Skip to main content

Showing 1–17 of 17 results for author: Kulynych, B

.
  1. arXiv:2503.10945  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    $(\varepsilon, δ)$ Considered Harmful: Best Practices for Reporting Differential Privacy Guarantees

    Authors: Juan Felipe Gomez, Bogdan Kulynych, Georgios Kaissis, Jamie Hayes, Borja Balle, Antti Honkela

    Abstract: Current practices for reporting the level of differential privacy (DP) guarantees for machine learning (ML) algorithms provide an incomplete and potentially misleading picture of the guarantees and make it difficult to compare privacy levels across different settings. We argue for using Gaussian differential privacy (GDP) as the primary means of communicating DP guarantees in ML, with the full pri… ▽ More

    Submitted 13 March, 2025; originally announced March 2025.

  2. arXiv:2501.10366  [pdf, other

    cs.CY cs.AI cs.LG

    Participatory Assessment of Large Language Model Applications in an Academic Medical Center

    Authors: Giorgia Carra, Bogdan Kulynych, François Bastardot, Daniel E. Kaufmann, Noémie Boillat-Blanco, Jean Louis Raisaro

    Abstract: Although Large Language Models (LLMs) have shown promising performance in healthcare-related applications, their deployment in the medical domain poses unique challenges of ethical, regulatory, and technical nature. In this study, we employ a systematic participatory approach to investigate the needs and expectations regarding clinical applications of LLMs at Lausanne University Hospital, an acade… ▽ More

    Submitted 9 December, 2024; originally announced January 2025.

    Comments: MeurIPS GenAI for Health Workshop

  3. arXiv:2407.02191  [pdf, other

    cs.LG cs.AI cs.CR math.ST stat.ML

    Attack-Aware Noise Calibration for Differential Privacy

    Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso

    Abstract: Differential privacy (DP) is a widely used approach for mitigating privacy risks when training machine learning models on sensitive data. DP mechanisms add noise during training to limit the risk of information leakage. The scale of the added noise is critical, as it determines the trade-off between privacy and utility. The standard practice is to select the noise scale to satisfy a given privacy… ▽ More

    Submitted 7 November, 2024; v1 submitted 2 July, 2024; originally announced July 2024.

    Comments: Appears in NeurIPS 2024

  4. arXiv:2402.12235  [pdf, other

    cs.LG cs.CR

    The Fundamental Limits of Least-Privilege Learning

    Authors: Theresa Stadler, Bogdan Kulynych, Michael C. Gastpar, Nicolas Papernot, Carmela Troncoso

    Abstract: The promise of least-privilege learning -- to find feature representations that are useful for a learning task but prevent inference of any sensitive information unrelated to this task -- is highly appealing. However, so far this concept has only been stated informally. It thus remains an open question whether and how we can achieve this goal. In this work, we provide the first formalisation of th… ▽ More

    Submitted 26 June, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  5. arXiv:2308.12820  [pdf, other

    cs.LG cs.CY stat.ML

    Prediction without Preclusion: Recourse Verification with Reachable Sets

    Authors: Avni Kothari, Bogdan Kulynych, Tsui-Wei Weng, Berk Ustun

    Abstract: Machine learning models are often used to decide who receives a loan, a job interview, or a public benefit. Models in such settings use features without considering their actionability. As a result, they can assign predictions that are fixed $-$ meaning that individuals who are denied loans and interviews are, in fact, precluded from access to credit and employment. In this work, we introduce a pr… ▽ More

    Submitted 1 May, 2024; v1 submitted 24 August, 2023; originally announced August 2023.

    Comments: ICLR 2024 Spotlight. The first two authors contributed equally

  6. arXiv:2302.14517  [pdf, other

    cs.LG cs.CR cs.CY stat.ML

    Arbitrary Decisions are a Hidden Cost of Differentially Private Training

    Authors: Bogdan Kulynych, Hsiang Hsu, Carmela Troncoso, Flavio P. Calmon

    Abstract: Mechanisms used in privacy-preserving machine learning often aim to guarantee differential privacy (DP) during model training. Practical DP-ensuring training methods use randomization when fitting model parameters to privacy-sensitive data (e.g., adding Gaussian noise to clipped gradients). We demonstrate that such randomization incurs predictive multiplicity: for a given input example, the output… ▽ More

    Submitted 15 May, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: To appear in ACM FAccT 2023

  7. arXiv:2208.13058  [pdf, other

    cs.LG cs.CR

    Adversarial Robustness for Tabular Data through Cost and Utility Awareness

    Authors: Klim Kireev, Bogdan Kulynych, Carmela Troncoso

    Abstract: Many safety-critical applications of machine learning, such as fraud or abuse detection, use data in tabular domains. Adversarial examples can be particularly damaging for these applications. Yet, existing works on adversarial robustness primarily focus on machine-learning models in image and text domains. We argue that, due to the differences between tabular data and images or text, existing thre… ▽ More

    Submitted 24 February, 2023; v1 submitted 27 August, 2022; originally announced August 2022.

    Comments: The first two authors contributed equally. To appear in the proceedings of NDSS 2023

  8. arXiv:2204.03230  [pdf, other

    cs.LG cs.AI cs.CR cs.CV stat.ML

    What You See is What You Get: Principled Deep Learning via Distributional Generalization

    Authors: Bogdan Kulynych, Yao-Yuan Yang, Yaodong Yu, Jarosław Błasiok, Preetum Nakkiran

    Abstract: Having similar behavior at training time and test time $-$ what we call a "What You See Is What You Get" (WYSIWYG) property $-$ is desirable in machine learning. Models trained with standard stochastic gradient descent (SGD), however, do not necessarily have this property, as their complex behaviors such as robustness or subgroup performance can differ drastically between training and test time. I… ▽ More

    Submitted 17 October, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: First two authors contributed equally. To appear in NeurIPS 2022

  9. arXiv:2107.10302  [pdf, other

    cs.CR cs.CY cs.LG

    Adversarial for Good? How the Adversarial ML Community's Values Impede Socially Beneficial Uses of Attacks

    Authors: Kendra Albert, Maggie Delano, Bogdan Kulynych, Ram Shankar Siva Kumar

    Abstract: Attacks from adversarial machine learning (ML) have the potential to be used "for good": they can be used to run counter to the existing power structures within ML, creating breathing space for those who would otherwise be the targets of surveillance and control. But most research on adversarial ML has not engaged in developing tools for resistance against ML systems. Why? In this paper, we review… ▽ More

    Submitted 15 September, 2021; v1 submitted 11 July, 2021; originally announced July 2021.

    Comments: Author list is ordered alphabetically as there is equal contribution. 4 pages Accepted by the ICML 2021 workshop on "A Blessing in Disguise:The Prospects and Perils of Adversarial Machine Learning"

  10. arXiv:2107.01824  [pdf, other

    cs.CV

    Exploring Data Pipelines through the Process Lens: a Reference Model forComputer Vision

    Authors: Agathe Balayn, Bogdan Kulynych, Seda Guerses

    Abstract: Researchers have identified datasets used for training computer vision (CV) models as an important source of hazardous outcomes, and continue to examine popular CV datasets to expose their harms. These works tend to treat datasets as objects, or focus on particular steps in data production pipelines. We argue here that we could further systematize our analysis of harms by examining CV data pipelin… ▽ More

    Submitted 5 July, 2021; originally announced July 2021.

    Comments: Presented at the CVPR workshop 2021 Beyond Fair Computer Vision

  11. zksk: A Library for Composable Zero-Knowledge Proofs

    Authors: Wouter Lueks, Bogdan Kulynych, Jules Fasquelle, Simon Le Bail-Collet, Carmela Troncoso

    Abstract: Zero-knowledge proofs are an essential building block in many privacy-preserving systems. However, implementing these proofs is tedious and error-prone. In this paper, we present zksk, a well-documented Python library for defining and computing sigma protocols: the most popular class of zero-knowledge proofs. In zksk, proofs compose: programmers can convert smaller proofs into building blocks that… ▽ More

    Submitted 10 November, 2019; v1 submitted 6 November, 2019; originally announced November 2019.

    Comments: Appears in 2019 Workshop on Privacy in the Electronic Society (WPES'19)

  12. arXiv:1906.00389  [pdf, other

    cs.LG cs.CR cs.CY stat.ML

    Disparate Vulnerability to Membership Inference Attacks

    Authors: Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso

    Abstract: A membership inference attack (MIA) against a machine-learning model enables an attacker to determine whether a given data record was part of the model's training data or not. In this paper, we provide an in-depth study of the phenomenon of disparate vulnerability against MIAs: unequal success rate of MIAs against different population subgroups. We first establish necessary and sufficient conditio… ▽ More

    Submitted 16 September, 2021; v1 submitted 2 June, 2019; originally announced June 2019.

    Comments: To appear in Privacy-Enhancing Technologies Symposium (PETS) 2022. This version has an updated authors list

  13. arXiv:1811.11293  [pdf, other

    cs.CY cs.LG

    Questioning the assumptions behind fairness solutions

    Authors: Rebekah Overdorf, Bogdan Kulynych, Ero Balsa, Carmela Troncoso, Seda Gürses

    Abstract: In addition to their benefits, optimization systems can have negative economic, moral, social, and political effects on populations as well as their environments. Frameworks like fairness have been proposed to aid service providers in addressing subsequent bias and discrimination during data collection and algorithm design. However, recent reports of neglect, unresponsiveness, and malevolence cast… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: Presented at Critiquing and Correcting Trends in Machine Learning (NeurIPS 2018 Workshop), Montreal, Canada. This is a short version of arXiv:1806.02711

  14. arXiv:1810.10939  [pdf, other

    cs.LG cs.CR stat.ML

    Evading classifiers in discrete domains with provable optimality guarantees

    Authors: Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso

    Abstract: Machine-learning models for security-critical applications such as bot, malware, or spam detection, operate in constrained discrete domains. These applications would benefit from having provable guarantees against adversarial examples. The existing literature on provable adversarial robustness of models, however, exclusively focuses on robustness to gradient-based attacks in domains such as images… ▽ More

    Submitted 1 July, 2019; v1 submitted 25 October, 2018; originally announced October 2018.

    Comments: NeurIPS 2018 Workshop on Security in Machine Learning

  15. POTs: Protective Optimization Technologies

    Authors: Bogdan Kulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses

    Abstract: Algorithmic fairness aims to address the economic, moral, social, and political impact that digital systems have on populations through solutions that can be applied by service providers. Fairness frameworks do so, in part, by mapping these problems to a narrow definition and assuming the service providers can be trusted to deploy countermeasures. Not surprisingly, these decisions limit fairness f… ▽ More

    Submitted 26 January, 2020; v1 submitted 7 June, 2018; originally announced June 2018.

    Comments: Appears in Conference on Fairness, Accountability, and Transparency (FAT* 2020). Bogdan Kulynych and Rebekah Overdorf contributed equally to this work. Version v1/v2 by Seda Gürses, Rebekah Overdorf, and Ero Balsa was presented at HotPETS 2018 and at PiMLAI 2018

  16. arXiv:1711.04992  [pdf, other

    stat.ML cs.LG

    Feature importance scores and lossless feature pruning using Banzhaf power indices

    Authors: Bogdan Kulynych, Carmela Troncoso

    Abstract: Understanding the influence of features in machine learning is crucial to interpreting models and selecting the best features for classification. In this work we propose the use of principles from coalitional game theory to reason about importance of features. In particular, we propose the use of the Banzhaf power index as a measure of influence of features on the outcome of a classifier. We show… ▽ More

    Submitted 3 December, 2017; v1 submitted 14 November, 2017; originally announced November 2017.

    Comments: Presented at NIPS 2017 Symposium on Interpretable Machine Learning

  17. ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

    Authors: Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso

    Abstract: The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand. In Autocrypt the encryption keys are attached directly to messages, and thus the encryption can be implemented by email clients without any collaboration of the providers. The dec… ▽ More

    Submitted 12 October, 2018; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: Appears in 2018 Workshop on Privacy in the Electronic Society (WPES'18)