Skip to main content

Showing 1–29 of 29 results for author: Leontiadis, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.12997  [pdf, other

    cs.LG cs.AI cs.CR

    Evaluating Privacy Leakage in Split Learning

    Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock

    Abstract: Privacy-Preserving machine learning (PPML) can help us train and deploy models that utilize private information. In particular, on-device machine learning allows us to avoid sharing raw data with a third-party server during inference. On-device models are typically less accurate when compared to their server counterparts due to the fact that (1) they typically only rely on a small set of on-device… ▽ More

    Submitted 19 January, 2024; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: 10 pages

  2. arXiv:2301.10904  [pdf, other

    cs.CR cs.DC cs.LG

    GPU-based Private Information Retrieval for On-Device Machine Learning Inference

    Authors: Maximilian Lam, Jeff Johnson, Wenjie Xiong, Kiwan Maeng, Udit Gupta, Yang Li, Liangzhen Lai, Ilias Leontiadis, Minsoo Rhu, Hsien-Hsin S. Lee, Vijay Janapa Reddi, Gu-Yeon Wei, David Brooks, G. Edward Suh

    Abstract: On-device machine learning (ML) inference can enable the use of private user data on user devices without revealing them to remote servers. However, a pure on-device solution to private ML inference is impractical for many applications that rely on embedding tables that are too large to be stored on-device. In particular, recommendation models typically use multiple embedding tables each on the or… ▽ More

    Submitted 25 September, 2023; v1 submitted 25 January, 2023; originally announced January 2023.

  3. arXiv:2206.03852  [pdf, other

    cs.IR cs.LG

    FEL: High Capacity Learning for Recommendation and Ranking via Federated Ensemble Learning

    Authors: Meisam Hejazinia, Dzmitry Huba, Ilias Leontiadis, Kiwan Maeng, Mani Malek, Luca Melis, Ilya Mironov, Milad Nasr, Kaikai Wang, Carole-Jean Wu

    Abstract: Federated learning (FL) has emerged as an effective approach to address consumer privacy needs. FL has been successfully applied to certain machine learning tasks, such as training smart keyboard models and keyword spotting. Despite FL's initial success, many important deep learning use cases, such as ranking and recommendation tasks, have been limited from on-device learning. One of the key chall… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

  4. arXiv:2109.13963  [pdf, other

    cs.LG cs.PF

    Smart at what cost? Characterising Mobile Deep Neural Networks in the wild

    Authors: Mario Almeida, Stefanos Laskaridis, Abhinav Mehrotra, Lukasz Dudziak, Ilias Leontiadis, Nicholas D. Lane

    Abstract: With smartphones' omnipresence in people's pockets, Machine Learning (ML) on mobile is gaining traction as devices become more powerful. With applications ranging from visual filters to voice assistants, intelligence on mobile comes in many forms and facets. However, Deep Neural Network (DNN) inference remains a compute intensive workload, with devices struggling to support intelligence at the cos… ▽ More

    Submitted 28 September, 2021; originally announced September 2021.

    Comments: Accepted at the ACM Internet Measurement Conference (IMC), 2021

  5. arXiv:2106.15021  [pdf, other

    cs.LG cs.AR cs.CV

    How to Reach Real-Time AI on Consumer Devices? Solutions for Programmable and Custom Architectures

    Authors: Stylianos I. Venieris, Ioannis Panopoulos, Ilias Leontiadis, Iakovos S. Venieris

    Abstract: The unprecedented performance of deep neural networks (DNNs) has led to large strides in various Artificial Intelligence (AI) inference tasks, such as object and speech recognition. Nevertheless, deploying such AI models across commodity devices faces significant challenges: large computational cost, multiple performance objectives, hardware heterogeneity and a common need for high accuracy, toget… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

    Comments: Invited paper at the 32nd IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP), 2021

  6. arXiv:2104.09949  [pdf, other

    cs.DC cs.CV cs.LG

    DynO: Dynamic Onloading of Deep Neural Networks from Cloud to Device

    Authors: Mario Almeida, Stefanos Laskaridis, Stylianos I. Venieris, Ilias Leontiadis, Nicholas D. Lane

    Abstract: Recently, there has been an explosive growth of mobile and embedded applications using convolutional neural networks(CNNs). To alleviate their excessive computational demands, developers have traditionally resorted to cloud offloading, inducing high infrastructure costs and a strong dependence on networking conditions. On the other end, the emergence of powerful SoCs is gradually enabling on-devic… ▽ More

    Submitted 11 January, 2022; v1 submitted 20 April, 2021; originally announced April 2021.

    Comments: Accepted for publication at the ACM Transactions on Embedded Computing Systems (TECS) in the special issue on Accelerating AI on the Edge

  7. arXiv:2102.13451  [pdf, other

    cs.LG cs.DC

    FjORD: Fair and Accurate Federated Learning under heterogeneous targets with Ordered Dropout

    Authors: Samuel Horvath, Stefanos Laskaridis, Mario Almeida, Ilias Leontiadis, Stylianos I. Venieris, Nicholas D. Lane

    Abstract: Federated Learning (FL) has been gaining significant traction across different ML tasks, ranging from vision to keyboard predictions. In large-scale deployments, client heterogeneity is a fact and constitutes a primary problem for fairness, training performance and accuracy. Although significant efforts have been made into tackling statistical data heterogeneity, the diversity in the processing ca… ▽ More

    Submitted 11 January, 2022; v1 submitted 26 February, 2021; originally announced February 2021.

    Comments: Accepted at the 35th Conference on Neural Information Processing Systems (NeurIPS), 2021

  8. It's always personal: Using Early Exits for Efficient On-Device CNN Personalisation

    Authors: Ilias Leontiadis, Stefanos Laskaridis, Stylianos I. Venieris, Nicholas D. Lane

    Abstract: On-device machine learning is becoming a reality thanks to the availability of powerful hardware and model compression techniques. Typically, these models are pretrained on large GPU clusters and have enough parameters to generalise across a wide variety of inputs. In this work, we observe that a much smaller, personalised model can be employed to fit a specific scenario, resulting in both higher… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

    Comments: Accepted at the 22nd International Workshop on Mobile Computing Systems and Applications (HotMobile), 2021

  9. arXiv:2008.06402  [pdf, other

    cs.LG cs.CV cs.DC stat.ML

    SPINN: Synergistic Progressive Inference of Neural Networks over Device and Cloud

    Authors: Stefanos Laskaridis, Stylianos I. Venieris, Mario Almeida, Ilias Leontiadis, Nicholas D. Lane

    Abstract: Despite the soaring use of convolutional neural networks (CNNs) in mobile applications, uniformly sustaining high-performance inference on mobile has been elusive due to the excessive computational demands of modern CNNs and the increasing diversity of deployed devices. A popular alternative comprises offloading CNN processing to powerful cloud-based servers. Nevertheless, by relying on the cloud… ▽ More

    Submitted 24 August, 2020; v1 submitted 14 August, 2020; originally announced August 2020.

    Comments: Accepted at the 26th Annual International Conference on Mobile Computing and Networking (MobiCom), 2020

  10. arXiv:2004.13239  [pdf, other

    cs.CR cs.NI

    A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web

    Authors: Ralph Holz, Diego Perino, Matteo Varvello, Johanna Amann, Andrea Continella, Nate Evans, Ilias Leontiadis, Christopher Natoli, Quirin Scheitle

    Abstract: In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code and developed defenses. However, previous work did not establish how many users were really exposed to the identified mining sites and whether there was a real ri… ▽ More

    Submitted 25 June, 2020; v1 submitted 27 April, 2020; originally announced April 2020.

  11. arXiv:2004.05703  [pdf, other

    cs.LG cs.CR stat.ML

    DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

    Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi

    Abstract: We present DarkneTZ, a framework that uses an edge device's Trusted Execution Environment (TEE) in conjunction with model partitioning to limit the attack surface against Deep Neural Networks (DNNs). Increasingly, edge devices (smartphones and consumer IoT devices) are equipped with pre-trained DNNs for a variety of applications. This trend comes with privacy risks as models can leak information a… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

    Comments: 13 pages, 8 figures, accepted to ACM MobiSys 2020

  12. arXiv:1907.08873  [pdf, other

    cs.SI cs.CY cs.IR

    Detecting Cyberbullying and Cyberaggression in Social Media

    Authors: Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis

    Abstract: Cyberbullying and cyberaggression are increasingly worrisome phenomena affecting people across all demographics. More than half of young social media users worldwide have been exposed to such prolonged and/or coordinated digital harassment. Victims can experience a wide range of emotions, with negative consequences such as embarrassment, depression, isolation from other community members, which em… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: To appear in ACM Transactions on the Web (TWEB)

  13. arXiv:1905.07346  [pdf, other

    cs.LG cs.PF stat.ML

    EmBench: Quantifying Performance Variations of Deep Neural Networks across Modern Commodity Devices

    Authors: Mario Almeida, Stefanos Laskaridis, Ilias Leontiadis, Stylianos I. Venieris, Nicholas D. Lane

    Abstract: In recent years, advances in deep learning have resulted in unprecedented leaps in diverse tasks spanning from speech and object recognition to context awareness and health monitoring. As a result, an increasing number of AI-enabled applications are being developed targeting ubiquitous and mobile devices. While deep neural networks (DNNs) are getting bigger and more complex, they also impose a hea… ▽ More

    Submitted 17 May, 2019; originally announced May 2019.

    Comments: Accepted at MobiSys 2019: 3rd International Workshop on Embedded and Mobile Deep Learning (EMDL), 2019

  14. arXiv:1905.01972  [pdf, other

    cs.CL cs.LG stat.ML

    A Self-Attentive Emotion Recognition Network

    Authors: Harris Partaourides, Kostantinos Papadamou, Nicolas Kourtellis, Ilias Leontiadis, Sotirios Chatzis

    Abstract: Modern deep learning approaches have achieved groundbreaking performance in modeling and classifying sequential data. Specifically, attention networks constitute the state-of-the-art paradigm for capturing long temporal dynamics. This paper examines the efficacy of this paradigm in the challenging task of emotion recognition in dyadic conversations. In contrast to existing approaches, our work int… ▽ More

    Submitted 24 April, 2019; originally announced May 2019.

  15. arXiv:1901.07046  [pdf, other

    cs.SI cs.CY

    Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children

    Authors: Kostantinos Papadamou, Antonis Papasavva, Savvas Zannettou, Jeremy Blackburn, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Michael Sirivianos

    Abstract: A large number of the most-subscribed YouTube channels target children of a very young age. Hundreds of toddler-oriented channels on YouTube feature inoffensive, well-produced, and educational videos. Unfortunately, inappropriate content that targets this demographic is also common. YouTube's algorithmic recommendation system regrettably suggests inappropriate content because some of it mimics or… ▽ More

    Submitted 16 September, 2021; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: Published at the 14th International Conference on Web and Social Media (ICWSM 2020). Please cite the ICWSM version

  16. arXiv:1809.09684  [pdf, other

    cs.CR cs.SI

    LOBO -- Evaluation of Generalization Deficiencies in Twitter Bot Classifiers

    Authors: Juan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou

    Abstract: Botnets in online social networks are increasingly often affecting the regular flow of discussion, attacking regular users and their posts, spamming them with irrelevant or offensive content, and even manipulating the popularity of messages and accounts. Researchers and cybercriminals are involved in an arms race, and new and updated botnets designed to defeat current detection systems are constan… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

    Journal ref: Proceedings of the 2018 Annual Computer Security Ap- plications Conference (ACSAC 2018)

  17. arXiv:1809.00947  [pdf, other

    cs.HC cs.LG stat.ML

    Finding Dory in the Crowd: Detecting Social Interactions using Multi-Modal Mobile Sensing

    Authors: Kleomenis Katevas, Katrin Hänsel, Richard Clegg, Ilias Leontiadis, Hamed Haddadi, Laurissa Tokarchuk

    Abstract: Remembering our day-to-day social interactions is challenging even if you aren't a blue memory challenged fish. The ability to automatically detect and remember these types of interactions is not only beneficial for individuals interested in their behavior in crowded situations, but also of interest to those who analyze crowd behavior. Currently, detecting social interactions is often performed us… ▽ More

    Submitted 16 November, 2018; v1 submitted 30 August, 2018; originally announced September 2018.

    Comments: 21 pages, 6 figures, conference paper

  18. arXiv:1806.02701  [pdf, other

    cs.CR

    There goes Wally: Anonymously sharing your location gives you away

    Authors: Apostolos Pyrgelis, Nicolas Kourtellis, Ilias Leontiadis, Joan Serrà, Claudio Soriente

    Abstract: With current technology, a number of entities have access to user mobility traces at different levels of spatio-temporal granularity. At the same time, users frequently reveal their location through different means, including geo-tagged social media posts and mobile app usage. Such leaks are often bound to a pseudonym or a fake identity in an attempt to preserve one's privacy. In this work, we inv… ▽ More

    Submitted 15 November, 2018; v1 submitted 7 June, 2018; originally announced June 2018.

    Comments: To appear in the 2018 IEEE International Conference on Big Data

  19. arXiv:1805.08168  [pdf, other

    cs.CY cs.CR cs.SI

    "You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks

    Authors: Enrico Mariconti, Guillermo Suarez-Tangil, Jeremy Blackburn, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Jordi Luque Serrano, Gianluca Stringhini

    Abstract: Video sharing platforms like YouTube are increasingly targeted by aggression and hate attacks. Prior work has shown how these attacks often take place as a result of "raids," i.e., organized efforts by ad-hoc mobs coordinating from third-party communities. Despite the increasing relevance of this phenomenon, however, online services often lack effective countermeasures to mitigate it. Unlike well-… ▽ More

    Submitted 23 August, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

    Journal ref: 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019)

  20. arXiv:1802.00393  [pdf, other

    cs.SI

    Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior

    Authors: Antigoni-Maria Founta, Constantinos Djouvas, Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Gianluca Stringhini, Athena Vakali, Michael Sirivianos, Nicolas Kourtellis

    Abstract: In recent years, offensive, abusive and hateful language, sexism, racism and other types of aggressive and cyberbullying behavior have been manifesting with increased frequency, and in many online social media platforms. In fact, past scientific work focused on studying these forms in popular media, such as Facebook and Twitter. Building on such work, we present an 8-month study of the various for… ▽ More

    Submitted 15 April, 2018; v1 submitted 1 February, 2018; originally announced February 2018.

    Comments: crowdsourcing, abusive behavior, hate speech, Twitter, aggression, bullying

    MSC Class: 68T06 ACM Class: K.4.2

  21. arXiv:1802.00385  [pdf, other

    cs.CL cs.SI

    A Unified Deep Learning Architecture for Abuse Detection

    Authors: Antigoni-Maria Founta, Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Athena Vakali, Ilias Leontiadis

    Abstract: Hate speech, offensive language, sexism, racism and other types of abusive behavior have become a common phenomenon in many online social media platforms. In recent years, such diverse abusive behaviors have been manifesting with increased frequency and levels of intensity. This is due to the openness and willingness of popular media platforms, such as Twitter and Facebook, to host content of sens… ▽ More

    Submitted 21 February, 2018; v1 submitted 1 February, 2018; originally announced February 2018.

    Comments: abusive behavior, Twitter, aggression, bullying, deep learning, machine learning

    MSC Class: 68T06 ACM Class: K.4.2

  22. arXiv:1712.07120  [pdf, other

    cs.HC

    Continual Prediction of Notification Attendance with Classical and Deep Network Approaches

    Authors: Kleomenis Katevas, Ilias Leontiadis, Martin Pielot, Joan Serrà

    Abstract: We investigate to what extent mobile use patterns can predict -- at the moment it is posted -- whether a notification will be clicked within the next 10 minutes. We use a data set containing the detailed mobile phone usage logs of 279 users, who over the course of 5 weeks received 446,268 notifications from a variety of apps. Besides using classical gradient-boosted trees, we demonstrate how to ma… ▽ More

    Submitted 19 December, 2017; originally announced December 2017.

    Comments: 15 pages

  23. arXiv:1705.06947  [pdf, other

    cs.SI cs.CY

    The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources

    Authors: Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn

    Abstract: As the number and the diversity of news outlets on the Web grow, so does the opportunity for "alternative" sources of information to emerge. Using large social networks like Twitter and Facebook, misleading, false, or agenda-driven information can quickly and seamlessly spread online, deceiving people or influencing their opinions. Also, the increased engagement of tightly knit communities, such a… ▽ More

    Submitted 30 September, 2017; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: To appear in the 17th ACM Internet Measurement Conference (IMC 2017)

  24. Practical Processing of Mobile Sensor Data for Continual Deep Learning Predictions

    Authors: Kleomenis Katevas, Ilias Leontiadis, Martin Pielot, Joan Serrà

    Abstract: We present a practical approach for processing mobile sensor time series data for continual deep learning predictions. The approach comprises data cleaning, normalization, cap**, time-based compression, and finally classification with a recurrent neural network. We demonstrate the effectiveness of the approach in a case study with 279 participants. On the basis of sparse sensor events, the netwo… ▽ More

    Submitted 17 May, 2017; originally announced May 2017.

    Comments: 6 pages, 3 figures, 3 tables

    Journal ref: DeepMobile Workshop, MobileHCI 2017

  25. arXiv:1704.05249  [pdf, other

    cs.LG cs.NI eess.SY

    Hot or not? Forecasting cellular network hot spots using sector performance indicators

    Authors: Joan Serrà, Ilias Leontiadis, Alexandros Karatzoglou, Konstantina Papagiannaki

    Abstract: To manage and maintain large-scale cellular networks, operators need to know which sectors underperform at any given time. For this purpose, they use the so-called hot spot score, which is the result of a combination of multiple network measurements and reflects the instantaneous overall performance of individual sectors. While operators have a good understanding of the current performance of a ne… ▽ More

    Submitted 18 April, 2017; originally announced April 2017.

    Comments: Accepted for publication at ICDE 2017 - Industrial Track

  26. arXiv:1610.03452  [pdf, other

    cs.SI cs.CY cs.HC physics.soc-ph

    Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web

    Authors: Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, Jeremy Blackburn

    Abstract: The discussion-board site 4chan has been part of the Internet's dark underbelly since its inception, and recent political events have put it increasingly in the spotlight. In particular, /pol/, the "Politically Incorrect" board, has been a central figure in the outlandish 2016 US election season, as it has often been linked to the alt-right movement and its rhetoric of hate and racism. However, 4c… ▽ More

    Submitted 1 October, 2017; v1 submitted 11 October, 2016; originally announced October 2016.

    Comments: A shorter version of this paper appears in the Proceedings of the 11th International AAAI Conference on Web and Social Media (ICWSM'17). Please cite the ICWSM'17 paper. Corresponding author: [email protected]

  27. arXiv:1406.6829  [pdf, other

    cs.CY cs.HC cs.SI

    The architecture of innovation: Tracking face-to-face interactions with ubicomp technologies

    Authors: Chloë Brown, Christos Efstratiou, Ilias Leontiadis, Daniele Quercia, Cecilia Mascolo, James Scott, Peter Key

    Abstract: The layouts of the buildings we live in shape our everyday lives. In office environments, building spaces affect employees' communication, which is crucial for productivity and innovation. However, accurate measurement of how spatial layouts affect interactions is a major challenge and traditional techniques may not give an objective view.We measure the impact of building spaces on social interact… ▽ More

    Submitted 26 June, 2014; originally announced June 2014.

    Comments: 14 pages, 9 figures. To appear in ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp 2014)

  28. arXiv:1310.3652  [pdf, other

    cs.CY

    Tracking Serendipitous Interactions: How Individual Cultures Shape the Office

    Authors: Chloë Brown, Christos Efstratiou, Ilias Leontiadis, Daniele Quercia, Cecilia Mascolo

    Abstract: In many work environments, serendipitous interactions between members of different groups may lead to enhanced productivity, collaboration and knowledge dissemination. Two factors that may have an influence on such interactions are cultural differences between individuals in highly multicultural workplaces, and the layout and physical spaces of the workplace itself. In this work, we investigate ho… ▽ More

    Submitted 14 October, 2013; originally announced October 2013.

    Comments: 10 pages, 4 figures. ACM CSCW 2014

  29. arXiv:1305.6974  [pdf, other

    physics.soc-ph cs.SI

    Applications of Temporal Graph Metrics to Real-World Networks

    Authors: John Tang, Ilias Leontiadis, Salvatore Scellato, Vincenzo Nicosia, Cecilia Mascolo, Mirco Musolesi, Vito Latora

    Abstract: Real world networks exhibit rich temporal information: friends are added and removed over time in online social networks; the seasons dictate the predator-prey relationship in food webs; and the propagation of a virus depends on the network of human contacts throughout the day. Recent studies have demonstrated that static network analysis is perhaps unsuitable in the study of real world network si… ▽ More

    Submitted 29 May, 2013; originally announced May 2013.

    Comments: 25 pages

    Journal ref: Chapter in Temporal Networks (Petter Holme and Jari Saramäki editors). Springer. Berlin, Heidelberg 2013