Skip to main content

Showing 1–24 of 24 results for author: Pyrgelis, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.16087  [pdf, other

    cs.CR

    How to Privately Tune Hyperparameters in Federated Learning? Insights from a Benchmark Study

    Authors: Natalija Mitic, Apostolos Pyrgelis, Sinem Sav

    Abstract: In this paper, we address the problem of privacy-preserving hyperparameter (HP) tuning for cross-silo federated learning (FL). We first perform a comprehensive measurement study that benchmarks various HP strategies suitable for FL. Our benchmarks show that the optimal parameters of the FL server, e.g., the learning rate, can be accurately and efficiently tuned based on the HPs found by each clien… ▽ More

    Submitted 22 May, 2024; v1 submitted 25 February, 2024; originally announced February 2024.

  2. arXiv:2308.14164  [pdf, other

    cs.CR cs.NI

    P3LI5: Practical and Confidential Lawful Interception on the 5G Core

    Authors: Francesco Intoci, Julian Sturm, Daniel Fraunholz, Apostolos Pyrgelis, Colin Barschel

    Abstract: Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain insightful data from network communications for criminal proceedings, e.g., network identifiers for tracking suspects. With the privacy-enhancements of network identifiers in the 5th generation of mobile networks (5G), LEA… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

    Comments: Accepted in the proceedings of IEEE Computer and Netowrk Security (IEEE CNS) 2023. Subject to IEEE copyright policy

  3. arXiv:2305.00690  [pdf, other

    cs.CR

    slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference

    Authors: Francesco Intoci, Sinem Sav, Apostolos Pyrgelis, Jean-Philippe Bossuat, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux

    Abstract: Homomorphic encryption (HE), which allows computations on encrypted data, is an enabling technology for confidential cloud computing. One notable example is privacy-preserving Prediction-as-a-Service (PaaS), where machine-learning predictions are computed on encrypted data. However, develo** HE-based solutions for encrypted PaaS is a tedious task which requires a careful design that predominantl… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: Accepted for publication at 5th Workshop on Cloud Security and Privacy (Cloud S&P 2023)

  4. Scalable and Privacy-Preserving Federated Principal Component Analysis

    Authors: David Froelicher, Hyunghoon Cho, Manaswitha Edupalli, Joao Sa Sousa, Jean-Philippe Bossuat, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Bonnie Berger, Jean-Pierre Hubaux

    Abstract: Principal component analysis (PCA) is an essential algorithm for dimensionality reduction in many data science domains. We address the problem of performing a federated PCA on private data distributed among multiple data providers while ensuring data confidentiality. Our solution, SF-PCA, is an end-to-end secure system that preserves the confidentiality of both the original data and all intermedia… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: Published elsewhere. IEEE Symposium on Security and Privacy 2023

  5. arXiv:2207.14071  [pdf, other

    cs.CR

    Verifiable Encodings for Secure Homomorphic Analytics

    Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux

    Abstract: Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is not ensured. We propose two error detection encodings and build authenticators that enable practical client-verification of cloud-based homomorphi… ▽ More

    Submitted 4 June, 2024; v1 submitted 28 July, 2022; originally announced July 2022.

    Comments: update appendices

  6. arXiv:2207.13947  [pdf, other

    cs.CR

    Privacy-Preserving Federated Recurrent Neural Networks

    Authors: Sinem Sav, Abdulrahman Diaa, Apostolos Pyrgelis, Jean-Philippe Bossuat, Jean-Pierre Hubaux

    Abstract: We present RHODE, a novel system that enables privacy-preserving training of and prediction on Recurrent Neural Networks (RNNs) in a cross-silo federated learning setting by relying on multiparty homomorphic encryption. RHODE preserves the confidentiality of the training data, the model, and the prediction data; and it mitigates federated learning attacks that target the gradients under a passive-… ▽ More

    Submitted 3 May, 2023; v1 submitted 28 July, 2022; originally announced July 2022.

    Comments: Accepted for publication at the 23rd Privacy Enhancing Technologies Symposium (PETS 2023)

  7. Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices

    Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux

    Abstract: Wearable devices such as smartwatches, fitness trackers, and blood-pressure monitors process, store, and communicate sensitive and personal information related to the health, life-style, habits and interests of the wearer. This data is exchanged with a companion app running on a smartphone over a Bluetooth connection. In this work, we investigate what can be inferred from the metadata (such as the… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

    Comments: 45 pages

    Journal ref: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 2, Article 54 (June 2021)

  8. arXiv:2103.08987  [pdf, other

    cs.CR cs.LG

    SoK: Privacy-Preserving Collaborative Tree-based Model Learning

    Authors: Sylvain Chatel, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux

    Abstract: Tree-based models are among the most efficient machine learning techniques for data mining nowadays due to their accuracy, interpretability, and simplicity. The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions. In this work, we survey the literature on distributed and privacy-preserving training of tree-based models and we systematize… ▽ More

    Submitted 18 June, 2021; v1 submitted 16 March, 2021; originally announced March 2021.

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2021, Issue 3

  9. arXiv:2101.08879  [pdf, other

    cs.CR

    Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies

    Authors: Anisa Halimi, Leonard Dervishi, Erman Ayday, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux, Xiaoqian Jiang, Jaideep Vaidya

    Abstract: Providing provenance in scientific workflows is essential for reproducibility and auditability purposes. Workflow systems model and record provenance describing the steps performed to obtain the final results of a computation. In this work, we propose a framework that verifies the correctness of the statistical test results that are conducted by a researcher while protecting individuals' privacy i… ▽ More

    Submitted 7 November, 2022; v1 submitted 21 January, 2021; originally announced January 2021.

    Comments: Appeared in the Proceedings on Privacy Enhancing Technologies Symposium (PETS) 2022

  10. arXiv:2009.00349  [pdf, other

    cs.CR cs.LG

    POSEIDON: Privacy-Preserving Federated Neural Network Learning

    Authors: Sinem Sav, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, Jean-Pierre Hubaux

    Abstract: In this paper, we address the problem of privacy-preserving training and evaluation of neural networks in an $N$-party, federated learning setting. We propose a novel system, POSEIDON, the first of its kind in the regime of privacy-preserving neural network training. It employs multiparty lattice-based cryptography to preserve the confidentiality of the training data, the model, and the evaluation… ▽ More

    Submitted 8 January, 2021; v1 submitted 1 September, 2020; originally announced September 2020.

    Comments: Accepted for publication at Network and Distributed Systems Security (NDSS) Symposium 2021

  11. arXiv:2007.04025  [pdf, other

    cs.CR

    Privacy and Integrity Preserving Computations with CRISP

    Authors: Sylvain Chatel, Apostolos Pyrgelis, Juan R. Troncoso-Pastoriza, Jean-Pierre Hubaux

    Abstract: In the digital era, users share their personal data with service providers to obtain some utility, e.g., access to high-quality services. Yet, the induced information flows raise privacy and integrity concerns. Consequently, cautious users may want to protect their privacy by minimizing the amount of information they disclose to curious service providers. Service providers are interested in verify… ▽ More

    Submitted 12 January, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Journal ref: USENIX Security Symposium 2021

  12. arXiv:2005.12273  [pdf

    cs.CR cs.CY

    Decentralized Privacy-Preserving Proximity Tracing

    Authors: Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Čapkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers , et al. (9 additional authors not shown)

    Abstract: This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chai… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 46 pages, 6 figures, first published 3 April 2020 on https://github.com/DP-3T/documents where companion documents and code can be found

  13. arXiv:2005.09532  [pdf, other

    cs.CR

    Scalable Privacy-Preserving Distributed Learning

    Authors: David Froelicher, Juan R. Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav, Joao Sa Sousa, Jean-Philippe Bossuat, Jean-Pierre Hubaux

    Abstract: In this paper, we address the problem of privacy-preserving distributed learning and the evaluation of machine-learning models by analyzing it in the widespread MapReduce abstraction that we extend with privacy constraints. We design SPINDLE (Scalable Privacy-preservINg Distributed LEarning), the first distributed and privacy-preserving system that covers the complete ML workflow by enabling the e… ▽ More

    Submitted 14 July, 2021; v1 submitted 19 May, 2020; originally announced May 2020.

    Comments: Published at the 21st Privacy Enhancing Technologies Symposium (PETS 2021)

  14. arXiv:1902.07456  [pdf, other

    cs.CR

    Measuring Membership Privacy on Aggregate Location Time-Series

    Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro

    Abstract: While location data is extremely valuable for various applications, disclosing it prompts serious threats to individuals' privacy. To limit such concerns, organizations often provide analysts with aggregate time-series that indicate, e.g., how many people are in a location at a time interval, rather than raw individual traces. In this paper, we perform a measurement study to understand Membership… ▽ More

    Submitted 27 April, 2020; v1 submitted 20 February, 2019; originally announced February 2019.

    Journal ref: Presented at ACM SIGMETRICS 2020 and published in the Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Vol. 2, No. 4, Article 36, June 2020

  15. arXiv:1810.02649  [pdf, other

    cs.CR

    On Collaborative Predictive Blacklisting

    Authors: Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro

    Abstract: Collaborative predictive blacklisting (CPB) allows to forecast future attack sources based on logs and alerts contributed by multiple organizations. Unfortunately, however, research on CPB has only focused on increasing the number of predicted attacks but has not considered the impact on false positives and false negatives. Moreover, sharing alerts is often hindered by confidentiality, trust, and… ▽ More

    Submitted 5 October, 2018; originally announced October 2018.

    Comments: A preliminary version of this paper appears in ACM SIGCOMM's Computer Communication Review (Volume 48 Issue 5, October 2018). This is the full version

  16. arXiv:1806.02701  [pdf, other

    cs.CR

    There goes Wally: Anonymously sharing your location gives you away

    Authors: Apostolos Pyrgelis, Nicolas Kourtellis, Ilias Leontiadis, Joan Serrà, Claudio Soriente

    Abstract: With current technology, a number of entities have access to user mobility traces at different levels of spatio-temporal granularity. At the same time, users frequently reveal their location through different means, including geo-tagged social media posts and mobile app usage. Such leaks are often bound to a pseudonym or a fake identity in an attempt to preserve one's privacy. In this work, we inv… ▽ More

    Submitted 15 November, 2018; v1 submitted 7 June, 2018; originally announced June 2018.

    Comments: To appear in the 2018 IEEE International Conference on Big Data

  17. arXiv:1710.10237  [pdf, other

    cs.CR

    PriFi: Low-Latency Anonymity for Organizational Networks

    Authors: Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Apostolos Pyrgelis, Bryan Ford, Jean-Pierre Hubaux, Joan Feigenbaum

    Abstract: Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks. We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdrop… ▽ More

    Submitted 6 April, 2021; v1 submitted 27 October, 2017; originally announced October 2017.

    Comments: 25 pages

  18. arXiv:1708.06145  [pdf, other

    cs.CR

    Knock Knock, Who's There? Membership Inference on Aggregate Location Data

    Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro

    Abstract: Aggregate location data is often used to support smart services and applications, e.g., generating live traffic maps or predicting visits to businesses. In this paper, we present the first study on the feasibility of membership inference attacks on aggregate location time-series. We introduce a game-based definition of the adversarial task, and cast it as a classification problem where machine lea… ▽ More

    Submitted 29 November, 2017; v1 submitted 21 August, 2017; originally announced August 2017.

    Journal ref: Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018)

  19. arXiv:1703.00366  [pdf, other

    cs.CR

    What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy

    Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro

    Abstract: Information about people's movements and the locations they visit enables an increasing number of mobility analytics applications, e.g., in the context of urban and transportation planning, In this setting, rather than collecting or sharing raw data, entities often use aggregation as a privacy protection mechanism, aiming to hide individual users' location traces. Furthermore, to bound information… ▽ More

    Submitted 10 June, 2017; v1 submitted 1 March, 2017; originally announced March 2017.

    Comments: To appear in PETS 2017

  20. arXiv:1609.06582  [pdf, other

    cs.CR cs.CY cs.LG

    Privacy-Friendly Mobility Analytics using Aggregate Location Data

    Authors: Apostolos Pyrgelis, Emiliano De Cristofaro, Gordon Ross

    Abstract: Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes. At the same time, however, the fine-grained collection of user locations raises serious privacy concerns, as this can reveal sensitive information about the users, such as, life style, political and religious inclinations, or even identities. In this paper, we study t… ▽ More

    Submitted 9 October, 2016; v1 submitted 21 September, 2016; originally announced September 2016.

    Comments: Published at ACM SIGSPATIAL 2016

  21. arXiv:1512.04114   

    cs.CR cs.AI

    Building and Measuring Privacy-Preserving Predictive Blacklists

    Authors: Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro

    Abstract: (Withdrawn) Collaborative security initiatives are increasingly often advocated to improve timeliness and effectiveness of threat mitigation. Among these, collaborative predictive blacklisting (CPB) aims to forecast attack sources based on alerts contributed by multiple organizations that might be targeted in similar ways. Alas, CPB proposals thus far have only focused on improving hit counts, but… ▽ More

    Submitted 7 October, 2018; v1 submitted 13 December, 2015; originally announced December 2015.

    Comments: Obsolete paper. For more up-to-date work on collaborative predictive blacklisting, see arXiv:1810.02649

  22. arXiv:1107.1626  [pdf, other

    cs.CR

    Elliptic Curve Based Zero Knowledge Proofs and Their Applicability on Resource Constrained Devices

    Authors: Ioannis Chatzigiannakis, Apostolos Pyrgelis, Paul G. Spirakis, Yannis C. Stamatiou

    Abstract: Elliptic Curve Cryptography (ECC) is an attractive alternative to conventional public key cryptography, such as RSA. ECC is an ideal candidate for implementation on constrained devices where the major computational resources i.e. speed, memory are limited and low-power wireless communication protocols are employed. That is because it attains the same security levels with traditional cryptosystems… ▽ More

    Submitted 8 July, 2011; originally announced July 2011.

  23. arXiv:1105.3864  [pdf, other

    cs.NI

    Component Based Clustering in Wireless Sensor Networks

    Authors: Dimitrios Amaxilatis, Ioannis Chatzigiannakis, Christos Koninis, Apostolos Pyrgelis

    Abstract: Clustering is an important research topic for wireless sensor networks (WSNs). A large variety of approaches has been presented focusing on different performance metrics. Even though all of them have many practical applications, an extremely limited number of software implementations is available to the research community. Furthermore, these very few techniques are implemented for specific WSN sys… ▽ More

    Submitted 8 July, 2011; v1 submitted 19 May, 2011; originally announced May 2011.

  24. arXiv:1101.3067  [pdf, other

    cs.NI cs.SE

    Wiselib: A Generic Algorithm Library for Heterogeneous Sensor Networks

    Authors: Tobias Baumgartner, Ioannis Chatzigiannakis, Sandor P. Fekete, Christos Koninis, Alexander Kroeller, Apostolos Pyrgelis

    Abstract: One unfortunate consequence of the success story of wireless sensor networks (WSNs) in separate research communities is an ever-growing gap between theory and practice. Even though there is a increasing number of algorithmic methods for WSNs, the vast majority has never been tried in practice; conversely, many practical challenges are still awaiting efficient algorithmic solutions. The main cause… ▽ More

    Submitted 16 January, 2011; originally announced January 2011.

    Comments: 16 pages, 1 figure, 7 tables. Appears in European Conference on Wireless Sensor Networks (EWSN 2010)

    ACM Class: F.2.2; D.2.2