Skip to main content

Showing 1–9 of 9 results for author: Olatunji, I E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.00578  [pdf, other

    cs.LG cs.AI cs.CR

    Does Black-box Attribute Inference Attacks on Graph Neural Networks Constitute Privacy Risk?

    Authors: Iyiola E. Olatunji, Anmar Hizber, Oliver Sihlovec, Megha Khosla

    Abstract: Graph neural networks (GNNs) have shown promising results on real-life datasets and applications, including healthcare, finance, and education. However, recent studies have shown that GNNs are highly vulnerable to attacks such as membership inference attack and link reconstruction attack. Surprisingly, attribute inference attacks has received little attention. In this paper, we initiate the first… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

  2. Private Graph Extraction via Feature Explanations

    Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla

    Abstract: Privacy and interpretability are two important ingredients for achieving trustworthy machine learning. We study the interplay of these two aspects in graph machine learning through graph reconstruction attacks. The goal of the adversary here is to reconstruct the graph structure of the training data given access to model explanations. Based on the different kinds of auxiliary information available… ▽ More

    Submitted 2 November, 2023; v1 submitted 29 June, 2022; originally announced June 2022.

    Comments: Accepted at PETS 2023

    Journal ref: Proceedings of the 23rd Privacy Enhancing Technologies Symposium (PETS), 2023

  3. arXiv:2109.08907  [pdf, other

    cs.LG cs.CR

    Releasing Graph Neural Networks with Differential Privacy Guarantees

    Authors: Iyiola E. Olatunji, Thorben Funke, Megha Khosla

    Abstract: With the increasing popularity of graph neural networks (GNNs) in several sensitive applications like healthcare and medicine, concerns have been raised over the privacy aspects of trained GNNs. More notably, GNNs are vulnerable to privacy attacks, such as membership inference attacks, even if only black-box access to the trained model is granted. We propose PrivGNN, a privacy-preserving framework… ▽ More

    Submitted 2 November, 2023; v1 submitted 18 September, 2021; originally announced September 2021.

    Comments: Published in TMLR 2023

    Journal ref: Transactions on Machine Learning Research (TMLR), 2023

  4. arXiv:2104.07938  [pdf, other

    cs.LG cs.CR stat.AP

    Achieving differential privacy for $k$-nearest neighbors based outlier detection by data partitioning

    Authors: Jens Rauch, Iyiola E. Olatunji, Megha Khosla

    Abstract: When applying outlier detection in settings where data is sensitive, mechanisms which guarantee the privacy of the underlying data are needed. The $k$-nearest neighbors ($k$-NN) algorithm is a simple and one of the most effective methods for outlier detection. So far, there have been no attempts made to develop a differentially private ($ε$-DP) approach for $k$-NN based outlier detection. Existing… ▽ More

    Submitted 16 April, 2021; originally announced April 2021.

  5. A Review of Anonymization for Healthcare Data

    Authors: Iyiola E. Olatunji, Jens Rauch, Matthias Katzensteiner, Megha Khosla

    Abstract: Mining health data can lead to faster medical decisions, improvement in the quality of treatment, disease prevention, reduced cost, and it drives innovative solutions within the healthcare sector. However, health data is highly sensitive and subject to regulations such as the General Data Protection Regulation (GDPR), which aims to ensure patient's privacy. Anonymization or removal of patient iden… ▽ More

    Submitted 13 April, 2021; originally announced April 2021.

    Journal ref: Big Data (2022)

  6. arXiv:2101.06570  [pdf, other

    cs.LG cs.CR

    Membership Inference Attack on Graph Neural Networks

    Authors: Iyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla

    Abstract: Graph Neural Networks (GNNs), which generalize traditional deep neural networks on graph data, have achieved state-of-the-art performance on several graph analytical tasks. We focus on how trained GNN models could leak information about the \emph{member} nodes that they were trained on. We introduce two realistic settings for performing a membership inference (MI) attack on GNNs. While choosing th… ▽ More

    Submitted 18 December, 2021; v1 submitted 16 January, 2021; originally announced January 2021.

    Comments: Best student paper award, IEEE TPS 21

  7. Context-aware Helpfulness Prediction for Online Product Reviews

    Authors: Iyiola E. Olatunji, Xin Li, Wai Lam

    Abstract: Modeling and prediction of review helpfulness has become more predominant due to proliferation of e-commerce websites and online shops. Since the functionality of a product cannot be tested before buying, people often rely on different kinds of user reviews to decide whether or not to buy a product. However, quality reviews might be buried deep in the heap of a large amount of reviews. Therefore,… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: Published as a proceeding paper in AIRS 2019

  8. arXiv:1807.00139  [pdf

    cs.CY

    Harnessing constrained resources in service industry via video analytics

    Authors: Chun-Hung Cheng, Iyiola E. Olatunji

    Abstract: Service industries contribute significantly to many developed and develo** - economies. As their business activities expand rapidly, many service companies struggle to maintain customer's satisfaction due to sluggish service response caused by resource shortages. Anticipating resource shortages and proffering solutions before they happen is an effective way of reducing the adverse effect on oper… ▽ More

    Submitted 30 June, 2018; originally announced July 2018.

    Comments: Accepted to appear in Archives of Industrial Engineering Journal

  9. Human Activity Recognition for Mobile Robot

    Authors: Iyiola E. Olatunji

    Abstract: Due to the increasing number of mobile robots including domestic robots for cleaning and maintenance in developed countries, human activity recognition is inevitable for congruent human-robot interaction. Needless to say that this is indeed a challenging task for robots, it is expedient to learn human activities for autonomous mobile robots (AMR) for navigating in an uncontrolled environment witho… ▽ More

    Submitted 23 January, 2018; originally announced January 2018.