Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Milad Nasr"'
Autor:
Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:332-350
Label differential privacy is a relaxation of differential privacy for machine learning scenarios where the labels are the only sensitive information that needs to be protected in the training data. For example, imagine a survey from a participant in
Publikováno v:
CCS
There is significant enthusiasm for the employment of Deep Neural Networks (DNNs) for important tasks in major wireless communication systems: channel estimation and decoding in orthogonal frequency division multiplexing (OFDM) systems, end-to-end au
Publikováno v:
IEEE Symposium on Security and Privacy
Differentially private (DP) machine learning allows us to train models on private data while limiting data leakage. DP formalizes this data leakage through a cryptographic game, where an adversary must predict if a model was trained on a dataset D, o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fa205157f52abab9efc64d8b236b3d89
Publikováno v:
NDSS
Autor:
Milad Nasr, Michael Carl Tschantz
Publikováno v:
FAT*
Interactions between bids to show ads online can lead to an advertiser's ad being shown to more men than women even when the advertiser does not target towards men. We design bidding strategies that advertisers can use to avoid such emergent discrimi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::711fe7f1d87b7701ea5be5c905f37bc0
http://arxiv.org/abs/1909.02156
http://arxiv.org/abs/1909.02156
Publikováno v:
NDSS
Publikováno v:
CCS
Machine learning models leak information about the datasets on which they are trained. An adversary can build an algorithm to trace the individual members of a model's training dataset. As a fundamental inference attack, he aims to distinguish betwee
Publikováno v:
CCS
Traffic analysis is the practice of inferring sensitive information from communication patterns, particularly packet timings and packet sizes. Traffic analysis is increasingly becoming relevant to security and privacy with the growing use of encrypti
Publikováno v:
CCS
Decoy routing is an emerging approach for censorship circumvention in which circumvention is implemented with help from a number of volunteer Internet autonomous systems, called decoy ASes. Recent studies on decoy routing consider all decoy routing s
Autor:
Amir Houmansadr, Milad Nasr
Publikováno v:
ACM Conference on Computer and Communications Security
Decoy routing is a promising new approach for censorship circumvention that relies on traffic re-direction by volunteer autonomous systems. Decoy routing is subject to a fundamental censorship attack, called routing around decoy (RAD), in which the c