Skip to main content

Showing 1–29 of 29 results for author: Decouchant, J

.
  1. Tolerating Disasters with Hierarchical Consensus

    Authors: Wassim Yahyaoui, Joachim Bruneau-Queyreix, Jérémie Decouchant, Marcus Völp

    Abstract: Geo-replication provides disaster recovery after catastrophic accidental failures or attacks, such as fires, blackouts or denial-of-service attacks to a data center or region. Naturally distributed data structures, such as Blockchains, when well designed, are immune against such disruptions, but they also benefit from leveraging locality. In this work, we consolidate the performance of geo-replica… ▽ More

    Submitted 30 April, 2025; originally announced April 2025.

    Journal ref: IEEE INFOCOM 2024 - IEEE Conference on Computer Communications, May 2024, Vancouver, France. pp.1241-1250

  2. arXiv:2504.05143  [pdf, other

    cs.CR

    Taming Double-Spending in Offline Payments with Reputation-Weighted Loan Networks

    Authors: Nektarios Evangelou, Rowdy Chotkan, Bulat Nasrulin, Jérémie Decouchant

    Abstract: Blockchain solutions typically assume a synchronous network to ensure consistency and achieve consensus. In contrast, offline transaction systems aim to enable users to agree on and execute transactions without assuming bounded communication delays when interacting with the blockchain. Most existing offline payment schemes depend on trusted hardware wallets that are assumed to be secure and tamper… ▽ More

    Submitted 7 April, 2025; originally announced April 2025.

  3. arXiv:2503.03392  [pdf, other

    cs.DC cs.SE

    SoK: Microservice Architectures from a Dependability Perspective

    Authors: Dāvis Kažemaks, Jérémie Decouchant

    Abstract: The microservice software architecture leverages the idea of splitting large monolithic applications into multiple smaller services that interact using lightweight communication schemes. While the microservice architecture has proven its ability to support modern business applications, it also introduces new possible weak points in a system. Some scientific literature surveys have already addresse… ▽ More

    Submitted 5 March, 2025; originally announced March 2025.

  4. arXiv:2410.21923  [pdf, other

    cs.DC

    Optimizing Streamlined Blockchain Consensus with Generalized Weighted Voting and Enhanced Leader Rotation

    Authors: Diana Micloiu, Rowdy Chotkan, Jérémie Decouchant

    Abstract: Streamlined Byzantine Fault Tolerant (BFT) protocols, such as HotStuff [PODC'19], and weighted voting represent two possible strategies to improve consensus in the distributed systems world. Several studies have been conducted on both techniques, but the research on combining the two is scarce. To cover this knowledge gap, we introduce a weighted voting approach on Hotstuff, along with two optimis… ▽ More

    Submitted 29 October, 2024; originally announced October 2024.

    Comments: This work has been done in the context of a Bachelor research project, see https://resolver.tudelft.nl/uuid:907bd47c-394a-4e26-b901-de713159dcb8

  5. Partition Detection in Byzantine Networks

    Authors: Yérom-David Bromberg, Jérémie Decouchant, Manon Sourisseau, François Taïani

    Abstract: Detecting and handling network partitions is a fundamental requirement of distributed systems. Although existing partition detection methods in arbitrary graphs tolerate unreliable networks, they either assume that all nodes are correct or that a limited number of nodes might crash. In particular, Byzantine behaviors are out of the scope of these algorithms despite Byzantine fault tolerance being… ▽ More

    Submitted 27 August, 2024; originally announced August 2024.

    Journal ref: 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS), Jul 2024, Jersey City, France. pp.139-150

  6. arXiv:2408.08060  [pdf, other

    cs.DC

    Reliable Communication in Hybrid Authentication and Trust Models

    Authors: Rowdy Chotkan, Bart Cox, Vincent Rahli, Jérémie Decouchant

    Abstract: Reliable communication is a fundamental distributed communication abstraction that allows any two nodes of a network to communicate with each other. It is necessary for more powerful communication primitives, such as broadcast and consensus. Using different authentication models, two classical protocols implement reliable communication in unknown and sufficiently connected networks. In the first o… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

  7. arXiv:2406.12575  [pdf, other

    cs.LG cs.DC

    Training Diffusion Models with Federated Learning

    Authors: Matthijs de Goede, Bart Cox, Jérémie Decouchant

    Abstract: The training of diffusion-based models for image generation is predominantly controlled by a select few Big Tech companies, raising concerns about privacy, copyright, and data authority due to their lack of transparency regarding training data. To ad-dress this issue, we propose a federated diffusion model scheme that enables the independent and collaborative training of diffusion models without e… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: Replacement of: http://resolver.tudelft.nl/uuid:49e11cf3-5a0a-40bc-9a62-1d7fe05fbe4d. Name of the algorithm has been changed slightly due to a name collision with another paper

    ACM Class: I.2.11

  8. arXiv:2406.02015  [pdf, other

    cs.LG cs.DC

    Parameterizing Federated Continual Learning for Reproducible Research

    Authors: Bart Cox, Jeroen Galjaard, Aditya Shankar, Jérémie Decouchant, Lydia Y. Chen

    Abstract: Federated Learning (FL) systems evolve in heterogeneous and ever-evolving environments that challenge their performance. Under real deployments, the learning tasks of clients can also evolve with time, which calls for the integration of methodologies such as Continual Learning. To enable research reproducibility, we propose a set of experimental best practices that precisely capture and emulate co… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: Preprint: Accepted at the 1st WAFL (Workshop on Advancements in Federated Learning) workshop, ECML-PKDD 2023

    ACM Class: I.2.11

  9. arXiv:2406.01439  [pdf, other

    cs.LG cs.DC

    Asynchronous Multi-Server Federated Learning for Geo-Distributed Clients

    Authors: Yuncong Zuo, Bart Cox, Lydia Y. Chen, Jérémie Decouchant

    Abstract: Federated learning (FL) systems enable multiple clients to train a machine learning model iteratively through synchronously exchanging the intermediate model weights with a single server. The scalability of such FL systems can be limited by two factors: server idle time due to synchronous communication and the risk of a single server becoming the bottleneck. In this paper, we propose a new FL arch… ▽ More

    Submitted 20 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    ACM Class: I.2.11

  10. arXiv:2406.01438  [pdf, other

    cs.LG cs.DC

    Asynchronous Byzantine Federated Learning

    Authors: Bart Cox, Abele Mălan, Lydia Y. Chen, Jérémie Decouchant

    Abstract: Federated learning (FL) enables a set of geographically distributed clients to collectively train a model through a server. Classically, the training process is synchronous, but can be made asynchronous to maintain its speed in presence of slow clients and in heterogeneous networks. The vast majority of Byzantine fault-tolerant FL systems however rely on a synchronous training process. Our solutio… ▽ More

    Submitted 20 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    ACM Class: I.2.11

  11. arXiv:2405.20761  [pdf, other

    cs.LG cs.CR cs.DC

    Share Secrets for Privacy: Confidential Forecasting with Vertical Federated Learning

    Authors: Aditya Shankar, Jérémie Decouchant, Dimitra Gkorou, Rihan Hai, Lydia Y. Chen

    Abstract: Vertical federated learning (VFL) is a promising area for time series forecasting in many applications, such as healthcare and manufacturing. Critical challenges to address include data privacy and over-fitting on small and noisy datasets during both training and inference. Additionally, such forecasting models must scale well with the number of parties while ensuring strong convergence and low-tu… ▽ More

    Submitted 11 June, 2025; v1 submitted 31 May, 2024; originally announced May 2024.

    Comments: Accepted at the 20th International Conference on Availability, Reliability and Security (ARES 2025)

  12. arXiv:2405.15055  [pdf, other

    cs.LG

    CCBNet: Confidential Collaborative Bayesian Networks Inference

    Authors: Abele Mălan, Jérémie Decouchant, Thiago Guzella, Lydia Chen

    Abstract: Effective large-scale process optimization in manufacturing industries requires close cooperation between different human expert parties who encode their knowledge of related domains as Bayesian network models. For instance, Bayesian networks for domains such as lithography equipment, processes, and auxiliary tools must be conjointly used to effectively identify process optimizations in the semico… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  13. arXiv:2404.17990  [pdf, other

    cs.LG cs.DC

    TabVFL: Improving Latent Representation in Vertical Federated Learning

    Authors: Mohamed Rashad, Zilong Zhao, Jeremie Decouchant, Lydia Y. Chen

    Abstract: Autoencoders are popular neural networks that are able to compress high dimensional data to extract relevant latent information. TabNet is a state-of-the-art neural network model designed for tabular data that utilizes an autoencoder architecture for training. Vertical Federated Learning (VFL) is an emerging distributed machine learning paradigm that allows multiple parties to train a model collab… ▽ More

    Submitted 25 June, 2024; v1 submitted 27 April, 2024; originally announced April 2024.

    Comments: This document is a preprint of a paper accepted at IEEE SRDS 2024

  14. arXiv:2310.09006  [pdf, other

    cs.DC cs.SE

    Liveness Checking of the HotStuff Protocol Family

    Authors: Jérémie Decouchant, Burcu Kulahcioglu Ozkan, Yanzhuo Zhou

    Abstract: Byzantine consensus protocols aim at maintaining safety guarantees under any network synchrony model and at providing liveness in partially or fully synchronous networks. However, several Byzantine consensus protocols have been shown to violate liveness properties under certain scenarios. Existing testing methods for checking the liveness of consensus protocols check for time-bounded liveness viol… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

    Comments: Preprint of a paper accepted at IEEE PRDC 2023

  15. arXiv:2307.04184  [pdf, other

    cs.CR cs.DC cs.NI eess.SY

    Intrusion Resilience Systems for Modern Vehicles

    Authors: Ali Shoker, Vincent Rahli, Jeremie Decouchant, Paulo Esteves-Verissimo

    Abstract: Current vehicular Intrusion Detection and Prevention Systems either incur high false-positive rates or do not capture zero-day vulnerabilities, leading to safety-critical risks. In addition, prevention is limited to few primitive options like dropping network packets or extreme options, e.g., ECU Bus-off state. To fill this gap, we introduce the concept of vehicular Intrusion Resilience Systems (I… ▽ More

    Submitted 9 July, 2023; originally announced July 2023.

    Journal ref: In the 97th IEEE Vehicular Technology Conference: VTC2023

  16. arXiv:2307.02081  [pdf, other

    cs.CR cs.DC

    LØ: An Accountable Mempool for MEV Resistance

    Authors: Bulat Nasrulin, Georgy Ishmaev, Jérémie Decouchant, Johan Pouwelse

    Abstract: Possible manipulation of user transactions by miners in a permissionless blockchain systems is a growing concern. This problem is a pervasive and systemic issue, known as Miner Extractable Value (MEV), incurs highs costs on users of decentralised applications. Furthermore, transaction manipulations create other issues in blockchain systems such as congestion, higher fees, and system instability. D… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

  17. arXiv:2210.14072  [pdf, other

    cs.CR cs.DC

    Leveraging the Verifier's Dilemma to Double Spend in Bitcoin

    Authors: Tong Cao, Jérémie Decouchant, Jiangshan Yu

    Abstract: We describe and analyze perishing mining, a novel block-withholding mining strategy that lures profit-driven miners away from doing useful work on the public chain by releasing block headers from a privately maintained chain. We then introduce the dual private chain (DPC) attack, where an adversary that aims at double spending increases its success rate by intermittently dedicating part of its has… ▽ More

    Submitted 8 February, 2023; v1 submitted 25 October, 2022; originally announced October 2022.

  18. arXiv:2210.06154  [pdf, other

    cs.LG cs.DC

    Aergia: Leveraging Heterogeneity in Federated Learning Systems

    Authors: Bart Cox, Lydia Y. Chen, Jérémie Decouchant

    Abstract: Federated Learning (FL) is a popular approach for distributed deep learning that prevents the pooling of large amounts of data in a central server. FL relies on clients to update a global model using their local datasets. Classical FL algorithms use a central federator that, for each training round, waits for all clients to send their model updates before aggregating them. In practical deployments… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: This paper is accepted at the 23rd ACM/IFIP International Middleware Conference (Middleware '22)

    ACM Class: I.2.11

  19. arXiv:2208.14947  [pdf

    cs.DC cs.CR

    Secure and Distributed Assessment of Privacy-Preserving Releases of GWAS

    Authors: Túlio Pascoal, Jérémie Decouchant, Marcus Völp

    Abstract: Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome data holders that spans multiple institutional and legislative domains to securely compute GWAS results. However, these algorithms have limited applicability, since… ▽ More

    Submitted 20 September, 2022; v1 submitted 31 August, 2022; originally announced August 2022.

  20. arXiv:2208.10161  [pdf, other

    cs.CR cs.AI cs.LG

    MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-Preserving Byzantine-Robust Clustering

    Authors: Rui Wang, Xingkai Wang, Huanhuan Chen, Jérémie Decouchant, Stjepan Picek, Nikolaos Laoutaris, Kaitai Liang

    Abstract: Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. FLTrust (NDSS '21) and Zeno++ (ICML '20) do not make such an honest majority assumption but can only be applied to scenarios where the server is prov… ▽ More

    Submitted 14 November, 2023; v1 submitted 22 August, 2022; originally announced August 2022.

  21. arXiv:2208.08361  [pdf

    q-bio.GN cs.CR cs.DC cs.IR

    I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies

    Authors: Túlio Pascoal, Jérémie Decouchant, Antoine Boutet, Marcus Völp

    Abstract: Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS statistics might give rise to privacy attacks. Several works attempted to reconcile secure processing with privacy-preserving releases of GWASes. However, we highlight that these approaches remain… ▽ More

    Submitted 20 September, 2022; v1 submitted 17 August, 2022; originally announced August 2022.

  22. arXiv:2208.05339  [pdf, other

    cs.DC cs.CR

    Distributed Attestation Revocation in Self-Sovereign Identity

    Authors: Rowdy Chotkan, Jérémie Decouchant, Johan Pouwelse

    Abstract: Self-Sovereign Identity (SSI) aspires to create a standardised identity layer for the Internet by placing citizens at the centre of their data, thereby weakening the grip of big tech on current digital identities. However, as millions of both physical and digital identities are lost annually, it is also necessary for SSIs to possibly be revoked to prevent misuse. Previous attempts at designing a r… ▽ More

    Submitted 12 August, 2022; v1 submitted 10 August, 2022; originally announced August 2022.

    Comments: 8 pages, accepted at Local Computer Networks 2022, LCN 2022

  23. arXiv:2207.11615  [pdf, other

    cs.CR cs.DC

    SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony

    Authors: Oğuzhan Ersoy, Jérémie Decouchant, Satwik Prabhu Kimble, Stefanie Roos

    Abstract: Payment channel networks (PCNs) enhance the scalability of blockchains by allowing parties to conduct transactions off-chain, i.e, without broadcasting every transaction to all blockchain participants. To conduct transactions, a sender and a receiver can either establish a direct payment channel with a funding blockchain transaction or leverage existing channels in a multi-hop payment. The securit… ▽ More

    Submitted 4 August, 2022; v1 submitted 23 July, 2022; originally announced July 2022.

    Comments: Preprint of a paper accepted at the ACM conference on Advances in Financial Technologies (AFT 2022)

  24. arXiv:2204.13784  [pdf, other

    cs.LG cs.DC

    AGIC: Approximate Gradient Inversion Attack on Federated Learning

    Authors: Jin Xu, Chi Hong, Jiyue Huang, Lydia Y. Chen, Jérémie Decouchant

    Abstract: Federated learning is a private-by-design distributed learning paradigm where clients train local models on their own data before a central server aggregates their local updates to compute a global model. Depending on the aggregation method used, the local updates are either the gradients or the weights of local learning models. Recent reconstruction attacks apply a gradient inversion optimization… ▽ More

    Submitted 14 July, 2022; v1 submitted 28 April, 2022; originally announced April 2022.

    Comments: This paper is accepted at the 41st International Symposium on Reliable Distributed Systems (SRDS 2022)

  25. arXiv:2204.11017  [pdf, other

    cs.LG cs.DC

    Federated Geometric Monte Carlo Clustering to Counter Non-IID Datasets

    Authors: Federico Lucchetti, Jérémie Decouchant, Maria Fernandes, Lydia Y. Chen, Marcus Völp

    Abstract: Federated learning allows clients to collaboratively train models on datasets that are acquired in different locations and that cannot be exchanged because of their size or regulations. Such collected data is increasingly non-independent and non-identically distributed (non-IID), negatively affecting training accuracy. Previous works tried to mitigate the effects of non-IID datasets on training ac… ▽ More

    Submitted 23 April, 2022; originally announced April 2022.

  26. arXiv:2104.03673  [pdf, other

    cs.DC cs.DS cs.NI

    Practical Byzantine Reliable Broadcast on Partially Connected Networks (Extended version)

    Authors: Silvia Bonomi, Jérémie Decouchant, Giovanni Farina, Vincent Rahli, Sébastien Tixeuil

    Abstract: In this paper, we consider the Byzantine reliable broadcast problem on authenticated and partially connected networks. The state-of-the-art method to solve this problem consists in combining two algorithms from the literature. Handling asynchrony and faulty senders is typically done thanks to Gabriel Bracha's authenticated double-echo broadcast protocol, which assumes an asynchronous fully connect… ▽ More

    Submitted 26 February, 2024; v1 submitted 8 April, 2021; originally announced April 2021.

    Comments: This is an extended version of a paper that appeared at the IEEE ICDCS 2021 conference

  27. PISTIS: An Event-Triggered Real-Time Byzantine-Resilient Protocol Suite

    Authors: David Kozhaya, Jeremie Decouchant, Vincent Rahli, Paulo Esteves-Verissimo

    Abstract: The accelerated digitalisation of society along with technological evolution have extended the geographical span of cyber-physical systems. Two main threats have made the reliable and real-time control of these systems challenging: (i) uncertainty in the communication infrastructure induced by scale, and heterogeneity of the environment and devices; and (ii) targeted attacks maliciously worsening… ▽ More

    Submitted 18 March, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: This is an extended version of a journal article, which appears in the IEEE Transactions on Parallel and Distributed Systems

  28. arXiv:2005.04519  [pdf, other

    cs.DC cs.CR cs.NI

    PriLok: Citizen-protecting distributed epidemic tracing

    Authors: Paulo Esteves-Verissimo, Jérémie Decouchant, Marcus Völp, Alireza Esfahani, Rafal Graczyk

    Abstract: Contact tracing is an important instrument for national health services to fight epidemics. As part of the COVID-19 situation, many proposals have been made for scaling up contract tracing capacities with the help of smartphone applications, an important but highly critical endeavor due to the privacy risks involved in such solutions. Extending our previously expressed concern, we clearly articula… ▽ More

    Submitted 1 June, 2020; v1 submitted 9 May, 2020; originally announced May 2020.

  29. arXiv:1807.01226  [pdf, other

    cs.DC

    RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast

    Authors: David Kozhaya, Jérémie Decouchant, Paulo Esteves-Verissimo

    Abstract: Today's cyber-physical systems face various impediments to achieving their intended goals, namely, communication uncertainties and faults, relative to the increased integration of networked and wireless devices, hinder the synchronism needed to meet real-time deadlines. Moreover, being critical, these systems are also exposed to significant security threats. This threat combination increases the r… ▽ More

    Submitted 3 July, 2018; originally announced July 2018.

    Comments: 19 pages