Skip to main content

Showing 1–50 of 69 results for author: Leith, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.00512  [pdf, other

    cs.IR

    Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders

    Authors: Sulthana Shams, Douglas Leith

    Abstract: This paper proposes a novel method for detecting shilling attacks in Matrix Factorization (MF)-based Recommender Systems (RS), in which attackers use false user-item feedback to promote a specific item. Unlike existing methods that use either use supervised learning to distinguish between attack and genuine profiles or analyse target item rating distributions to detect false ratings, our method us… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

  2. High Accuracy and Low Regret for User-Cold-Start Using Latent Bandits

    Authors: David Young, Douglas Leith

    Abstract: We develop a novel latent-bandit algorithm for tackling the cold-start problem for new users joining a recommender system. This new algorithm significantly outperforms the state of the art, simultaneously achieving both higher accuracy and lower regret.

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: 7 pages, 7 figures, Esann 2022 conference

    Journal ref: 30th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning Proceedings (2022) 423 - 428

  3. Evaluating Impact of User-Cluster Targeted Attacks in Matrix Factorisation Recommenders

    Authors: Sulthana Shams, Douglas Leith

    Abstract: In practice, users of a Recommender System (RS) fall into a few clusters based on their preferences. In this work, we conduct a systematic study on user-cluster targeted data poisoning attacks on Matrix Factorisation (MF) based RS, where an adversary injects fake users with falsely crafted user-item feedback to promote an item to a specific user cluster. We analyse how user and item feature matric… ▽ More

    Submitted 20 June, 2024; v1 submitted 8 May, 2023; originally announced May 2023.

  4. arXiv:2302.01890  [pdf, other

    cs.CR

    Android OS Privacy Under the Loupe -- A Tale from the East

    Authors: Haoyu Liu, Douglas J. Leith, Paul Patras

    Abstract: China is currently the country with the largest number of Android smartphone users. We use a combination of static and dynamic code analysis techniques to study the data transmitted by the preinstalled system apps on Android smartphones from three of the most popular vendors in China. We find that an alarming number of preinstalled system, vendor and third-party apps are granted dangerous privileg… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

  5. arXiv:2302.00358   

    cs.LG

    Bandit Convex Optimisation Revisited: FTRL Achieves $\tilde{O}(t^{1/2})$ Regret

    Authors: David Young, Douglas Leith, George Iosifidis

    Abstract: We show that a kernel estimator using multiple function evaluations can be easily converted into a sampling-based bandit estimator with expectation equal to the original kernel estimate. Plugging such a bandit estimator into the standard FTRL algorithm yields a bandit convex optimisation algorithm that achieves $\tilde{O}(t^{1/2})$ regret against adversarial time-varying convex loss functions.

    Submitted 24 June, 2023; v1 submitted 1 February, 2023; originally announced February 2023.

    Comments: Error in proof

  6. arXiv:2210.16947  [pdf, other

    cs.LG

    Two Models are Better than One: Federated Learning Is Not Private For Google GBoard Next Word Prediction

    Authors: Mohamed Suliman, Douglas Leith

    Abstract: In this paper we present new attacks against federated learning when used to train natural language text models. We illustrate the effectiveness of the attacks against the next word prediction model used in Google's GBoard app, a widely used mobile keyboard app that has been an early adopter of federated learning for production use. We demonstrate that the words a user types on their mobile handse… ▽ More

    Submitted 9 October, 2023; v1 submitted 30 October, 2022; originally announced October 2022.

    Comments: ESORICS 2023

  7. arXiv:2204.09345  [pdf, other

    cs.NI cs.LG

    Online Caching with no Regret: Optimistic Learning via Recommendations

    Authors: Naram Mhaisen, George Iosifidis, Douglas Leith

    Abstract: The design of effective online caching policies is an increasingly important problem for content distribution networks, online social networks and edge computing services, among other areas. This paper proposes a new algorithmic toolbox for tackling this problem through the lens of \emph{optimistic} online learning. We build upon the Follow-the-Regularized-Leader (FTRL) framework, which is develop… ▽ More

    Submitted 20 October, 2022; v1 submitted 20 April, 2022; originally announced April 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2202.10590

  8. arXiv:2204.02197  [pdf, other

    cs.LG cs.NI

    Penalised FTRL With Time-Varying Constraints

    Authors: Douglas J. Leith, George Iosifidis

    Abstract: In this paper we extend the classical Follow-The-Regularized-Leader (FTRL) algorithm to encompass time-varying constraints, through adaptive penalization. We establish sufficient conditions for the proposed Penalized FTRL algorithm to achieve $O(\sqrt{t})$ regret and violation with respect to strong benchmark $\hat{X}^{max}_t$. Lacking prior knowledge of the constraints, this is probably the large… ▽ More

    Submitted 6 April, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

  9. Online Caching with Optimistic Learning

    Authors: Naram Mhaisen, George Iosifidis, Douglas Leith

    Abstract: The design of effective online caching policies is an increasingly important problem for content distribution networks, online social networks and edge computing services, among other areas. This paper proposes a new algorithmic toolbox for tackling this problem through the lens of optimistic online learning. We build upon the Follow-the-Regularized-Leader (FTRL) framework which is developed furth… ▽ More

    Submitted 20 April, 2022; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: To appear in IFIP Networking 2022

  10. arXiv:2201.02890  [pdf, other

    cs.LG cs.NI stat.ML

    Lazy Lagrangians with Predictions for Online Learning

    Authors: Daron Anderson, George Iosifidis, Douglas J. Leith

    Abstract: We consider the general problem of online convex optimization with time-varying additive constraints in the presence of predictions for the next cost and constraint functions. A novel primal-dual algorithm is designed by combining a Follow-The-Regularized-Leader iteration with prediction-adaptive dynamic steps. The algorithm achieves $\mathcal O(T^{\frac{3-β}{4}})$ regret and… ▽ More

    Submitted 8 January, 2022; originally announced January 2022.

  11. arXiv:2201.02840  [pdf, other

    cs.NI cs.PF

    Selective Edge Computing for Mobile Analytics

    Authors: Apostolos Galanopoulos, George Iosifidis, Theodoros Salonidis, Douglas J. Leith

    Abstract: An increasing number of mobile applications rely on Machine Learning (ML) routines for analyzing data. Executing such tasks at the user devices saves the energy spent on transmitting and processing large data volumes at distant cloud-deployed servers. However, due to memory and computing limitations, the devices often cannot support the required resource-intensive routines and fail to accurately e… ▽ More

    Submitted 8 January, 2022; originally announced January 2022.

  12. arXiv:2101.07562  [pdf, other

    cs.NI

    Modelling Downlink Packet Aggregation in Paced 802.11ac WLANs

    Authors: Francesco Gringoli, Douglas J. Leith

    Abstract: We derive an analytic model of packet aggregation on the the downlink of an 802.11ac WLAN when packet arrivals are paced. The model is closed-form and so suitable for both analysis and design of next generation edge architectures that aim to achieve high rate and low delay. The model is validated against both simulations and experimental measurements and found to be remarkably accurate despite its… ▽ More

    Submitted 19 January, 2021; originally announced January 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1910.09651

  13. Measurement-Based Evaluation Of Google/Apple Exposure Notification API For Proximity Detection in a Commuter Bus

    Authors: Douglas J. Leith, Stephen Farrell

    Abstract: We report on the results of a measurement study carried out on a commuter bus in Dublin, Ireland using the Google/Apple Exposure Notification (GAEN) API. This API is likely to be widely used by Covid-19 contact tracing apps. Measurements were collected between 60 pairs of handset locations and are publicly available. We find that the attenuation level reported by the GAEN API need not increase wit… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

  14. arXiv:2006.06822  [pdf, other

    eess.SP cs.LG cs.NI

    Coronavirus Contact Tracing: Evaluating The Potential Of Using Bluetooth Received Signal Strength For Proximity Detection

    Authors: Douglas J. Leith, Stephen Farrell

    Abstract: We report on measurements of Bluetooth Low Energy (LE) received signal strength taken on mobile handsets in a variety of common, real-world settings. We note that a key difficulty is obtaining the ground truth as to when people are in close proximity to one another. Knowledge of this ground truth is important for accurately evaluating the accuracy with which contact events are detected by Bluetoot… ▽ More

    Submitted 19 May, 2020; originally announced June 2020.

  15. arXiv:2004.01739  [pdf, other

    cs.LG stat.ML

    Lazy Online Gradient Descent is Universal on Polytopes

    Authors: Daron Anderson, Douglas Leith

    Abstract: We prove the familiar Lazy Online Gradient Descent algorithm is universal on polytope domains. That means it gets $O(1)$ pseudo-regret against i.i.d opponents, while simultaneously achieving the well-known $O(\sqrt N)$ worst-case regret bound. For comparison the bulk of the literature focuses on variants of the Hedge (exponential weights) algorithm on the simplex. These can in principle be lifted… ▽ More

    Submitted 31 August, 2022; v1 submitted 3 April, 2020; originally announced April 2020.

    Comments: 1 figure, 37 pages

    MSC Class: 68W27 ACM Class: F.2.2; G.1.6; I.2.6

  16. arXiv:2003.03588  [pdf, ps, other

    cs.NI cs.LG

    Improving IoT Analytics through Selective Edge Execution

    Authors: A. Galanopoulos, A. G. Tasiopoulos, G. Iosifidis, T. Salonidis, D. J. Leith

    Abstract: A large number of emerging IoT applications rely on machine learning routines for analyzing data. Executing such tasks at the user devices improves response time and economizes network resources. However, due to power and computing limitations, the devices often cannot support such resource-intensive routines and fail to accurately execute the analytics. In this work, we propose to improve the per… ▽ More

    Submitted 7 March, 2020; originally announced March 2020.

    Comments: 7 pages, 6 figures. This paper has been accepted for publication in the Proceedings of IEEE International Conference on Communications (ICC) 2020

  17. arXiv:2003.03584  [pdf, ps, other

    cs.NI cs.LG

    Measurement-driven Analysis of an Edge-Assisted Object Recognition System

    Authors: A. Galanopoulos, V. Valls, G. Iosifidis, D. J. Leith

    Abstract: We develop an edge-assisted object recognition system with the aim of studying the system-level trade-offs between end-to-end latency and object recognition accuracy. We focus on develo** techniques that optimize the transmission delay of the system and demonstrate the effect of image encoding rate and neural network size on these two performance metrics. We explore optimal trade-offs between th… ▽ More

    Submitted 7 March, 2020; originally announced March 2020.

    Comments: 7 pages, 9 figures. This paper has been accepted for publication in the Proceedings of IEEE International Conference on Communications (ICC) 2020

  18. arXiv:1911.04307  [pdf, ps, other

    cs.LG stat.ML

    Learning The Best Expert Efficiently

    Authors: Daron Anderson, Douglas J. Leith

    Abstract: We consider online learning problems where the aim is to achieve regret which is efficient in the sense that it is the same order as the lowest regret amongst K experts. This is a substantially stronger requirement that achieving $O(\sqrt{n})$ or $O(\log n)$ regret with respect to the best expert and standard algorithms are insufficient, even in easy cases where the regrets of the available action… ▽ More

    Submitted 11 November, 2019; originally announced November 2019.

  19. arXiv:1910.09651  [pdf, other

    cs.NI eess.SY

    Low-Delay High-Rate Operation of 802.11ac WLAN Downlink: Nonlinear Controller Analysis & Design

    Authors: Francesco Gringoli, Douglas J. Leith

    Abstract: In this paper we consider a next generation edge architecture where traffic is routed via a proxy located close to the network edge (e.g. within a cloudlet). This creates freedom to implement new transport layer behaviour over the wireless path between proxy and clients. We use this freedom to develop a novel traffic sha** controller for the downlink in 802.11ac WLANs that adjusts the send rate… ▽ More

    Submitted 19 January, 2021; v1 submitted 21 October, 2019; originally announced October 2019.

  20. arXiv:1909.05007  [pdf, other

    math.ST cs.DS cs.LG eess.SY math.OC math.PR stat.ML

    Optimality of the Subgradient Algorithm in the Stochastic Setting

    Authors: Daron Anderson, Douglas Leith

    Abstract: We show that the Subgradient algorithm is universal for online learning on the simplex in the sense that it simultaneously achieves $O(\sqrt N)$ regret for adversarial costs and $O(1)$ pseudo-regret for i.i.d costs. To the best of our knowledge this is the first demonstration of a universal algorithm on the simplex that is not a variant of Hedge. Since Subgradient is a popular and widely used algo… ▽ More

    Submitted 27 November, 2020; v1 submitted 10 September, 2019; originally announced September 2019.

    Comments: 6 figures, Corrected off-by-one errors coming from proof in Appendix A. Replaced with newer Version April 2020

    MSC Class: 68W27 ACM Class: F.2.2; G.1.6; I.2.6

  21. arXiv:1811.11039  [pdf, other

    cs.CR

    3PS - Online Privacy through Group Identities

    Authors: Pol Mac Aonghusa, Douglas Leith

    Abstract: Limiting online data collection to the minimum required for specific purposes is mandated by modern privacy legislation such as the General Data Protection Regulation (GDPR) and the California Consumer Protection Act. This is particularly true in online services where broad collection of personal information represents an obvious concern for privacy. We challenge the view that broad personal data… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: 14 pages

  22. arXiv:1808.02418  [pdf, other

    cs.NI

    Low Delay Scheduling of Objects Over Multiple Wireless Paths

    Authors: Kariem Fahmi, Douglas Leith, Stepan Kucera, Holger Claussen

    Abstract: In this paper we consider the task of scheduling packet transmissions amongst multiple paths with uncertain, time-varying delay. We make the observation that the requirement is usually to transmit application layer objects (web pages, images, video frames etc) with low latency, and so it is the object delay rather than the per packet delay which is important. This has fundamental implications for… ▽ More

    Submitted 7 August, 2018; originally announced August 2018.

  23. arXiv:1806.07761  [pdf, other

    cs.NI

    Quick and Plenty: Achieving Low Delay and High Rate in 802.11ac Edge Networks

    Authors: Hamid Hassani, Franceso Gringoli, Douglas J. Leith

    Abstract: We consider transport layer approaches for achieving high rate, low delay communication over edge paths where the bottleneck is an 802.11ac WLAN. We first show that by regulating send rate so as to maintain a target aggregation level it is possible to realise high rate, low delay communication over 802.11ac WLANs. We then address two important practical issues arising in production networks, namel… ▽ More

    Submitted 13 October, 2019; v1 submitted 20 June, 2018; originally announced June 2018.

  24. arXiv:1804.04921  [pdf, ps, other

    cs.NI

    Joint Scheduling and Coding For Low In-Order Delivery Delay Over Lossy Paths With Delayed Feedback

    Authors: Pablo Garrido, Douglas Leith, Ramon Aguero

    Abstract: We consider the transmission of packets across a lossy end-to-end network path so as to achieve low in-order delivery delay. This can be formulated as a decision problem, namely deciding whether the next packet to send should be an information packet or a coded packet. Importantly, this decision is made based on delayed feedback from the receiver. While an exact solution to this decision problem i… ▽ More

    Submitted 14 December, 2018; v1 submitted 13 April, 2018; originally announced April 2018.

  25. arXiv:1802.01360  [pdf, other

    cs.NI

    ORLA/OLAA: Orthogonal Coexistence of LAA and WiFi in Unlicensed Spectrum

    Authors: Andres Garcia-Saavedra, Paul Patras, Victor Valls, Xavier Costa-Perez, Douglas J. Leith

    Abstract: Future mobile networks will exploit unlicensed spectrum to boost capacity and meet growing user demands cost-effectively. The 3GPP has recently defined a Licensed-Assisted Access (LAA) scheme to enable global Unlicensed LTE (U-LTE) deployment, aiming at ($i$) ensuring fair coexistence with incumbent WiFi networks, i.e., impacting on their performance no more than another WiFi device, and ($ii$) ac… ▽ More

    Submitted 5 February, 2018; originally announced February 2018.

    Comments: 14 pages, 7 figures, submitted to IEEE/ACM Transactions on Networking

  26. arXiv:1712.02718  [pdf, ps, other

    cs.NI

    Multi-destination Aggregation with Binary Symmetric Broadcast Channel Based Coding in 802.11 WLANs

    Authors: Xiaomin Chen, Douglas Leith

    Abstract: In this paper we consider the potential benefits of adopting a binary symmetric broadcast channel paradigm for multi-destination aggregation in 802.11 WLANs, as opposed to a more conventional packet erasure channel paradigm. We propose two approaches for multi-destination aggregation, i.e. superposition coding and a simpler time-sharing coding. Theoretical and simulation results for both unicast a… ▽ More

    Submitted 7 December, 2017; originally announced December 2017.

  27. arXiv:1703.03471  [pdf, other

    cs.CR

    Plausible Deniability in Web Search -- From Detection to Assessment

    Authors: Pol Mac Aonghusa, Douglas J. Leith

    Abstract: We ask how to defend user ability to plausibly deny their interest in topics deemed sensitive in the face of search engine learning. We develop a practical and scalable tool called \PDE{} allowing a user to detect and assess threats to plausible deniability. We show that threats to plausible deniability of interest are readily detectable for all topics tested in an extensive testing program. Of pa… ▽ More

    Submitted 23 June, 2017; v1 submitted 9 March, 2017; originally announced March 2017.

    Comments: 14 pages, 1 figure. arXiv admin note: substantial text overlap with arXiv:1609.07922

  28. Optimal Differentially Private Mechanisms for Randomised Response

    Authors: Naoise Holohan, Douglas J. Leith, Oliver Mason

    Abstract: We examine a generalised Randomised Response (RR) technique in the context of differential privacy and examine the optimality of such mechanisms. Strict and relaxed differential privacy are considered for binary outputs. By examining the error of a statistical estimator, we present closed solutions for the optimal mechanism(s) in both cases. The optimal mechanism is also given for the specific cas… ▽ More

    Submitted 16 December, 2016; originally announced December 2016.

  29. arXiv:1610.07141  [pdf, ps, other

    cs.NI

    An Efficient Web Traffic Defence Against Timing-Analysis Attacks

    Authors: Saman Feghhi, Douglas J. Leith

    Abstract: We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic… ▽ More

    Submitted 2 June, 2018; v1 submitted 23 October, 2016; originally announced October 2016.

  30. arXiv:1609.07922  [pdf, other

    cs.CR cs.CY

    It wasn't me! Plausible Deniability in Web Search

    Authors: Pól Mac Aonghusa, Douglas J. Leith

    Abstract: Our ability to control the flow of sensitive personal information to online systems is key to trust in personal privacy on the internet. We ask how to detect, assess and defend user privacy in the face of search engine personalisation? We develop practical and scalable tools allowing a user to detect, assess and defend against threats to plausible deniability. We show that threats to plausible den… ▽ More

    Submitted 26 September, 2016; originally announced September 2016.

    Comments: 34 pages, 1 figure

  31. arXiv:1605.00409  [pdf, ps, other

    cs.NI

    Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi

    Authors: Cristina Cano, Douglas J. Leith, Andres Garcia-Saavedra, Pablo Serrano

    Abstract: We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly with WiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this article we show tha… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

    Comments: 14 pages, 8 figures, journal

  32. arXiv:1603.01392  [pdf, ps, other

    cs.NI

    Proportional Fair Rate Allocation for Private Shared Networks

    Authors: Saman Feghhi, Douglas J. Leith, Mohammad Karzand

    Abstract: In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of the joint trade-off between privacy, throughput and delay in such a shared network as a utility fairness problem and derive the proportional fair rate allocation for networks of flows subject to privacy constraints and delay deadlines.

    Submitted 4 March, 2016; originally announced March 2016.

  33. arXiv:1602.04629  [pdf, ps, other

    cs.NI

    srsLTE: An Open-Source Platform for LTE Evolution and Experimentation

    Authors: Ismael Gomez-Miguelez, Andres Garcia-Saavedra, Paul D. Sutton, Pablo Serrano, Cristina Cano, Douglas J. Leith

    Abstract: Testbeds are essential for experimental evaluation as well as for product development. In the context of LTE networks, existing testbed platforms are limited either in functionality and/or extensibility or are too complex to modify and customise. In this work we present srsLTE, an open-source platform for LTE experimentation designed for maximum modularity and code reuse and fully compliant with L… ▽ More

    Submitted 15 February, 2016; originally announced February 2016.

    Comments: 7 pages, 5 figures

  34. arXiv:1511.06244  [pdf, ps, other

    cs.NI

    Unlicensed LTE/WiFi Coexistence: Is LBT Inherently Fairer Than CSAT?

    Authors: Cristina Cano, Douglas J. Leith

    Abstract: Ensuring fair co-existence between unlicensed LTE and WiFi networks is currently of major concern to both cellular operators and WiFi providers. Two main unlicensed LTE approaches currently being discussed, namely Carrier Sense Adaptive Transmission (CSAT) and Listen Before Talk (LBT). While these mechanisms differ in their compatibility with existing LTE specifications and regulatory compliance i… ▽ More

    Submitted 19 November, 2015; originally announced November 2015.

    Comments: 6 pages, 3 figures

  35. arXiv:1509.05789  [pdf, other

    cs.LG stat.ML

    BLC: Private Matrix Factorization Recommenders via Automatic Group Learning

    Authors: Alessandro Checco, Giuseppe Bianchi, Doug Leith

    Abstract: We propose a privacy-enhanced matrix factorization recommender that exploits the fact that users can often be grouped together by interest. This allows a form of "hiding in the crowd" privacy. We introduce a novel matrix factorization approach suited to making recommendations in a shared group (or nym) setting and the BLC algorithm for carrying out this matrix factorization in a privacy-enhanced m… ▽ More

    Submitted 27 February, 2017; v1 submitted 18 September, 2015; originally announced September 2015.

  36. arXiv:1509.00167  [pdf, ps, other

    cs.IT

    FEC for Lower In-Order Delivery Delay in Packet Networks

    Authors: Mohammad Karzand, Douglas J. Leith, Jason Cloud, Muriel Medard

    Abstract: We consider use of FEC to reduce in-order delivery delay over packet erasure channels. We propose a class of streaming codes that is capacity achieving and provides a superior throughput-delay trade-off compared to block codes by introducing flexibility in where and when redundancy is placed. This flexibility results in significantly lower in-order delay for a given throughput for a wide range of… ▽ More

    Submitted 2 September, 2016; v1 submitted 1 September, 2015; originally announced September 2015.

  37. arXiv:1507.08499  [pdf, ps, other

    cs.NI cs.IT cs.PF

    Low Delay Random Linear Coding and Scheduling Over Multiple Interfaces

    Authors: Andres Garcia-Saavedra, Mohammad Karzand, Douglas J. Leith

    Abstract: Multipath transport protocols like MPTCP transfer data across multiple routes in parallel and deliver it in order at the receiver. When the delay on one or more of the paths is variable, as is commonly the case, out of order arrivals are frequent and head of line blocking leads to high latency. This is exacerbated when packet loss, which is also common with wireless links, is tackled using ARQ. Th… ▽ More

    Submitted 30 July, 2015; originally announced July 2015.

  38. arXiv:1506.02804  [pdf, ps, other

    cs.NI

    Measurement-Based Modelling of LTE Performance in Dublin City

    Authors: Miguel Báguena Albaladejo, Douglas J. Leith, Pietro Manzoni

    Abstract: LTE/4G is the next generation of cellular network which specifically aims to improve the network performance for data traffic and is currently being rolled out by many network operators. We present results from an extensive LTE measurement campaign in Dublin, Ireland using a custom performance measurement tool. Performance data was measured at a variety of locations within the city (including cell… ▽ More

    Submitted 9 June, 2015; originally announced June 2015.

  39. Utility Fair Rate Allocation in LTE/802.11 Networks

    Authors: Bahar Partov, Douglas J. Leith

    Abstract: We consider proportional fair rate allocation in a heterogeneous network with a mix of LTE and 802.11 cells which supports multipath and multihomed operation (simultaneous connection of a user device to multiple LTE BSs and 802.11 APs). We show that the utility fair optimisation problem is non-convex but that a global optimum can be found by solving a sequence of convex optimisations in a distribu… ▽ More

    Submitted 2 June, 2015; originally announced June 2015.

    Comments: 13 pages, submitted to IEEE/ACM Transactions on Networking

  40. arXiv:1505.07254  [pdf, ps, other

    cs.DM cs.CR math.CO

    Differentially Private Response Mechanisms on Categorical Data

    Authors: Naoise Holohan, Doug Leith, Oliver Mason

    Abstract: We study mechanisms for differential privacy on finite datasets. By deriving \emph{sufficient sets} for differential privacy we obtain necessary and sufficient conditions for differential privacy, a tight lower bound on the maximal expected error of a discrete mechanism and a characterisation of the optimal mechanism which minimises the maximal expected error within the class of mechanisms conside… ▽ More

    Submitted 27 May, 2015; originally announced May 2015.

    MSC Class: 68R01; 68R05; 60C05

  41. arXiv:1504.08043  [pdf, other

    cs.CR cs.SI

    Don't let Google know I'm lonely!

    Authors: Pól Mac Aonghusa, Douglas J. Leith

    Abstract: From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personal profiling? In particular we ask how can we improve detection of sensitive topic profiling by online systems? We propose a definition of privacy disclosure we call ε-indistinguishability from which we… ▽ More

    Submitted 19 August, 2016; v1 submitted 29 April, 2015; originally announced April 2015.

    Comments: 26 pages, 7 figures in ACM Transactions on Privacy and Security (TOPS), Volume 19 Issue 1, August 2016

  42. arXiv:1502.06601  [pdf, ps, other

    cs.IT

    Optimization-Based Linear Network Coding for General Connections of Continuous Flows

    Authors: Ying Cui, Muriel Médard, Edmund Yeh, Douglas Leith, Ken Duffy

    Abstract: For general connections, the problem of finding network codes and optimizing resources for those codes is intrinsically difficult and little is known about its complexity. Most of the existing solutions rely on very restricted classes of network codes in terms of the number of flows allowed to be coded together, and are not entirely distributed. In this paper, we consider a new method for construc… ▽ More

    Submitted 27 February, 2015; v1 submitted 23 February, 2015; originally announced February 2015.

    Comments: 1 fig, technical report of ICC 2015

  43. arXiv:1502.06321  [pdf, ps, other

    cs.IT

    A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem

    Authors: Ying Cui, Muriel Médard, Fan Lai, Edmund Yeh, Douglas Leith, Ken Duffy, Dhaivat Pandya

    Abstract: The problem of finding network codes for general connections is inherently difficult in capacity constrained networks. Resource minimization for general connections with network coding is further complicated. Existing methods for identifying solutions mainly rely on highly restricted classes of network codes, and are almost all centralized. In this paper, we introduce linear network mixing coeffic… ▽ More

    Submitted 2 July, 2016; v1 submitted 23 February, 2015; originally announced February 2015.

    Comments: submitted to TON (conference version published at IEEE GLOBECOM 2015)

  44. arXiv:1411.6685  [pdf, ps, other

    cs.NI

    Rigorous and Practical Proportional-fair Allocation for Multi-rate Wi-Fi

    Authors: Paul Patras, Andres Garcia-Saavedra, David Malone, Douglas J. Leith

    Abstract: Recent experimental studies confirm the prevalence of the widely known performance anomaly problem in current Wi-Fi networks, and report on the severe network utility degradation caused by this phenomenon. Although a large body of work addressed this issue, we attribute the refusal of prior solutions to their poor implementation feasibility with off-the-shelf hardware and their imprecise modelling… ▽ More

    Submitted 19 May, 2015; v1 submitted 24 November, 2014; originally announced November 2014.

    Comments: 21 pages, 11 figures

  45. arXiv:1410.2087  [pdf, ps, other

    cs.NI

    A Web Traffic Analysis Attack Using Only Timing Information

    Authors: Saman Feghhi, Douglas J. Leith

    Abstract: We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences. In addition, unlike existing approaches this timing-only attack does not require knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the at… ▽ More

    Submitted 9 July, 2016; v1 submitted 8 October, 2014; originally announced October 2014.

  46. arXiv:1408.1440  [pdf, ps, other

    cs.IT cs.NI

    In-Order Delivery Delay of Transport Layer Coding

    Authors: Jason Cloud, Douglas Leith, Muriel Medard

    Abstract: A large number of streaming applications use reliable transport protocols such as TCP to deliver content over the Internet. However, head-of-line blocking due to packet loss recovery can often result in unwanted behavior and poor application layer performance. Transport layer coding can help mitigate this issue by hel** to recover from lost packets without waiting for retransmissions. We conside… ▽ More

    Submitted 6 August, 2014; originally announced August 2014.

  47. arXiv:1406.0899  [pdf, ps, other

    math.OC cs.IT

    Max-Weight Revisited: Sequences of Non-Convex Optimisations Solving Convex Optimisations

    Authors: Víctor Valls, Douglas J. Leith

    Abstract: We investigate the connections between max-weight approaches and dual subgradient methods for convex optimisation. We find that strong connections exist and we establish a clean, unifying theoretical framework that includes both max-weight and dual subgradient approaches as special cases. Our analysis uses only elementary methods, and is not asymptotic in nature. It also allows us to establish an… ▽ More

    Submitted 26 August, 2015; v1 submitted 3 June, 2014; originally announced June 2014.

    Comments: convex optimisation, max-weight scheduling, backpressure, subgradient methods

  48. arXiv:1405.6987  [pdf, other

    cs.DS

    Fast, Responsive Decentralised Graph Colouring

    Authors: Alessandro Checco, Douglas J. Leith

    Abstract: We solve, in a fully decentralised way (\ie with no message passing), the classic problem of colouring a graph. We propose a novel algorithm that is automatically responsive to topology changes, and we prove that it converges quickly to a proper colouring in $O(N\log{N})$ time with high probability for generic graphs (and in $O(\log{N})$ time if $Δ=O(1)$) when the number of available colours is gr… ▽ More

    Submitted 2 September, 2017; v1 submitted 27 May, 2014; originally announced May 2014.

  49. arXiv:1403.6985  [pdf, other

    cs.DB

    A Fast Minimal Infrequent Itemset Mining Algorithm

    Authors: Kostyantyn Demchuk, Douglas J. Leith

    Abstract: A novel fast algorithm for finding quasi identifiers in large datasets is presented. Performance measurements on a broad range of datasets demonstrate substantial reductions in run-time relative to the state of the art and the scalability of the algorithm to realistically-sized datasets up to several million records.

    Submitted 16 October, 2014; v1 submitted 27 March, 2014; originally announced March 2014.

  50. arXiv:1402.6124  [pdf, ps, other

    cs.DB cs.IT math.PR

    Differential Privacy in Metric Spaces: Numerical, Categorical and Functional Data Under the One Roof

    Authors: Naoise Holohan, Douglas Leith, Oliver Mason

    Abstract: We study Differential Privacy in the abstract setting of Probability on metric spaces. Numerical, categorical and functional data can be handled in a uniform manner in this setting. We demonstrate how mechanisms based on data sanitisation and those that rely on adding noise to query responses fit within this framework. We prove that once the sanitisation is differentially private, then so is the q… ▽ More

    Submitted 25 February, 2014; originally announced February 2014.

    Comments: 18 Pages