Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Privacy-Preserving and Diversity-Aware Trust-based Team Formation in Online Social Networks
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 15, Issue 5Article No.: 94, Pages 1–32https://doi.org/10.1145/3670411As online social networks (OSNs) become more prevalent, a new paradigm for problem-solving through crowd-sourcing has emerged. By leveraging the OSN platforms, users can post a problem to be solved and then form a team to collaborate and solve the ...
- posterNovember 2024
Demo Abstract: Privacy-Preserving Room Occupancy Estimation Using Federated Analytics of BLE Packets
SenSys '24: Proceedings of the 22nd ACM Conference on Embedded Networked Sensor SystemsPages 889–890https://doi.org/10.1145/3666025.3699422We present a privacy-preserving room occupancy estimation method using federated analytics of Bluetooth Low Energy (BLE) packets. By processing data locally and reporting only aggregated device counts, our approach preserves user privacy while achieving ...
- short-paperOctober 2024
DP-FedFace: Privacy-Preserving Facial Recognition in Real Federated Scenarios
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 4123–4127https://doi.org/10.1145/3627673.3679901Advanced deep learning-based face recognition models require extensive datasets for optimal performance. However, increasing privacy concerns drive the limitation of face image access on devices to prevent personal information leaks. To address this, ...
- research-articleOctober 2024
Collaborative Fraud Detection on Large Scale Graph Using Secure Multi-Party Computation
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 1473–1482https://doi.org/10.1145/3627673.3679863Enabling various parties to share data enhances online fraud detection capabilities considering fraudsters tend to reuse resources attacking multiple platforms. Multi-party computation (MPC) techniques, such as secret sharing, offer potential privacy-...
- research-articleOctober 2024
Distributed credible evidence fusion with privacy-preserving
AbstractConsidering data safety in more and more applied peer-to-peer networks, such as wireless sensor networks, has become the focus of information fusion, this paper proposes the problem of credible evidence fusion (CEF) in a distributed system with ...
Highlights- A distributed credible evidence fusion method for peer-to-peer networks.
- The privacy of raw evidence is protected.
- Evidence credibility is computed based on evidence comparison.
- Simultaneously conducting credibility estimation ...
-
- ArticleJuly 2024
FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving Strategies
AbstractPermissioned blockchain is often used in multi-consortium applications due to its unique features such as provenance, immutability, and tamper-resistance. For these applications working in a malicious environment, privacy protection is very ...
- surveyJuly 2024
Survey of Federated Learning Models for Spatial-Temporal Mobility Applications
ACM Transactions on Spatial Algorithms and Systems (TSAS), Volume 10, Issue 3Article No.: 18, Pages 1–39https://doi.org/10.1145/3666089Federated learning involves training statistical models over edge devices such as mobile phones such that the training data are kept local. Federated Learning (FL) can serve as an ideal candidate for training spatial temporal models that rely on ...
- research-articleJune 2024
Making Federated Learning Accessible to Scientists: The AI4EOSC Approach
- Judith Sáinz-Pardo Díaz,
- Andrés Heredia Canales,
- Ignacio Heredia Cachá,
- Viet Tran,
- Giang Nguyen,
- Khadijeh Alibabaei,
- Marta Obregón Ruiz,
- Susana Rebolledo Ruiz,
- Álvaro López García
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 253–264https://doi.org/10.1145/3658664.3659642Access to computing resources is a critical requirement for researchers in a wide diversity of areas. This has become even more important with the rise of artificial intelligence techniques through the training of machine learning and deep learning ...
- research-articleNovember 2024
PPGNN: Fast and Accurate Privacy-Preserving Graph Neural Network Inference via Parallel and Pipelined Arithmetic-and-Logic FHE Accelerator
DAC '24: Proceedings of the 61st ACM/IEEE Design Automation ConferenceArticle No.: 273, Pages 1–6https://doi.org/10.1145/3649329.3656517Graph Neural Networks (GNNs) are increasingly used in fields like social media and bioinformatics, promoting the prosperity of cloud-based GNN inference services. Nevertheless, data privacy becomes a critical issue when handling sensitive information. ...
- abstractJune 2024
ICDAR 24: Intelligent Cross-Data Analysis and Retrieval
- Minh-Son Dao,
- Michael Alexander Riegler,
- Duc-Tien Dang-Nguyen,
- Hanh-Nhi Tran,
- Uday Kiran Rage,
- Takahiro Komamizu
ICMR '24: Proceedings of the 2024 International Conference on Multimedia RetrievalPages 1332–1333https://doi.org/10.1145/3652583.3659999Our workshop aims to provide a platform for both academic and industrial professionals engaged in the analysis and retrieval of cross-data from diverse perspectives, with a particular emphasis on wearable and ambient sensors, lifelog cameras, social ...
- research-articleJune 2024
ELSEIR: A Privacy-Preserving Large-Scale Image Retrieval Framework for Outsourced Data Sharing
ICMR '24: Proceedings of the 2024 International Conference on Multimedia RetrievalPages 488–496https://doi.org/10.1145/3652583.3658099Privacy-preserving content-based image retrieval aims to safeguard the security of outsourced private images while maintaining their searchability. However, existing schemes encounter challenges in striking a balance between security, accuracy, and ...
- short-paperMay 2024
A Privacy Preserving Context Sensitive Kernel
WiseML '24: Proceedings of the 2024 ACM Workshop on Wireless Security and Machine LearningPages 20–25https://doi.org/10.1145/3649403.3656483Insider threats and attacks have witnessed a concerning rise in recent years, posing significant risks and financial implications for businesses. Malicious insiders exploit memory dumping tools to leak data, resulting in a substantial surge in data ...
- short-paperMay 2024
LinkGuard: Link Locally Privacy-Preserving Graph Neural Networks with Integrated Denoising and Private Learning
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 593–596https://doi.org/10.1145/3589335.3651533Recent studies have introduced privacy-preserving graph neural networks to safeguard the privacy of sensitive link information in graphs. However, existing link protection mechanisms in GNNs, particularly over decentralized nodes, struggle to strike an ...
- research-articleMay 2024
Federated Heterogeneous Graph Neural Network for Privacy-preserving Recommendation
WWW '24: Proceedings of the ACM Web Conference 2024Pages 3919–3929https://doi.org/10.1145/3589334.3645693The heterogeneous information network (HIN), which contains rich semantics depicted by meta-paths, has emerged as a potent tool for mitigating data sparsity in recommender systems. Existing HIN-based recommender systems operate under the assumption of ...
- research-articleMay 2024
Privacy-preserving Cross-domain Recommendation with Federated Graph Learning
ACM Transactions on Information Systems (TOIS), Volume 42, Issue 5Article No.: 135, Pages 1–29https://doi.org/10.1145/3653448As people inevitably interact with items across multiple domains or various platforms, cross-domain recommendation (CDR) has gained increasing attention. However, the rising privacy concerns limit the practical applications of existing CDR models, since ...
- research-articleApril 2024
Secure Generic Remote Workflow Execution with TEEs
WiDE '24: Proceedings of the 2nd Workshop on Workflows in Distributed EnvironmentsPages 8–13https://doi.org/10.1145/3642978.3652834In scientific environments, the frequent need to process substantial volumes of data poses a common challenge. Individuals tasked with executing these computations frequently encounter a deficit in local computational resources, leading them to opt for ...
- research-articleJune 2024
Anonymizing Test Data in Android: Does It Hurt?
AST '24: Proceedings of the 5th ACM/IEEE International Conference on Automation of Software Test (AST 2024)Pages 88–98https://doi.org/10.1145/3644032.3644463Failure data collected from the field (e.g., failure traces, bug reports, and memory dumps) represent an invaluable source of information for developers who need to reproduce and analyze failures. Unfortunately, field data may include sensitive ...
- posterMay 2024
Improving Privacy in Federated Learning-Based Intrusion Detection for IoT Networks
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 580–583https://doi.org/10.1145/3605098.3636183Federated learning has emerged as a leading machine learning paradigm, promising to preserve data privacy while collaboratively training models. This approach is increasingly finding applications in the Internet of Things, particularly in the context of ...
- chapterMarch 2024
Efficient Clustering on Encrypted Data
AbstractClustering is a significant unsupervised machine learning task widely used for data mining and analysis. Fully homomorphic encryption allows data owners to outsource privacy-preserving computations without interaction. In this paper, we propose a ...
- research-articleMarch 2024
User Consented Federated Recommender System Against Personalized Attribute Inference Attack
WSDM '24: Proceedings of the 17th ACM International Conference on Web Search and Data MiningPages 276–285https://doi.org/10.1145/3616855.3635830Recommender systems can be privacy-sensitive. To protect users' private historical interactions, federated learning has been proposed in distributed learning for user representations. Using federated recommender (FedRec) systems, users can train a shared ...