Personalized and private peer-to-peer machine learning

A Bellet, R Guerraoui, M Taziki… - … conference on artificial …, 2018 - proceedings.mlr.press
The rise of connected personal devices together with privacy concerns call for machine
learning algorithms capable of leveraging the data of a large number of agents to learn …

Automatic identification of bug-introducing changes

S Kim, T Zimmermann, K Pan… - 21st IEEE/ACM …, 2006 - ieeexplore.ieee.org
Bug-fixes are widely used for predicting bugs or finding risky parts of software. However, a
bug-fix does not contain information about the change that initially introduced a bug. Such …

Decentralized collective learning for self-managed sharing economies

E Pournaras, P Pilgerstorfer, T Asikis - ACM Transactions on …, 2018 - dl.acm.org
The Internet of Things equips citizens with a phenomenal new means for online participation
in sharing economies. When agents self-determine options from which they choose, for …

Heterogeneous differential privacy

M Alaggan, S Gambs, AM Kermarrec - arXiv preprint arXiv:1504.06998, 2015 - arxiv.org
The massive collection of personal data by personalization systems has rendered the
preservation of privacy of individuals more and more difficult. Most of the proposed …

Verified computational differential privacy with applications to smart metering

G Barthe, G Danezis, B Grégoire… - 2013 IEEE 26th …, 2013 - ieeexplore.ieee.org
EasyCrypt is a tool-assisted framework for reasoning about probabilistic computations in the
presence of adversarial code, whose main application has been the verification of security …

Engineering democratization in internet of things data analytics

E Pournaras, J Nikolic, A Omerzel… - 2017 IEEE 31st …, 2017 - ieeexplore.ieee.org
The pervasiveness of Internet of Things devices in techno-socio-economic domains such as
Smart Cities and Smart Grids results in a massive scale of data about our society. Decision …

Challenges and opportunities for security with differential privacy

C Clifton, B Anandan - … Security: 9th International Conference, ICISS 2013 …, 2013 - Springer
Differential Privacy has recently emerged as a measure for protecting privacy in distorted
data. While this seems to solve many problems, in practice it still leaves a number of security …

Locally private Jaccard similarity estimation

Z Yan, Q Wu, M Ren, J Liu, S Liu… - … : Practice and Experience, 2019 - Wiley Online Library
Jaccard Similarity has been widely used to measure the distance between two sets (or
preference profiles) owned by two different users. Yet, in the private data collection scenario …

Perturb-and-Project: Differentially Private Similarities and Marginals

V Cohen-Addad, T d'Orsi, A Epasto, V Mirrokni… - arXiv preprint arXiv …, 2024 - arxiv.org
We revisit the input perturbations framework for differential privacy where noise is added to
the input $ A\in\mathcal {S} $ and the result is then projected back to the space of admissible …

Privmin: Differentially private minhash for jaccard similarity computation

Z Yan, J Liu, G Li, Z Han, S Qiu - arXiv preprint arXiv:1705.07258, 2017 - arxiv.org
In many industrial applications of big data, the Jaccard Similarity Computation has been
widely used to measure the distance between two profiles or sets respectively owned by two …