Skip to main content

Showing 1–3 of 3 results for author: Gama, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.01546  [pdf, other

    cs.LG cs.AI cs.CR cs.DC cs.MA eess.SY

    Privacy-Preserving Distributed Learning for Residential Short-Term Load Forecasting

    Authors: Yi Dong, Yingjie Wang, Mariana Gama, Mustafa A. Mustafa, Geert Deconinck, Xiaowei Huang

    Abstract: In the realm of power systems, the increasing involvement of residential users in load forecasting applications has heightened concerns about data privacy. Specifically, the load data can inadvertently reveal the daily routines of residential users, thereby posing a risk to their property security. While federated learning (FL) has been employed to safeguard user privacy by enabling model training… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  2. arXiv:2004.09397  [pdf, other

    cs.LG stat.ML

    Multi-label Stream Classification with Self-Organizing Maps

    Authors: Ricardo Cerri, Joel David Costa Júnior, Elaine Ribeiro de Faria Paiva, João Manuel Portela da Gama

    Abstract: Several learning algorithms have been proposed for offline multi-label classification. However, applications in areas such as traffic monitoring, social networks, and sensors produce data continuously, the so called data streams, posing challenges to batch multi-label learning. With the lack of stationarity in the distribution of data streams, new algorithms are needed to online adapt to such chan… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: 7 pages, 14 figures

    ACM Class: I.2.6

  3. arXiv:2001.11911  [pdf, ps, other

    quant-ph cs.CR

    A Private Quantum Bit String Commitment

    Authors: Mariana Gama, Paulo Mateus, André Souto

    Abstract: We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property is not resilient against man-in-the-middle attacks, this threat can be circumvented by considering that the parties communicate through an authenticat… ▽ More

    Submitted 31 January, 2020; originally announced January 2020.

    Comments: 8 pages, 4 figures