Zum Hauptinhalt springen

Showing 1–41 of 41 results for author: Shokri, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.05131  [pdf, other

    cs.LG

    Range Membership Inference Attacks

    Authors: Jiashu Tao, Reza Shokri

    Abstract: Machine learning models can leak private information about their training data, but the standard methods to measure this risk, based on membership inference attacks (MIAs), have a major limitation. They only check if a given data point \textit{exactly} matches a training point, neglecting the potential of similar or partially overlapping data revealing the same private information. To address this… ▽ More

    Submitted 9 August, 2024; originally announced August 2024.

  2. arXiv:2407.14206  [pdf, ps, other

    cs.LG

    Watermark Smoothing Attacks against Language Models

    Authors: Hongyan Chang, Hamed Hassani, Reza Shokri

    Abstract: Watermarking is a technique used to embed a hidden signal in the probability distribution of text generated by large language models (LLMs), enabling attribution of the text to the originating model. We introduce smoothing attacks and show that existing watermarking methods are not robust against minor modifications of text. An adversary can use weaker language models to smooth out the distributio… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

  3. arXiv:2405.19471  [pdf, other

    cs.LG cs.AI cs.CR

    The Data Minimization Principle in Machine Learning

    Authors: Prakhar Ganesh, Cuong Tran, Reza Shokri, Ferdinando Fioretto

    Abstract: The principle of data minimization aims to reduce the amount of data collected, processed or retained to minimize the potential for misuse, unauthorized access, or data breaches. Rooted in privacy-by-design principles, data minimization has been endorsed by various global data protection regulations. However, its practical implementation remains a challenge due to the lack of a rigorous formulatio… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  4. arXiv:2312.03262  [pdf, other

    stat.ML cs.CR cs.LG

    Low-Cost High-Power Membership Inference Attacks

    Authors: Sajjad Zarifzadeh, Philippe Liu, Reza Shokri

    Abstract: Membership inference attacks aim to detect if a particular data point was used in training a model. We design a novel statistical test to perform robust membership inference attacks (RMIA) with low computational overhead. We achieve this by a fine-grained modeling of the null hypothesis in our likelihood ratio tests, and effectively leveraging both reference models and reference population data sa… ▽ More

    Submitted 12 June, 2024; v1 submitted 5 December, 2023; originally announced December 2023.

    Comments: ICML 2024

  5. arXiv:2310.20579  [pdf, other

    stat.ML cs.CR cs.LG

    Initialization Matters: Privacy-Utility Analysis of Overparameterized Neural Networks

    Authors: Jiayuan Ye, Zhenyu Zhu, Fanghui Liu, Reza Shokri, Volkan Cevher

    Abstract: We analytically investigate how over-parameterization of models in randomized machine learning algorithms impacts the information leakage about their training data. Specifically, we prove a privacy bound for the KL divergence between model distributions on worst-case neighboring datasets, and explore its dependence on the initialization, width, and depth of fully connected neural networks. We find… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  6. arXiv:2310.19973  [pdf, other

    stat.ML cs.CR cs.LG math.ST stat.ME

    Unified Enhancement of Privacy Bounds for Mixture Mechanisms via $f$-Differential Privacy

    Authors: Chendi Wang, Buxin Su, Jiayuan Ye, Reza Shokri, Weijie J. Su

    Abstract: Differentially private (DP) machine learning algorithms incur many sources of randomness, such as random initialization, random batch subsampling, and shuffling. However, such randomness is difficult to take into account when proving differential privacy bounds because it induces mixture distributions for the algorithm's output that are difficult to analyze. This paper focuses on improving privacy… ▽ More

    Submitted 1 November, 2023; v1 submitted 30 October, 2023; originally announced October 2023.

  7. arXiv:2310.17884  [pdf, other

    cs.AI cs.CL cs.CR

    Can LLMs Keep a Secret? Testing Privacy Implications of Language Models via Contextual Integrity Theory

    Authors: Niloofar Mireshghallah, Hyunwoo Kim, Xuhui Zhou, Yulia Tsvetkov, Maarten Sap, Reza Shokri, Yejin Choi

    Abstract: The interactive use of large language models (LLMs) in AI assistants (at work, home, etc.) introduces a new set of inference-time privacy risks: LLMs are fed different types of information from multiple sources in their inputs and are expected to reason about what to share in their outputs, for what purpose and with whom, within a given context. In this work, we draw attention to the highly critic… ▽ More

    Submitted 28 June, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

    Comments: 2024 ICLR Spotlight. The dataset and code can be found at https://confaide.github.io

  8. arXiv:2309.17310  [pdf, other

    cs.LG

    Leave-one-out Distinguishability in Machine Learning

    Authors: Jiayuan Ye, Anastasia Borovykh, Soufiane Hayou, Reza Shokri

    Abstract: We introduce an analytical framework to quantify the changes in a machine learning algorithm's output distribution following the inclusion of a few data points in its training set, a notion we define as leave-one-out distinguishability (LOOD). This is key to measuring data **memorization** and information **leakage** as well as the **influence** of training data points in machine learning. We illu… ▽ More

    Submitted 17 April, 2024; v1 submitted 29 September, 2023; originally announced September 2023.

    Comments: ICLR 2024

  9. arXiv:2309.05505  [pdf, other

    cs.LG stat.ML

    Share Your Representation Only: Guaranteed Improvement of the Privacy-Utility Tradeoff in Federated Learning

    Authors: Zebang Shen, Jiayuan Ye, Anmin Kang, Hamed Hassani, Reza Shokri

    Abstract: Repeated parameter sharing in federated learning causes significant information leakage about private data, thus defeating its main purpose: data privacy. Mitigating the risk of this information leakage, using state of the art differentially private algorithms, also does not come for free. Randomized mechanisms can prevent convergence of models on learning even the useful representation functions,… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Comments: ICLR 2023 revised

  10. arXiv:2309.02160  [pdf, other

    cs.LG cs.CY stat.ML

    Bias Propagation in Federated Learning

    Authors: Hongyan Chang, Reza Shokri

    Abstract: We show that participating in federated learning can be detrimental to group fairness. In fact, the bias of a few parties against under-represented groups (identified by sensitive attributes such as gender or race) can propagate through the network to all the parties in the network. We analyze and explain bias propagation in federated learning on naturally partitioned real-world datasets. Our anal… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

    Journal ref: The Eleventh International Conference on Learning Representations, 2023

  11. On The Impact of Machine Learning Randomness on Group Fairness

    Authors: Prakhar Ganesh, Hongyan Chang, Martin Strobel, Reza Shokri

    Abstract: Statistical measures for group fairness in machine learning reflect the gap in performance of algorithms across different groups. These measures, however, exhibit a high variance between different training instances, which makes them unreliable for empirical evaluation of fairness. What causes this high variance? We investigate the impact on group fairness of different sources of randomness in tra… ▽ More

    Submitted 9 July, 2023; originally announced July 2023.

    Comments: 10 pages + Appendix

  12. arXiv:2305.09859  [pdf, other

    cs.CL cs.LG

    Smaller Language Models are Better Black-box Machine-Generated Text Detectors

    Authors: Niloofar Mireshghallah, Justus Mattern, Sicun Gao, Reza Shokri, Taylor Berg-Kirkpatrick

    Abstract: With the advent of fluent generative language models that can produce convincing utterances very similar to those written by humans, distinguishing whether a piece of text is machine-generated or human-written becomes more challenging and more important, as such models could be used to spread misinformation, fake news, fake reviews and to mimic certain authors and figures. To this end, there have… ▽ More

    Submitted 24 February, 2024; v1 submitted 16 May, 2023; originally announced May 2023.

  13. Data Privacy and Trustworthy Machine Learning

    Authors: Martin Strobel, Reza Shokri

    Abstract: The privacy risks of machine learning models is a major concern when training them on sensitive and personal data. We discuss the tradeoffs between data privacy and the remaining goals of trustworthy machine learning (notably, fairness, robustness, and explainability).

    Submitted 14 September, 2022; originally announced September 2022.

    Comments: Copyright ©2022, IEEE

    Journal ref: Published in: IEEE Security & Privacy ( Volume: 20, Issue: 5, Sept.-Oct. 2022)

  14. arXiv:2204.00032  [pdf, other

    cs.CR cs.LG stat.ML

    Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets

    Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini

    Abstract: We introduce a new class of attacks on machine learning models. We show that an adversary who can poison a training dataset can cause models trained on this dataset to leak significant private details of training points belonging to other parties. Our active inference attacks connect two independent lines of work targeting the integrity and privacy of machine learning training data. Our attacks… ▽ More

    Submitted 6 October, 2022; v1 submitted 31 March, 2022; originally announced April 2022.

    Comments: ACM CCS 2022

  15. arXiv:2203.05363  [pdf, other

    stat.ML cs.CR cs.LG

    Differentially Private Learning Needs Hidden State (Or Much Faster Convergence)

    Authors: Jiayuan Ye, Reza Shokri

    Abstract: Prior work on differential privacy analysis of randomized SGD algorithms relies on composition theorems, where the implicit (unrealistic) assumption is that the internal state of the iterative algorithm is revealed to the adversary. As a result, the Rényi DP bounds derived by such composition-based analyses linearly grow with the number of training epochs. When the internal state of the algorithm… ▽ More

    Submitted 17 October, 2022; v1 submitted 10 March, 2022; originally announced March 2022.

  16. arXiv:2203.03929  [pdf, other

    cs.LG cs.AI cs.CR

    Quantifying Privacy Risks of Masked Language Models Using Membership Inference Attacks

    Authors: Fatemehsadat Mireshghallah, Kartik Goyal, Archit Uniyal, Taylor Berg-Kirkpatrick, Reza Shokri

    Abstract: The wide adoption and application of Masked language models~(MLMs) on sensitive data (from legal to medical) necessitates a thorough quantitative investigation into their privacy vulnerabilities -- to what extent do MLMs leak information about their training data? Prior attempts at measuring leakage of MLMs via membership inference attacks have been inconclusive, implying the potential robustness… ▽ More

    Submitted 3 November, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

  17. arXiv:2202.05520  [pdf, other

    stat.ML cs.CL cs.LG

    What Does it Mean for a Language Model to Preserve Privacy?

    Authors: Hannah Brown, Katherine Lee, Fatemehsadat Mireshghallah, Reza Shokri, Florian Tramèr

    Abstract: Natural language reflects our private lives and identities, making its privacy concerns as broad as those of real life. Language models lack the ability to understand the context and sensitivity of text, and tend to memorize phrases present in their training sets. An adversary can exploit this tendency to extract training data. Depending on the nature of the content and the context in which this d… ▽ More

    Submitted 14 February, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

    Comments: 21 pages, 2 figures

  18. arXiv:2111.09679  [pdf, other

    cs.LG cs.CR stat.ML

    Enhanced Membership Inference Attacks against Machine Learning Models

    Authors: Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri

    Abstract: How much does a machine learning algorithm leak about its training data, and why? Membership inference attacks are used as an auditing tool to quantify this leakage. In this paper, we present a comprehensive \textit{hypothesis testing framework} that enables us not only to formally express the prior work in a consistent way, but also to design new membership inference attacks that use reference mo… ▽ More

    Submitted 13 September, 2022; v1 submitted 18 November, 2021; originally announced November 2021.

    Comments: To appear at ACM CCS 2022

  19. arXiv:2102.05855  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Differential Privacy Dynamics of Langevin Diffusion and Noisy Gradient Descent

    Authors: Rishav Chourasia, Jiayuan Ye, Reza Shokri

    Abstract: What is the information leakage of an iterative randomized learning algorithm about its training data, when the internal state of the algorithm is \emph{private}? How much is the contribution of each specific training epoch to the information leakage through the released model? We study this problem for noisy gradient descent algorithms, and model the \emph{dynamics} of Rényi differential privacy… ▽ More

    Submitted 8 September, 2022; v1 submitted 11 February, 2021; originally announced February 2021.

  20. arXiv:2011.03731  [pdf, other

    stat.ML cs.CR cs.CY cs.LG

    On the Privacy Risks of Algorithmic Fairness

    Authors: Hongyan Chang, Reza Shokri

    Abstract: Algorithmic fairness and privacy are essential pillars of trustworthy machine learning. Fair machine learning aims at minimizing discrimination against protected groups by, for example, imposing a constraint on models to equalize their behavior across different groups. This can subsequently change the influence of training data points on the fair model, in a disproportionate way. We study how this… ▽ More

    Submitted 7 April, 2021; v1 submitted 7 November, 2020; originally announced November 2020.

  21. arXiv:2007.12934  [pdf, other

    cs.CR cs.LG stat.ML

    SOTERIA: In Search of Efficient Neural Networks for Private Inference

    Authors: Anshul Aggarwal, Trevor E. Carlson, Reza Shokri, Shruti Tople

    Abstract: ML-as-a-service is gaining popularity where a cloud server hosts a trained model and offers prediction (inference) service to users. In this setting, our objective is to protect the confidentiality of both the users' input queries as well as the model parameters at the server, with modest computation and communication overhead. Prior solutions primarily propose fine-tuning cryptographic methods to… ▽ More

    Submitted 25 July, 2020; originally announced July 2020.

  22. arXiv:2007.11524  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising

    Authors: Milad Nasr, Reza Shokri, Amir houmansadr

    Abstract: Deep learning models leak significant amounts of information about their training datasets. Previous work has investigated training models with differential privacy (DP) guarantees through adding DP noise to the gradients. However, such solutions (specifically, DPSGD), result in large degradations in the accuracy of the trained models. In this paper, we aim at training deep learning models with DP… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

  23. arXiv:2007.09339  [pdf, other

    cs.CR cs.LG

    ML Privacy Meter: Aiding Regulatory Compliance by Quantifying the Privacy Risks of Machine Learning

    Authors: Sasi Kumar Murakonda, Reza Shokri

    Abstract: When building machine learning models using sensitive data, organizations should ensure that the data processed in such systems is adequately protected. For projects involving machine learning on personal data, Article 35 of the GDPR mandates it to perform a Data Protection Impact Assessment (DPIA). In addition to the threats of illegitimate access to data through security breaches, machine learni… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

  24. arXiv:2006.09129  [pdf, other

    cs.LG stat.ML

    Model Explanations with Differential Privacy

    Authors: Neel Patel, Reza Shokri, Yair Zick

    Abstract: Black-box machine learning models are used in critical decision-making domains, giving rise to several calls for more algorithmic transparency. The drawback is that model explanations can leak information about the training data and the explanation data used to generate them, thus undermining data privacy. To address this issue, we propose differentially private algorithms to construct feature-bas… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: 33 pages, 9 figures

  25. arXiv:2006.08669  [pdf, other

    stat.ML cs.CR cs.CY cs.LG

    On Adversarial Bias and the Robustness of Fair Machine Learning

    Authors: Hongyan Chang, Ta Duy Nguyen, Sasi Kumar Murakonda, Ehsan Kazemi, Reza Shokri

    Abstract: Optimizing prediction accuracy can come at the expense of fairness. Towards minimizing discrimination against a group, fair machine learning algorithms strive to equalize the behavior of a model across different groups, by imposing a fairness constraint on models. However, we show that giving the same importance to groups of different sizes and distributions, to counteract the effect of bias in tr… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

  26. arXiv:2004.13293  [pdf, other

    cs.CR

    Epione: Lightweight Contact Tracing with Strong Privacy

    Authors: Ni Trieu, Kareem Shehata, Prateek Saxena, Reza Shokri, Dawn Song

    Abstract: Contact tracing is an essential tool in containing infectious diseases such as COVID-19. Many countries and research groups have launched or announced mobile apps to facilitate contact tracing by recording contacts between users with some privacy considerations. Most of the focus has been on using random tokens, which are exchanged during encounters and stored locally on users' phones. Prior syste… ▽ More

    Submitted 2 May, 2020; v1 submitted 28 April, 2020; originally announced April 2020.

  27. arXiv:1912.11279  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer

    Authors: Hongyan Chang, Virat Shejwalkar, Reza Shokri, Amir Houmansadr

    Abstract: Collaborative (federated) learning enables multiple parties to train a model without sharing their private data, but through repeated sharing of the parameters of their local models. Despite its advantages, this approach has many known privacy and security weaknesses and performance overhead, in addition to being limited only to models with homogeneous architectures. Shared parameters leak a signi… ▽ More

    Submitted 24 December, 2019; originally announced December 2019.

  28. arXiv:1909.12982  [pdf, other

    cs.LG cs.CR stat.ML

    Robust Membership Encoding: Inference Attacks and Copyright Protection for Deep Learning

    Authors: Congzheng Song, Reza Shokri

    Abstract: Machine learning as a service (MLaaS), and algorithm marketplaces are on a rise. Data holders can easily train complex models on their data using third party provided learning codes. Training accurate ML models requires massive labeled data and advanced learning algorithms. The resulting models are considered as intellectual property of the model owners and their copyright should be protected. Als… ▽ More

    Submitted 21 March, 2020; v1 submitted 27 September, 2019; originally announced September 2019.

  29. arXiv:1907.00164  [pdf, other

    cs.LG stat.ML

    On the Privacy Risks of Model Explanations

    Authors: Reza Shokri, Martin Strobel, Yair Zick

    Abstract: Privacy and transparency are two key foundations of trustworthy machine learning. Model explanations offer insights into a model's decisions on input data, whereas privacy is primarily concerned with protecting information about the training data. We analyze connections between model explanations and the leakage of sensitive information about the model's training set. We investigate the privacy ri… ▽ More

    Submitted 5 February, 2021; v1 submitted 29 June, 2019; originally announced July 2019.

    Comments: 19 pages, 13 figures

  30. arXiv:1905.13409  [pdf, other

    cs.LG cs.CR stat.ML

    Bypassing Backdoor Detection Algorithms in Deep Learning

    Authors: Te Juin Lester Tan, Reza Shokri

    Abstract: Deep learning models are vulnerable to various adversarial manipulations of their training data, parameters, and input sample. In particular, an adversary can modify the training data and model parameters to embed backdoors into the model, so the model behaves according to the adversary's objective if the input contains the backdoor features, referred to as the backdoor trigger (e.g., a stamp on a… ▽ More

    Submitted 6 June, 2020; v1 submitted 31 May, 2019; originally announced May 2019.

    Comments: IEEE European Symposium on Security and Privacy 2020

  31. arXiv:1905.12774  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models

    Authors: Sasi Kumar Murakonda, Reza Shokri, George Theodorakopoulos

    Abstract: Models leak information about their training data. This enables attackers to infer sensitive information about their training sets, notably determine if a data sample was part of the model's training set. The existing works empirically show the possibility of these membership inference (tracing) attacks against complex deep learning models. However, the attack results are dependent on the specific… ▽ More

    Submitted 17 February, 2021; v1 submitted 29 May, 2019; originally announced May 2019.

  32. arXiv:1905.10291  [pdf, other

    stat.ML cs.CR cs.LG

    Privacy Risks of Securing Machine Learning Models against Adversarial Examples

    Authors: Liwei Song, Reza Shokri, Prateek Mittal

    Abstract: The arms race between attacks and defenses for machine learning models has come to a forefront in recent years, in both the security community and the privacy community. However, one big limitation of previous research is that the security domain and the privacy domain have typically been considered separately. It is thus unclear whether the defense methods in one domain will have any unexpected i… ▽ More

    Submitted 25 August, 2019; v1 submitted 24 May, 2019; originally announced May 2019.

    Comments: ACM CCS 2019, code is available at https://github.com/inspire-group/privacy-vs-robustness

  33. arXiv:1812.00910  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning

    Authors: Milad Nasr, Reza Shokri, Amir Houmansadr

    Abstract: Deep neural networks are susceptible to various inference attacks as they remember information about their training data. We design white-box inference attacks to perform a comprehensive privacy analysis of deep learning models. We measure the privacy leakage through parameters of fully trained models as well as the parameter updates of models during training. We design inference algorithms for bo… ▽ More

    Submitted 6 June, 2020; v1 submitted 3 December, 2018; originally announced December 2018.

    Comments: 2019 IEEE Symposium on Security and Privacy (SP)

  34. arXiv:1807.05852  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Machine Learning with Membership Privacy using Adversarial Regularization

    Authors: Milad Nasr, Reza Shokri, Amir Houmansadr

    Abstract: Machine learning models leak information about the datasets on which they are trained. An adversary can build an algorithm to trace the individual members of a model's training dataset. As a fundamental inference attack, he aims to distinguish between data points that were part of the model's training set and any other data points from the same distribution. This is known as the tracing (and also… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

  35. arXiv:1803.05961  [pdf, other

    cs.CR

    Chiron: Privacy-preserving Machine Learning as a Service

    Authors: Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel

    Abstract: Major cloud operators offer machine learning (ML) as a service, enabling customers who have the data but not ML expertise or infrastructure to train predictive models on this data. Existing ML-as-a-service platforms require users to reveal all training data to the service operator. We design, implement, and evaluate Chiron, a system for privacy-preserving machine learning as a service. First, Chir… ▽ More

    Submitted 15 March, 2018; originally announced March 2018.

  36. arXiv:1708.07975  [pdf, ps, other

    cs.CR cs.DB cs.LG stat.ML

    Plausible Deniability for Privacy-Preserving Data Synthesis

    Authors: Vincent Bindschaedler, Reza Shokri, Carl A. Gunter

    Abstract: Releasing full data records is one of the most challenging problems in data privacy. On the one hand, many of the popular techniques such as data de-identification are problematic because of their dependence on the background knowledge of adversaries. On the other hand, rigorous methods such as the exponential mechanism for differential privacy are often computationally impractical to use for rele… ▽ More

    Submitted 26 August, 2017; originally announced August 2017.

    Comments: In PVLDB 2017

  37. arXiv:1610.05820  [pdf, other

    cs.CR cs.LG stat.ML

    Membership Inference Attacks against Machine Learning Models

    Authors: Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov

    Abstract: We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if the record was in the model's training dataset. To perform membership inference against a target model, we make adversarial use of machine learnin… ▽ More

    Submitted 31 March, 2017; v1 submitted 18 October, 2016; originally announced October 2016.

    Comments: In the proceedings of the IEEE Symposium on Security and Privacy, 2017

  38. arXiv:1609.00408  [pdf, other

    cs.CR cs.CV

    Defeating Image Obfuscation with Deep Learning

    Authors: Richard McPherson, Reza Shokri, Vitaly Shmatikov

    Abstract: We demonstrate that modern image recognition methods based on artificial neural networks can recover hidden information from images protected by various forms of obfuscation. The obfuscation techniques considered in this paper are mosaicing (also known as pixelation), blurring (as used by YouTube), and P3, a recently proposed system for privacy-preserving photo sharing that encrypts the significan… ▽ More

    Submitted 6 September, 2016; v1 submitted 1 September, 2016; originally announced September 2016.

  39. arXiv:1505.07499  [pdf, other

    cs.CR

    Privacy through Fake yet Semantically Real Traces

    Authors: Vincent Bindschaedler, Reza Shokri

    Abstract: Camouflaging data by generating fake information is a well-known obfuscation technique for protecting data privacy. In this paper, we focus on a very sensitive and increasingly exposed type of data: location data. There are two main scenarios in which fake traces are of extreme value to preserve location privacy: publishing datasets of location trajectories, and using location-based services. Desp… ▽ More

    Submitted 27 May, 2015; originally announced May 2015.

  40. arXiv:1409.1716  [pdf, other

    cs.CR

    Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services

    Authors: George Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec

    Abstract: Human mobility is highly predictable. Individuals tend to only visit a few locations with high frequency, and to move among them in a certain sequence reflecting their habits and daily routine. This predictability has to be taken into account in the design of location privacy preserving mechanisms (LPPMs) in order to effectively protect users when they continuously expose their position to locatio… ▽ More

    Submitted 5 September, 2014; originally announced September 2014.

    Comments: Workshop on Privacy in the Electronic Society (WPES 2014)

    ACM Class: C.2.0

  41. Privacy Games: Optimal User-Centric Data Obfuscation

    Authors: Reza Shokri

    Abstract: In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy (inference error). This double shield of protection limits the information leakage through obfuscation mechanism as well as the posterior inference. W… ▽ More

    Submitted 27 May, 2015; v1 submitted 14 February, 2014; originally announced February 2014.