Skip to main content

Showing 1–4 of 4 results for author: Walch, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20483  [pdf, other

    cs.CR

    Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System

    Authors: Shibam Mukherjee, Roman Walch, Fredrik Meisingseth, Elisabeth Lex, Christian Rechberger

    Abstract: Recommender systems are an integral part of online platforms that recommend new content to users with similar interests. However, they demand a considerable amount of user activity data where, if the data is not adequately protected, constitute a critical threat to the user privacy. Privacy-aware recommender systems enable protection of such sensitive user data while still maintaining a similar re… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. arXiv:2405.04463  [pdf, other

    cs.CR

    Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users

    Authors: Remco Bloemen, Daniel Kales, Philipp Sippl, Roman Walch

    Abstract: In this work we tackle privacy concerns in biometric verification systems that typically require server-side processing of sensitive data (e.g., fingerprints and Iris Codes). Concretely, we design a solution that allows us to query whether a given Iris Code is similar to one contained in a given database, while all queries and datasets are being protected using secure multiparty computation (MPC).… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  3. arXiv:2205.11935  [pdf, other

    cs.CR

    CryptoTL: Private, Efficient and Secure Transfer Learning

    Authors: Roman Walch, Samuel Sousa, Lukas Helminger, Stefanie Lindstaedt, Christian Rechberger, Andreas Trügler

    Abstract: Big data has been a pervasive catchphrase in recent years, but dealing with data scarcity has become a crucial question for many real-world deep learning (DL) applications. A popular methodology to efficiently enable the training of DL models to perform tasks in scenarios with low availability of data is transfer learning (TL). TL allows to transfer knowledge from a general domain to a specific ta… ▽ More

    Submitted 20 October, 2022; v1 submitted 24 May, 2022; originally announced May 2022.

  4. arXiv:2005.02061  [pdf, other

    cs.CR

    Privately Connecting Mobility to Infectious Diseases via Applied Cryptography

    Authors: Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch

    Abstract: Recent work has shown that cell phone mobility data has the unique potential to create accurate models for human mobility and consequently the spread of infected diseases. While prior studies have exclusively relied on a mobile network operator's subscribers' aggregated data in modelling disease dynamics, it may be preferable to contemplate aggregated mobility data of infected individuals only. Cl… ▽ More

    Submitted 13 June, 2022; v1 submitted 5 May, 2020; originally announced May 2020.

    Comments: Accepted at PoPETs 2022