-
Hiding from Facebook: An Encryption Protocol resistant to Correlation Attacks
Authors:
Chen-Da Liu,
Simone Santini
Abstract:
In many social networks, one publishes information that one wants to reveal (e.g., the photograph of some friends) together with information that may lead to privacy breaches (e.g., the name of these people). One might want to hide this sensitive information by encrypting it and sharing the decryption key only with trusted people, but this might not be enough. If the cipher associated to a face is…
▽ More
In many social networks, one publishes information that one wants to reveal (e.g., the photograph of some friends) together with information that may lead to privacy breaches (e.g., the name of these people). One might want to hide this sensitive information by encrypting it and sharing the decryption key only with trusted people, but this might not be enough. If the cipher associated to a face is always the same, correlation between the output of a face recognition system and the cipher can give useful clues and help train recognizers to identify untagged instances of the face. We refer to these as "correlation attacks".
In this paper we present a coding system that attempts to counter correlation attacks by associating to each instance of a face a different encryption of the same tag in such a way that the correlation between different instances is minimal.
In addition, we present a key distribution code that allows only the owner of the images to encode the tags, but allows a group of trusted friends to decode them.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
BiHeartS: Bilateral Heart Rate from multiple devices and body positions for Sleep measurement Dataset
Authors:
Nouran Abdalazim,
Leonardo Alchieri,
Lidia Alecci,
Silvia Santini
Abstract:
Sleep is the primary mean of recovery from accumulated fatigue and thus plays a crucial role in fostering people's mental and physical well-being. Sleep quality monitoring systems are often implemented using wearables that leverage their sensing capabilities to provide sleep behaviour insights and recommendations to users. Building models to estimate sleep quality from sensor data is a challenging…
▽ More
Sleep is the primary mean of recovery from accumulated fatigue and thus plays a crucial role in fostering people's mental and physical well-being. Sleep quality monitoring systems are often implemented using wearables that leverage their sensing capabilities to provide sleep behaviour insights and recommendations to users. Building models to estimate sleep quality from sensor data is a challenging task, due to the variability of both physiological data, perception of sleep quality, and the daily routine across users. This challenge gauges the need for a comprehensive dataset that includes information about the daily behaviour of users, physiological signals as well as the perceived sleep quality. In this paper, we try to narrow this gap by proposing Bilateral Heart rate from multiple devices and body positions for Sleep measurement (BiHeartS) dataset. The dataset is collected in the wild from 10 participants for 30 consecutive nights. Both research-grade and commercial wearable devices are included in the data collection campaign. Also, comprehensive self-reports are collected about the sleep quality and the daily routine.
△ Less
Submitted 13 August, 2023;
originally announced August 2023.
-
Covid-19 vaccination strategies with limited resources -- a model based on social network graphs
Authors:
Simone Santini
Abstract:
We develop a model of infection spread that takes into account the existence of a vulnerable group as well as the variability of the social relations of individuals. We develop a compartmentalized power-law model, with power-law connections between the vulnerable and the general population, considering these connections as well as the connections among the vulnerable as parameters that we vary in…
▽ More
We develop a model of infection spread that takes into account the existence of a vulnerable group as well as the variability of the social relations of individuals. We develop a compartmentalized power-law model, with power-law connections between the vulnerable and the general population, considering these connections as well as the connections among the vulnerable as parameters that we vary in our tests. We use the model to study a number of vaccination strategies under two hypotheses: first, we assume a limited availability of vaccine but an infinite vaccination capacity, so that all the available doses can be administered in a short time (negligible with respect to the evolution of the epidemic). Then we assume a limited vaccination capacity, so that the doses are administered in a time non-negligible with respect to the evolution of the epidemic. We develop optimal strategies for the various social parameters, where a strategy consists of (1) the fraction of vaccine that is administered to the vulnerable population and (2) the criterion that is used to administer it to the general population. In the case of a limited vaccination capacity, the fraction (1) is a function of time, and we study how to optimize it to obtain a maximal reduction in the number of victims.
△ Less
Submitted 11 October, 2020;
originally announced October 2020.
-
Network navigation using Page Rank random walks
Authors:
Emilio Aced Fuentes,
Simone Santini
Abstract:
We introduce a formalism based on a continuous time approximation, to study the characteristics of Page Rank random walks. We find that the diffusion of the occupancy probability has a dynamics that exponentially "forgets" the initial conditions and settles to a steady state that depends only on the characteristics of the network. In the special case in which the walk begins from a single node, we…
▽ More
We introduce a formalism based on a continuous time approximation, to study the characteristics of Page Rank random walks. We find that the diffusion of the occupancy probability has a dynamics that exponentially "forgets" the initial conditions and settles to a steady state that depends only on the characteristics of the network. In the special case in which the walk begins from a single node, we find that the largest eigenvalue of the transition value (lambda=1) does not contribute to the dynamic and that the probability is constant in the direction of the corresponding eigenvector. We study the process of visiting new node, which we find to have a dynamic similar to that of the occupancy probability. Finally, we determine the average transit time between nodes <T>, which we find to exhibit certain connection with the corresponding time for Levy walks. The relevance of these results reside in that Page Rank, which are a more reasonable model for the searching behavior of individuals, can be shown to exhibit features similar to Levy walks, which in turn have been shown to be a reasonable model of a common large scale search strategy known as "Area Restricted Search".
△ Less
Submitted 16 July, 2020; v1 submitted 15 July, 2020;
originally announced July 2020.
-
A random walk on Area Restricted Search
Authors:
Simone Santini
Abstract:
These notes from a graduate class at the Unuversidad Autonoma de Madrid analyze a search behavior known as Area Resticted Search (ARS), widespread in the animal kingdom, and optimal when the resources that one is after are "patchy". In the first section we study the importance of the behavior in animal and its dependence on the dopamine as a indicator of reward. In the second section we put togeth…
▽ More
These notes from a graduate class at the Unuversidad Autonoma de Madrid analyze a search behavior known as Area Resticted Search (ARS), widespread in the animal kingdom, and optimal when the resources that one is after are "patchy". In the first section we study the importance of the behavior in animal and its dependence on the dopamine as a indicator of reward. In the second section we put together a genetic algorithm to determine the optimality of ARS and its characteristics. Finally, we relate ARS to a type of random walks known as "Levy Walks", in which the probability of jum** at a distance d from the current location follows a power law distribution.
△ Less
Submitted 25 June, 2020;
originally announced June 2020.
-
Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services
Authors:
Marco Zimmerling,
Luca Mottola,
Silvia Santini
Abstract:
Low-power wireless communication is a central building block of Cyber-physical Systems and the Internet of Things. Conventional low-power wireless protocols make avoiding packet collisions a cornerstone design choice. The concept of synchronous transmissions challenges this view. As collisions are not necessarily destructive, under specific circumstances, commodity low-power wireless radios are of…
▽ More
Low-power wireless communication is a central building block of Cyber-physical Systems and the Internet of Things. Conventional low-power wireless protocols make avoiding packet collisions a cornerstone design choice. The concept of synchronous transmissions challenges this view. As collisions are not necessarily destructive, under specific circumstances, commodity low-power wireless radios are often able to receive useful information even in the presence of superimposed signals from different transmitters. We survey the growing number of protocols that exploit synchronous transmissions for higher robustness and efficiency as well as unprecedented functionality and versatility compared to conventional designs. The illustration of protocols based on synchronous transmissions is cast in a conceptional framework we establish, with the goal of highlighting differences and similarities among the proposed solutions. We conclude the paper with a discussion on open research questions in this field.
△ Less
Submitted 24 January, 2020; v1 submitted 23 January, 2020;
originally announced January 2020.
-
Structural characterization of musical harmonies
Authors:
Maria Rojo González,
Simone Santini
Abstract:
Understanding the structural characteristics of harmony is essential for an effective use of music as a communication medium. Of the three expressive axes of music (melody, rhythm, harmony), harmony is the foundation on which the emotional content is built, and its understanding is important in areas such as multimedia and affective computing. The common tool for studying this kind of structure in…
▽ More
Understanding the structural characteristics of harmony is essential for an effective use of music as a communication medium. Of the three expressive axes of music (melody, rhythm, harmony), harmony is the foundation on which the emotional content is built, and its understanding is important in areas such as multimedia and affective computing. The common tool for studying this kind of structure in computing science is the formal grammar but, in the case of music, grammars run into problems due to the ambiguous nature of some of the concepts defined in music theory. In this paper, we consider one of such constructs: modulation, that is, the change of key in the middle of a musical piece, an important tool used by many authors to enhance the capacity of music to express emotions. We develop a hybrid method in which an evidence-gathering numerical method detects modulation and then, based on the detected tonalities, a non-ambiguous grammar can be used for analyzing the structure of each tonal component. Experiments with music from the XVII and XVIII centuries show that we can detect the precise point of modulation with an error of at most two chords in almost 97% of the cases. Finally, we show examples of complete modulation and structural analysis of musical harmonies.
△ Less
Submitted 27 December, 2019;
originally announced December 2019.
-
Cooperative Intersection Crossing over 5G
Authors:
Luca Maria Castiglione,
Paolo Falcone,
Alberto Petrillo,
Simon Pietro Romano,
Stefania Santini
Abstract:
Autonomous driving is a safety critical application of sensing and decision-making technologies. Communication technologies extend the awareness capabilities of vehicles, beyond what is achievable with the on-board systems only. Nonetheless, issues typically related to wireless networking must be taken into account when designing safe and reliable autonomous systems. The aim of this work is to pre…
▽ More
Autonomous driving is a safety critical application of sensing and decision-making technologies. Communication technologies extend the awareness capabilities of vehicles, beyond what is achievable with the on-board systems only. Nonetheless, issues typically related to wireless networking must be taken into account when designing safe and reliable autonomous systems. The aim of this work is to present a control algorithm and a communication paradigm over 5G networks for negotiating traffic junctions in urban areas. The proposed control framework has been shown to converge in a finite time and the supporting communication software has been designed with the objective of minimising communication delays. At the same time, the underlying network guarantees reliability of the communication. The proposed framework has been successfully deployed and tested, in partnership with Ericsson AB, at the AstaZero proving ground in Goteborg, Sweden. In our experiments, three autonomous vehicles successfully drove through an intersection of 235 square meters in a urban scenario.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Relevance Feedback with Latent Variables in Riemann spaces
Authors:
Simone Santini
Abstract:
In this paper we develop and evaluate two methods for relevance feedback based on endowing a suitable "semantic query space" with a Riemann metric derived from the probability distribution of the positive samples of the feedback. The first method uses a Gaussian distribution to model the data, while the second uses a more complex Latent Semantic variable model. A mixed (discrete-continuous) versio…
▽ More
In this paper we develop and evaluate two methods for relevance feedback based on endowing a suitable "semantic query space" with a Riemann metric derived from the probability distribution of the positive samples of the feedback. The first method uses a Gaussian distribution to model the data, while the second uses a more complex Latent Semantic variable model. A mixed (discrete-continuous) version of the Expectation-Maximization algorithm is developed for this model.
We motivate the need for the semantic query space by analyzing in some depth three well-known relevance feedback methods, and we develop a new experimental methodology to evaluate these methods and compare their performance in a neutral way, that is, without making assumptions on the system in which they will be embedded.
△ Less
Submitted 15 June, 2019;
originally announced June 2019.
-
Novelty and Coverage in context-based information filtering
Authors:
Alexandra Dumitrescu,
Simone Santini
Abstract:
We present a collection of algorithms to filter a stream of documents in such a way that the filtered documents will cover as well as possible the interest of a person, kee** in mind that, at any given time, the offered documents should not only be relevant, but should also be diversified, in the sense not only of avoiding nearly identical documents, but also of covering as well as possible all…
▽ More
We present a collection of algorithms to filter a stream of documents in such a way that the filtered documents will cover as well as possible the interest of a person, kee** in mind that, at any given time, the offered documents should not only be relevant, but should also be diversified, in the sense not only of avoiding nearly identical documents, but also of covering as well as possible all the interests of the person. We use a modification of the WEBSOM algorithm, with limited architectural adaptation, to create a user model (which we call the "user context" or simply the "context") based on a network of units laid out in the word space and trained using a collection of documents representative of the context.
We introduce the concepts of novelty and coverage. Novelty is related to, but not identical to, the homonymous information retrieval concept: a document is novel it it belongs to a semantic area of interest to a person for which no documents have been seen in the recent past. A group of documents has coverage to the extent to which it is a good representation of all the interests of a person.
In order to increase coverage, we introduce an "interest" (or "urgency") factor for each unit of the user model, modulated by the scores of the incoming documents: the interest of a unit is decreased drastically when a document arrives that belongs to its semantic area and slowly recovers its initial value if no documents from that semantic area are displayed.
Our tests show that these algorithms can effectively increase the coverage of the documents that are shown to the user without overly affecting precision.
△ Less
Submitted 24 November, 2018;
originally announced November 2018.
-
Whisper: Fast Flooding for Low-Power Wireless Networks
Authors:
Martina Brachmann,
Olaf Landsiedel,
Diana Göhringer,
Silvia Santini
Abstract:
This paper presents Whisper, a fast and reliable protocol to flood small amounts of data into a multi-hop network. Whisper makes use of synchronous transmissions, a technique first introduced by the Glossy flooding protocol. In contrast to Glossy, Whisper does not let the radio switch from receive to transmit mode between messages. Instead, it makes nodes continuously transmit identical copies of…
▽ More
This paper presents Whisper, a fast and reliable protocol to flood small amounts of data into a multi-hop network. Whisper makes use of synchronous transmissions, a technique first introduced by the Glossy flooding protocol. In contrast to Glossy, Whisper does not let the radio switch from receive to transmit mode between messages. Instead, it makes nodes continuously transmit identical copies of the message and eliminates the gaps between subsequent transmissions. To this end, Whisper embeds the message to be flooded into a signaling packet that is composed of multiple packlets -- where a packlet is a portion of the message payload that mimics the structure of an actual packet. A node must intercept only one of the packlets to detect that there is an ongoing transmission and that it should start forwarding the message. This allows Whisper to speed up the propagation of the flood, and thus, to reduce the overall radio-on time of the nodes. Our evaluation on the FlockLab testbed shows that Whisper achieves comparable reliability but 2x lower radio-on time than Glossy. We further show that by embedding Whisper in an existing data collection application, we can more than double the lifetime of the network.
△ Less
Submitted 27 May, 2021; v1 submitted 11 September, 2018;
originally announced September 2018.
-
Semiotic internationalization and localization of computer programs
Authors:
Simone Santini
Abstract:
Localization, the process--part of translation studies--of adapting a program to a new linguistic community, is often intended in the relatively narrow sense of translating the messages and labels of the program into the target language. Correspondingly, internationalization, the discipline--which is part of software engineering--of putting in place all the measures that will make localization eas…
▽ More
Localization, the process--part of translation studies--of adapting a program to a new linguistic community, is often intended in the relatively narrow sense of translating the messages and labels of the program into the target language. Correspondingly, internationalization, the discipline--which is part of software engineering--of putting in place all the measures that will make localization easier, is also limited in scope.
In this paper we analyze the various systems through which a program communicates with a person (icons, buttons, actions, interface layout, etc.) and find that most of them, far from being iconic, are in reality symbolic semiotic systems related to the culture in which or for which the program was developed (typically American programmers of western office workers). Based on these findings, we argue that during the localization process, the translator should have the option to translate them all, that is, to adapt the whole interface and its founding metaphors to the cultural environment in which the program is deployed.
This conclusion will result in a greater role for internationalization in the software development process, and we outline a few architectural principles that should be considered when creating a program for a multi-cultural market.
△ Less
Submitted 11 May, 2018;
originally announced May 2018.
-
On the relation between representations and computability
Authors:
Jaun Casanova,
Simone Santini
Abstract:
One of the fundamental results in computability is the existence of well-defined functions that cannot be computed. In this paper we study the effects of data representation on computability; we show that, while for each possible way of representing data there exist incomputable functions, the computability of a specific abstract function is never an absolute property, but depends on the represent…
▽ More
One of the fundamental results in computability is the existence of well-defined functions that cannot be computed. In this paper we study the effects of data representation on computability; we show that, while for each possible way of representing data there exist incomputable functions, the computability of a specific abstract function is never an absolute property, but depends on the representation used for the function domain. We examine the scope of this dependency and provide mathematical criteria to favour some representations over others. As we shall show, there are strong reasons to suggest that computational enumerability should be an additional axiom for computation models. We analyze the link between the techniques and effects of representation changes and those of oracle machines, showing an important connection between their hierarchies. Finally, these notions enable us to gain a new insight on the Church-Turing thesis: its interpretation as the underlying algebraic structure to which computation is invariant.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
Opinion formation in a locally interacting community with recommender
Authors:
Simone Santini
Abstract:
We present a user of model interaction based on the physics of kinetic exchange, and extend it to individuals placed in a grid with local interaction. We show with numerical analysis and partial analytical results that the critical symmetry breaking transitions and percolation effects typical of the full interaction model do not take place if the range of interaction is limited, allowing for the c…
▽ More
We present a user of model interaction based on the physics of kinetic exchange, and extend it to individuals placed in a grid with local interaction. We show with numerical analysis and partial analytical results that the critical symmetry breaking transitions and percolation effects typical of the full interaction model do not take place if the range of interaction is limited, allowing for the co-existence of majorty and minority opinions in the same community.
We then introduce a peer recommender system in the model, showing that, even with very local iteraction and a small probability of appeal to the recommender, its presence is sufficient to make both symmetry breaking and percolation reappear. This seems to indicate that one effect of a recommendation system is to uniform the opinions of a community, reducing minority opinions or making them disappear. Although the recommender system does uniform the community opinion, it doesn't constrain it, in the sense that all opinions have the same probability of becoming the dominating one. We do a partial study, however, that suggests that a "mischievous" recommender might be able to bias a community so that one opinion will emerge over the opposite with overwhelming probability.
△ Less
Submitted 13 June, 2017;
originally announced June 2017.