Skip to main content

Showing 1–12 of 12 results for author: Torra, V

.
  1. arXiv:2502.04260  [pdf, other

    cs.LG

    Realistic Image-to-Image Machine Unlearning via Decoupling and Knowledge Retention

    Authors: Ayush K. Varshney, Vicenç Torra

    Abstract: Machine Unlearning allows participants to remove their data from a trained machine learning model in order to preserve their privacy, and security. However, the machine unlearning literature for generative models is rather limited. The literature for image-to-image generative model (I2I model) considers minimizing the distance between Gaussian noise and the output of I2I model for forget samples a… ▽ More

    Submitted 6 February, 2025; originally announced February 2025.

  2. arXiv:2501.13683  [pdf, other

    cs.LG cs.AI

    Unlearning Clients, Features and Samples in Vertical Federated Learning

    Authors: Ayush K. Varshney, Konstantinos Vandikas, Vicenç Torra

    Abstract: Federated Learning (FL) has emerged as a prominent distributed learning paradigm. Within the scope of privacy preservation, information privacy regulations such as GDPR entitle users to request the removal (or unlearning) of their contribution from a service that is hosting the model. For this purpose, a server hosting an ML model must be able to unlearn certain information in cases such as copyri… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

    Comments: Paper accepted for publication in PETS 2025, Issue II

  3. arXiv:2410.09947  [pdf, other

    cs.CR cs.LG

    Efficient Federated Unlearning under Plausible Deniability

    Authors: Ayush K. Varshney, Vicenç Torra

    Abstract: Privacy regulations like the GDPR in Europe and the CCPA in the US allow users the right to remove their data ML applications. Machine unlearning addresses this by modifying the ML parameters in order to forget the influence of a specific data point on its weights. Recent literature has highlighted that the contribution from data point(s) can be forged with some other data points in the dataset wi… ▽ More

    Submitted 13 October, 2024; originally announced October 2024.

    Comments: This paper has been accepted for publication in the journal track (Springer Machine Learning) of ACML 2024. Published version will be available after the conference. The source code is available at https://github.com/Ayush-Umu/Federated-Unlearning-under-Plausible-Deniability

  4. arXiv:2406.04903  [pdf, other

    cs.LG cs.CR

    Concept Drift Detection using Ensemble of Integrally Private Models

    Authors: Ayush K. Varshney, Vicenc Torra

    Abstract: Deep neural networks (DNNs) are one of the most widely used machine learning algorithm. DNNs requires the training data to be available beforehand with true labels. This is not feasible for many real-world problems where data arrives in the streaming form and acquisition of true labels are scarce and expensive. In the literature, not much focus has been given to the privacy prospect of the streami… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: Accepted for publication in MLCS co-located with ECML-PKDD 2023

  5. arXiv:2211.12150  [pdf, ps, other

    cs.AI math.PR

    The transport problem for non-additive measures

    Authors: Vicenç Torra

    Abstract: Non-additive measures, also known as fuzzy measures, capacities, and monotonic games, are increasingly used in different fields. Applications have been built within computer science and artificial intelligence related to e.g. decision making, image processing, machine learning for both classification, and regression. Tools for measure identification have been built. In short, as non-additive measu… ▽ More

    Submitted 8 December, 2022; v1 submitted 22 November, 2022; originally announced November 2022.

  6. Literature Review of the Recent Trends and Applications in various Fuzzy Rule based systems

    Authors: Ayush K. Varshney, Vicenç Torra

    Abstract: Fuzzy rule based systems (FRBSs) is a rule-based system which uses linguistic fuzzy variables as antecedents and consequent to represent human understandable knowledge. They have been applied to various applications and areas throughout the soft computing literature. However, FRBSs suffers from many drawbacks such as uncertainty representation, high number of rules, interpretability loss, high com… ▽ More

    Submitted 16 May, 2023; v1 submitted 15 September, 2022; originally announced September 2022.

    Comments: 49 pages, Accepted for publication in ijfs

    Journal ref: Int. J. Fuzzy Syst. (2023)

  7. arXiv:1907.08849  [pdf, ps, other

    cs.CR cs.CY

    Next Generation Resilient Cyber-Physical Systems

    Authors: Michel Barbeau, Georg Carle, Joaquin Garcia-Alfaro, Vicenç Torra

    Abstract: Cyber-Physical Systems (CPS) consist of distributed engineered environments where the monitoring and surveillance tasks are governed by tightly integrated computing, communication and control technologies. CPS are omnipresent in our everyday life. Hacking and failures of such systems have impact on critical services with potentially significant and lasting consequences. In this paper, we review wh… ▽ More

    Submitted 8 November, 2019; v1 submitted 20 July, 2019; originally announced July 2019.

    Comments: 6 pages, 45 references

  8. Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics

    Authors: Giuseppe D'Acquisto, Josep Domingo-Ferrer, Panayiotis Kikiras, Vicenç Torra, Yves-Alexandre de Montjoye, Athena Bourka

    Abstract: The extensive collection and processing of personal information in big data analytics has given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling, and disclosure of private data. To reap the benefits of analytics without invading the individuals' private sphere, it is essential to draw the limits of big data processing and integrate data protection safeguar… ▽ More

    Submitted 18 December, 2015; originally announced December 2015.

    Comments: 80 pages. European Union Agency for Network and Information Security (ENISA) report, December 2015, ISBN 978-92-9204-160-1. https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/big-data-protection/

    MSC Class: 94A60 ACM Class: K.4.1; D.4.6; H.2.0

  9. arXiv:1401.0458  [pdf

    cs.CR

    The effect of constraints on information loss and risk for clustering and modification based graph anonymization methods

    Authors: David F. Nettleton, Vicenc Torra, Anton Dries

    Abstract: In this paper we present a novel approach for anonymizing Online Social Network graphs which can be used in conjunction with existing perturbation approaches such as clustering and modification. The main insight of this paper is that by imposing additional constraints on which nodes can be selected we can reduce the information loss with respect to key structural metrics, while maintaining an acce… ▽ More

    Submitted 1 July, 2014; v1 submitted 2 January, 2014; originally announced January 2014.

    Comments: 21 pages, 6 figures, 7 tables

    Report number: This research is partially supported by the Spanish MEC (projects ARES CONSOLIDER INGENIO 2010 CSD2007-00004--eAEGISTSI2007-65406-C03-02--and HIPERGRAPH TIN2009-14560-C03-01) MSC Class: 05C85 ACM Class: E.1; G.2.2; I.2.8; K.4.1

  10. arXiv:1310.0229  [pdf, ps, other

    cs.DB cs.SI

    Evolutionary Algorithm for Graph Anonymization

    Authors: Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra

    Abstract: In recent years there has been a significant increase in the use of graphs as a tool for representing information. It is very important to preserve the privacy of users when one wants to publish this information, especially in the case of social graphs. In this case, it is essential to implement an anonymization process in the data in order to preserve users' privacy. In this paper we present an a… ▽ More

    Submitted 26 March, 2014; v1 submitted 1 October, 2013; originally announced October 2013.

    Comments: 6 pages

  11. arXiv:1301.5022  [pdf, ps, other

    cs.CR cs.AI cs.IT

    A formalization of re-identification in terms of compatible probabilities

    Authors: Vicenç Torra, Klara Stokes

    Abstract: Re-identification algorithms are used in data privacy to measure disclosure risk. They model the situation in which an adversary attacks a published database by means of linking the information of this adversary with the database. In this paper we formalize this type of algorithm in terms of true probabilities and compatible belief functions. The purpose of this work is to leave aside as re-iden… ▽ More

    Submitted 21 January, 2013; originally announced January 2013.

  12. arXiv:1112.1978  [pdf, ps, other

    cs.CR math.CO

    Reidentification and k-anonymity: a model for disclosure risk in graphs

    Authors: Klara Stokes, Vicenç Torra

    Abstract: In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k- anonymity. After a short survey on the different available definitions of k- anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the corre… ▽ More

    Submitted 12 March, 2012; v1 submitted 8 December, 2011; originally announced December 2011.