Skip to main content

Showing 1–14 of 14 results for author: Braghin, S

.
  1. arXiv:2407.13043  [pdf, other

    cs.CR

    INTELLECT: Adapting Cyber Threat Detection to Heterogeneous Computing Environments

    Authors: Simone Magnani, Liubov Nedoshivina, Roberto Doriguzzi-Corin, Stefano Braghin, Domenico Siracusa

    Abstract: The widespread adoption of cloud computing, edge, and IoT has increased the attack surface for cyber threats. This is due to the large-scale deployment of often unsecured, heterogeneous devices with varying hardware and software configurations. The diversity of these devices attracts a wide array of potential attack methods, making it challenging for individual organizations to have comprehensive… ▽ More

    Submitted 21 July, 2024; v1 submitted 17 July, 2024; originally announced July 2024.

    Comments: 14 pages, 10 figures, 4 tables, 3 algorithms, submitted to Elsevier Computers and Security

  2. arXiv:2212.08290  [pdf, other

    cs.LG cs.CV

    Robust Learning Protocol for Federated Tumor Segmentation Challenge

    Authors: Ambrish Rawat, Giulio Zizzo, Swanand Kadhe, Jonathan P. Epperlein, Stefano Braghin

    Abstract: In this work, we devise robust and efficient learning protocols for orchestrating a Federated Learning (FL) process for the Federated Tumor Segmentation Challenge (FeTS 2022). Enabling FL for FeTS setup is challenging mainly due to data heterogeneity among collaborators and communication cost of training. To tackle these challenges, we propose Robust Learning Protocol (RoLePRO) which is a combinat… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

    Comments: 14 pages, 2 figures, 3 tables

  3. arXiv:2108.13785  [pdf, other

    cs.CR cs.CY

    DLPFS: The Data Leakage Prevention FileSystem

    Authors: Stefano Braghin, Marco Simioni, Mathieu Sinn

    Abstract: Shared folders are still a common practice for granting third parties access to data files, regardless of the advances in data sharing technologies. Services like Google Drive, Dropbox, Box, and others, provide infrastructures and interfaces to manage file sharing. The human factor is the weakest link and data leaks caused by human error are regrettable common news. This takes place as both mishan… ▽ More

    Submitted 31 August, 2021; originally announced August 2021.

    Comments: 11 pages, 11 figures

  4. arXiv:2108.04780  [pdf, other

    cs.CR

    Secure k-Anonymization over Encrypted Databases

    Authors: Manish Kesarwani, Akshar Kaul, Stefano Braghin, Naoise Holohan, Spiros Antonatos

    Abstract: Data protection algorithms are becoming increasingly important to support modern business needs for facilitating data sharing and data monetization. Anonymization is an important step before data sharing. Several organizations leverage on third parties for storing and managing data. However, third parties are often not trusted to store plaintext personal and sensitive data; data encryption is wide… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

  5. arXiv:2107.10138  [pdf, other

    cs.CR

    Secure Random Sampling in Differential Privacy

    Authors: Naoise Holohan, Stefano Braghin

    Abstract: Differential privacy is among the most prominent techniques for preserving privacy of sensitive data, oweing to its robust mathematical guarantees and general applicability to a vast array of computations on data, including statistical analysis and machine learning. Previous work demonstrated that concrete implementations of differential privacy mechanisms are vulnerable to statistical attacks. Th… ▽ More

    Submitted 24 November, 2021; v1 submitted 21 July, 2021; originally announced July 2021.

  6. arXiv:1907.02444  [pdf, other

    cs.CR cs.LG

    Diffprivlib: The IBM Differential Privacy Library

    Authors: Naoise Holohan, Stefano Braghin, Pól Mac Aonghusa, Killian Levacher

    Abstract: Since its conception in 2006, differential privacy has emerged as the de-facto standard in data privacy, owing to its robust mathematical guarantees, generalised applicability and rich body of literature. Over the years, researchers have studied differential privacy and its applicability to an ever-widening field of topics. Mechanisms have been created to optimise the process of achieving differen… ▽ More

    Submitted 4 July, 2019; originally announced July 2019.

  7. arXiv:1906.09829  [pdf, other

    cs.CR cs.DB

    AnonTokens: tracing re-identification attacks through decoy records

    Authors: Spiros Antonatos, Stefano Braghin, Naoise Holohan, Pol MacAonghusa

    Abstract: Privacy is of the utmost concern when it comes to releasing data to third parties. Data owners rely on anonymization approaches to safeguard the released datasets against re-identification attacks. However, even with strict anonymization in place, re-identification attacks are still a possibility and in many cases a reality. Prior art has focused on providing better anonymization algorithms with m… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  8. arXiv:1808.10410  [pdf, ps, other

    cs.CR

    The Bounded Laplace Mechanism in Differential Privacy

    Authors: Naoise Holohan, Spiros Antonatos, Stefano Braghin, Pól Mac Aonghusa

    Abstract: The Laplace mechanism is the workhorse of differential privacy, applied to many instances where numerical data is processed. However, the Laplace mechanism can return semantically impossible values, such as negative counts, due to its infinite support. There are two popular solutions to this: (i) bounding/capping the output values and (ii) bounding the mechanism support. In this paper, we show tha… ▽ More

    Submitted 30 August, 2018; originally announced August 2018.

  9. arXiv:1710.01615  [pdf, other

    cs.CR cs.DB math.PR

    ($k$,$ε$)-Anonymity: $k$-Anonymity with $ε$-Differential Privacy

    Authors: Naoise Holohan, Spiros Antonatos, Stefano Braghin, Pól Mac Aonghusa

    Abstract: The explosion in volume and variety of data offers enormous potential for research and commercial use. Increased availability of personal data is of particular interest in enabling highly customised services tuned to individual needs. Preserving the privacy of individuals against reidentification attacks in this fast-moving ecosystem poses significant challenges for a one-size fits all approach to… ▽ More

    Submitted 4 October, 2017; originally announced October 2017.

  10. arXiv:1412.7990  [pdf, other

    cs.IR cs.CY cs.LG

    Predicting User Engagement in Twitter with Collaborative Ranking

    Authors: Ernesto Diaz-Aviles, Hoang Thanh Lam, Fabio Pinelli, Stefano Braghin, Yiannis Gkoufas, Michele Berlingerio, Francesco Calabrese

    Abstract: Collaborative Filtering (CF) is a core component of popular web-based services such as Amazon, YouTube, Netflix, and Twitter. Most applications use CF to recommend a small set of items to the user. For instance, YouTube presents to a user a list of top-n videos she would likely watch next based on her rating and viewing history. Current methods of CF evaluation have been focused on assessing the q… ▽ More

    Submitted 26 December, 2014; originally announced December 2014.

    Comments: RecSysChallenge'14 at RecSys 2014, October 10, 2014, Foster City, CA, USA

    ACM Class: H.3.3; I.2.6

    Journal ref: In Proceedings of the 2014 Recommender Systems Challenge (RecSysChallenge'14). ACM, New York, NY, USA, , Pages 41 , 6 pages

  11. arXiv:1403.2514  [pdf, other

    cs.CR

    Answering queries using pairings

    Authors: Alberto Trombetta, Giuseppe Persiano, Stefano Braghin

    Abstract: Outsourcing data in the cloud has become nowadays very common. Since -- generally speaking -- cloud data storage and management providers cannot be fully trusted, mechanisms providing the confidentiality of the stored data are necessary. A possible solution is to encrypt all the data, but -- of course -- this poses serious problems about the effective usefulness of the stored data. In this work, w… ▽ More

    Submitted 11 March, 2014; originally announced March 2014.

    Comments: 18 pages, 5 figures

  12. arXiv:1307.2756  [pdf, other

    cs.CR cs.SI

    Secure and Policy-Private Resource Sharing in an Online Social Network

    Authors: Stefano Braghin, Vincenzo Iovino, Giuseppe Persiano, Alberto Trombetta

    Abstract: Providing functionalities that allow online social network users to manage in a secure and private way the publication of their information and/or resources is a relevant and far from trivial topic that has been under scrutiny from various research communities. In this work, we provide a framework that allows users to define highly expressive access policies to their resources in a way that the en… ▽ More

    Submitted 10 July, 2013; originally announced July 2013.

  13. arXiv:1303.0646  [pdf, other

    cs.SI cs.IR physics.soc-ph

    The Zen of Multidisciplinary Team Recommendation

    Authors: Anwitaman Datta, Stefano Braghin, Jackson Tan Teck Yong

    Abstract: In order to accomplish complex tasks, it is often necessary to compose a team consisting of experts with diverse competencies. However, for proper functioning, it is also preferable that a team be socially cohesive. A team recommendation system, which facilitates the search for potential team members can be of great help both for (i) individuals who need to seek out collaborators and (ii) managers… ▽ More

    Submitted 4 March, 2013; originally announced March 2013.

  14. arXiv:1206.1653  [pdf, other

    cs.DC

    PriSM: A Private Social Mesh for Leveraging Social Networking at Workplace

    Authors: Stefano Braghin, Jackson Tan, Rajesh Sharma, Anwitaman Datta

    Abstract: In this work we describe the PriSM framework for decentralized deployment of a federation of autonomous social networks (ASN). The individual ASNs are centrally managed by organizations according to their institutional needs, while cross-ASN interactions are facilitated subject to security and confidentiality requirements specified by administrators and users of the ASNs. Such decentralized deploy… ▽ More

    Submitted 5 June, 2013; v1 submitted 7 June, 2012; originally announced June 2012.