interest in its own right, this timing-only attack serves to highlight deficiencies in existing defences and so to areas where it would be beneficial for VPN designers to focus further attention.
△ Less
Submitted 9 July, 2016; v1 submitted 8 October, 2014;
originally announced October 2014.
-
In-Order Delivery Delay of Transport Layer Coding
Authors:
Jason Cloud,
Douglas Leith,
Muriel Medard
Abstract:
A large number of streaming applications use reliable transport protocols such as TCP to deliver content over the Internet. However, head-of-line blocking due to packet loss recovery can often result in unwanted behavior and poor application layer performance. Transport layer coding can help mitigate this issue by hel** to recover from lost packets without waiting for retransmissions. We conside…
▽ More
A large number of streaming applications use reliable transport protocols such as TCP to deliver content over the Internet. However, head-of-line blocking due to packet loss recovery can often result in unwanted behavior and poor application layer performance. Transport layer coding can help mitigate this issue by hel** to recover from lost packets without waiting for retransmissions. We consider the use of an on-line network code that inserts coded packets at strategic locations within the underlying packet stream. If retransmissions are necessary, additional coding packets are transmitted to ensure the receiver's ability to decode. An analysis of this scheme is provided that helps determine both the expected in-order packet delivery delay and its variance. Numerical results are then used to determine when and how many coded packets should be inserted into the packet stream, in addition to determining the trade-offs between reducing the in-order delay and the achievable rate. The analytical results are finally compared with experimental results to provide insight into how to minimize the delay of existing transport layer protocols.
△ Less
Submitted 6 August, 2014;
originally announced August 2014.
-
Max-Weight Revisited: Sequences of Non-Convex Optimisations Solving Convex Optimisations
Authors:
Víctor Valls,
Douglas J. Leith
Abstract:
We investigate the connections between max-weight approaches and dual subgradient methods for convex optimisation. We find that strong connections exist and we establish a clean, unifying theoretical framework that includes both max-weight and dual subgradient approaches as special cases. Our analysis uses only elementary methods, and is not asymptotic in nature. It also allows us to establish an…
▽ More
We investigate the connections between max-weight approaches and dual subgradient methods for convex optimisation. We find that strong connections exist and we establish a clean, unifying theoretical framework that includes both max-weight and dual subgradient approaches as special cases. Our analysis uses only elementary methods, and is not asymptotic in nature. It also allows us to establish an explicit and direct connection between discrete queue occupancies and Lagrange multipliers.
△ Less
Submitted 26 August, 2015; v1 submitted 3 June, 2014;
originally announced June 2014.
-
Fast, Responsive Decentralised Graph Colouring
Authors:
Alessandro Checco,
Douglas J. Leith
Abstract:
We solve, in a fully decentralised way (\ie with no message passing), the classic problem of colouring a graph. We propose a novel algorithm that is automatically responsive to topology changes, and we prove that it converges quickly to a proper colouring in $O(N\log{N})$ time with high probability for generic graphs (and in $O(\log{N})$ time if $Δ=O(1)$) when the number of available colours is gr…
▽ More
We solve, in a fully decentralised way (\ie with no message passing), the classic problem of colouring a graph. We propose a novel algorithm that is automatically responsive to topology changes, and we prove that it converges quickly to a proper colouring in $O(N\log{N})$ time with high probability for generic graphs (and in $O(\log{N})$ time if $Δ=O(1)$) when the number of available colours is greater than $Δ$, the maximum degree of the graph.
We believe the proof techniques used in this work are of independent interest and provide new insight into the properties required to ensure fast convergence of decentralised algorithms.
△ Less
Submitted 2 September, 2017; v1 submitted 27 May, 2014;
originally announced May 2014.
-
A Fast Minimal Infrequent Itemset Mining Algorithm
Authors:
Kostyantyn Demchuk,
Douglas J. Leith
Abstract:
A novel fast algorithm for finding quasi identifiers in large datasets is presented. Performance measurements on a broad range of datasets demonstrate substantial reductions in run-time relative to the state of the art and the scalability of the algorithm to realistically-sized datasets up to several million records.
A novel fast algorithm for finding quasi identifiers in large datasets is presented. Performance measurements on a broad range of datasets demonstrate substantial reductions in run-time relative to the state of the art and the scalability of the algorithm to realistically-sized datasets up to several million records.
△ Less
Submitted 16 October, 2014; v1 submitted 27 March, 2014;
originally announced March 2014.
-
Differential Privacy in Metric Spaces: Numerical, Categorical and Functional Data Under the One Roof
Authors:
Naoise Holohan,
Douglas Leith,
Oliver Mason
Abstract:
We study Differential Privacy in the abstract setting of Probability on metric spaces. Numerical, categorical and functional data can be handled in a uniform manner in this setting. We demonstrate how mechanisms based on data sanitisation and those that rely on adding noise to query responses fit within this framework. We prove that once the sanitisation is differentially private, then so is the q…
▽ More
We study Differential Privacy in the abstract setting of Probability on metric spaces. Numerical, categorical and functional data can be handled in a uniform manner in this setting. We demonstrate how mechanisms based on data sanitisation and those that rely on adding noise to query responses fit within this framework. We prove that once the sanitisation is differentially private, then so is the query response for any query. We show how to construct sanitisations for high-dimensional databases using simple 1-dimensional mechanisms. We also provide lower bounds on the expected error for differentially private sanitisations in the general metric space setting. Finally, we consider the question of sufficient sets for differential privacy and show that for relaxed differential privacy, any algebra generating the Borel $σ$-algebra is a sufficient set for relaxed differential privacy.
△ Less
Submitted 25 February, 2014;
originally announced February 2014.