Skip to main content

Showing 1–22 of 22 results for author: Mokhtar, S B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.09824  [pdf, ps, other

    cs.LG

    A Weighted Loss Approach to Robust Federated Learning under Data Heterogeneity

    Authors: Johan Erbani, Sonia Ben Mokhtar, Pierre-Edouard Portier, Elod Egyed-Zsigmond, Diana Nurbakova

    Abstract: Federated learning (FL) is a machine learning paradigm that enables multiple data holders to collaboratively train a machine learning model without sharing their training data with external parties. In this paradigm, workers locally update a model and share with a central server their updated gradients (or model parameters). While FL seems appealing from a privacy perspective, it opens a number of… ▽ More

    Submitted 12 June, 2025; v1 submitted 11 June, 2025; originally announced June 2025.

  2. arXiv:2506.03746  [pdf, ps, other

    cs.CR cs.DC cs.LG

    Dropout-Robust Mechanisms for Differentially Private and Fully Decentralized Mean Estimation

    Authors: César Sabater, Sonia Ben Mokhtar, Jan Ramon

    Abstract: Achieving differentially private computations in decentralized settings poses significant challenges, particularly regarding accuracy, communication cost, and robustness against information leakage. While cryptographic solutions offer promise, they often suffer from high communication overhead or require centralization in the presence of network failures. Conversely, existing fully decentralized a… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

    Comments: 23 pages, 4 figures

  3. arXiv:2504.17471  [pdf, other

    cs.LG cs.AI cs.DC

    GRANITE : a Byzantine-Resilient Dynamic Gossip Learning Framework

    Authors: Yacine Belal, Mohamed Maouche, Sonia Ben Mokhtar, Anthony Simonet-Boulogne

    Abstract: Gossip Learning (GL) is a decentralized learning paradigm where users iteratively exchange and aggregate models with a small set of neighboring peers. Recent GL approaches rely on dynamic communication graphs built and maintained using Random Peer Sampling (RPS) protocols. Thanks to graph dynamics, GL can achieve fast convergence even over extremely sparse topologies. However, the robustness of GL… ▽ More

    Submitted 24 April, 2025; originally announced April 2025.

  4. arXiv:2503.19063  [pdf, other

    cs.DC

    COoL-TEE: Client-TEE Collaboration for Resilient Distributed Search

    Authors: Matthieu Bettinger, Etienne Rivière, Sonia Ben Mokhtar, Anthony Simonet-Boulogne

    Abstract: Current marketplaces rely on search mechanisms with distributed systems but centralized governance, making them vulnerable to attacks, failures, censorship and biases. While search mechanisms with more decentralized governance (e.g., DeSearch) have been recently proposed, these are still exposed to information head-start attacks (IHS) despite the use of Trusted Execution Environments (TEEs). These… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

  5. arXiv:2503.19055  [pdf, other

    cs.DC

    Reliability is Blind: Collective Incentives for Decentralized Computing Marketplaces without Individual Behavior Information

    Authors: Henry Mont, Matthieu Bettinger, Sonia Ben Mokhtar, Anthony Simonet-Boulogne

    Abstract: In decentralized cloud computing marketplaces, ensuring fair and efficient interactions among asset providers and end-users is crucial. A key concern is meeting agreed-upon service-level objectives like the service's reliability. In this decentralized context, traditional mechanisms often fail to address the complexity of task failures, due to limited available and trustworthy insights into these… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

  6. arXiv:2501.16888  [pdf, other

    cs.IR cs.CR

    Secure Federated Graph-Filtering for Recommender Systems

    Authors: Julien Nicolas, César Sabater, Mohamed Maouche, Sonia Ben Mokhtar, Mark Coates

    Abstract: Recommender systems often rely on graph-based filters, such as normalized item-item adjacency matrices and low-pass filters. While effective, the centralized computation of these components raises concerns about privacy, security, and the ethical use of user data. This work proposes two decentralized frameworks for securely computing these critical graph components without centralizing sensitive i… ▽ More

    Submitted 28 January, 2025; originally announced January 2025.

  7. TEE-based Key-Value Stores: a Survey

    Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Anthony Simonet-Boulogne

    Abstract: Key-Value Stores (KVSs) are No-SQL databases that store data as key-value pairs and have gained popularity due to their simplicity, scalability, and fast retrieval capabilities. However, storing sensitive data in KVSs requires strong security properties to prevent data leakage and unauthorized tampering. While software (SW)-based encryption techniques are commonly used to maintain data confidentia… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

  8. arXiv:2412.12837  [pdf, other

    cs.LG cs.DC

    Scrutinizing the Vulnerability of Decentralized Learning to Membership Inference Attacks

    Authors: Ousmane Touat, Jezekael Brunon, Yacine Belal, Julien Nicolas, Mohamed Maouche, César Sabater, Sonia Ben Mokhtar

    Abstract: The primary promise of decentralized learning is to allow users to engage in the training of machine learning models in a collaborative manner while keeping their data on their premises and without relying on any central entity. However, this paradigm necessitates the exchange of model parameters or gradients between peers. Such exchanges can be exploited to infer sensitive information about train… ▽ More

    Submitted 6 February, 2025; v1 submitted 17 December, 2024; originally announced December 2024.

    Comments: Adding acknowledgments 12 pages, 8 figures

  9. arXiv:2411.01931  [pdf, ps, other

    cs.LG cs.CR math.NA stat.ML

    Differentially private and decentralized randomized power method

    Authors: Julien Nicolas, César Sabater, Mohamed Maouche, Sonia Ben Mokhtar, Mark Coates

    Abstract: The randomized power method has gained significant interest due to its simplicity and efficient handling of large-scale spectral analysis and recommendation tasks. However, its application to large datasets containing personal information (e.g., web interactions, search history, personal tastes) raises critical privacy problems. This paper addresses these issues by proposing enhanced privacy-prese… ▽ More

    Submitted 12 June, 2025; v1 submitted 4 November, 2024; originally announced November 2024.

  10. arXiv:2306.08929  [pdf, other

    cs.IR cs.CR cs.LG cs.SI

    Inferring Communities of Interest in Collaborative Learning-based Recommender Systems

    Authors: Yacine Belal, Sonia Ben Mokhtar, Mohamed Maouche, Anthony Simonet-Boulogne

    Abstract: Collaborative-learning-based recommender systems, such as those employing Federated Learning (FL) and Gossip Learning (GL), allow users to train models while keeping their history of liked items on their devices. While these methods were seen as promising for enhancing privacy, recent research has shown that collaborative learning can be vulnerable to various privacy attacks. In this paper, we pro… ▽ More

    Submitted 15 April, 2025; v1 submitted 15 June, 2023; originally announced June 2023.

    ACM Class: H.3.3; I.2.6; I.2.11; K.6.5

  11. arXiv:2305.05257  [pdf, other

    cs.LG cs.AI cs.DC cs.IR cs.SI

    Survey of Federated Learning Models for Spatial-Temporal Mobility Applications

    Authors: Yacine Belal, Sonia Ben Mokhtar, Hamed Haddadi, Jaron Wang, Afra Mashhadi

    Abstract: Federated learning involves training statistical models over edge devices such as mobile phones such that the training data is kept local. Federated Learning (FL) can serve as an ideal candidate for training spatial temporal models that rely on heterogeneous and potentially massive numbers of participants while preserving the privacy of highly sensitive location data. However, there are unique cha… ▽ More

    Submitted 8 February, 2024; v1 submitted 9 May, 2023; originally announced May 2023.

    ACM Class: A.1; D.4.6; H.4.3; H.5.6; I.2.6; I.5.3; I.5.8

  12. Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

    Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni

    Abstract: Federated Learning (FL) opens new perspectives for training machine learning models while keeping personal data on the users premises. Specifically, in FL, models are trained on the users devices and only model updates (i.e., gradients) are sent to a central server for aggregation purposes. However, the long list of inference attacks that leak private data from gradients, published in the recent y… ▽ More

    Submitted 15 October, 2022; v1 submitted 11 August, 2022; originally announced August 2022.

    Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197

  13. arXiv:2208.05320  [pdf, other

    cs.IR cs.DC cs.LG cs.NI

    PEPPER: Empowering User-Centric Recommender Systems over Gossip Learning

    Authors: Yacine Belal, Aurélien Bellet, Sonia Ben Mokhtar, Vlad Nitu

    Abstract: Recommender systems are proving to be an invaluable tool for extracting user-relevant content helping users in their daily activities (e.g., finding relevant places to visit, content to consume, items to purchase). However, to be effective, these systems need to collect and analyze large volumes of personal data (e.g., location check-ins, movie ratings, click rates .. etc.), which exposes users to… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: 23 pages, 15 figures

    Report number: 101

    Journal ref: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2022

  14. arXiv:2205.08938  [pdf, other

    cs.DC

    SplitBFT: Improving Byzantine Fault Tolerance Safety Using Trusted Compartments

    Authors: Ines Messadi, Markus Horst Becker, Kai Bleeke, Leander Jehl, Sonia Ben Mokhtar, Rüdiger Kapitza

    Abstract: Byzantine fault-tolerant agreement (BFT) in a partially synchronous system usually requires 3f + 1 nodes to tolerate f faulty replicas. Due to their high throughput and finality property BFT algorithms build the core of recent permissioned blockchains. As a complex and resource-demanding infrastructure, multiple cloud providers have started offering Blockchain-as-a-Service. This eases the deployme… ▽ More

    Submitted 24 May, 2022; v1 submitted 18 May, 2022; originally announced May 2022.

  15. Enhancing Robustness of On-line Learning Models on Highly Noisy Data

    Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen

    Abstract: Classification algorithms have been widely adopted to detect anomalies for various systems, e.g., IoT, cloud and face recognition, under the common assumption that the data source is clean, i.e., features and labels are correctly set. However, data collected from the wild can be unreliable due to careless annotations or malicious data transformation for incorrect anomaly detection. In this paper,… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

    Comments: Published in IEEE Transactions on Dependable and Secure Computing. arXiv admin note: substantial text overlap with arXiv:1911.04383

  16. arXiv:1911.04383  [pdf, other

    cs.LG stat.ML

    RAD: On-line Anomaly Detection for Highly Unreliable Data

    Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen

    Abstract: Classification algorithms have been widely adopted to detect anomalies for various systems, e.g., IoT, cloud and face recognition, under the common assumption that the data source is clean, i.e., features and labels are correctly set. However, data collected from the wild can be unreliable due to careless annotations or malicious data transformation for incorrect anomaly detection. In this paper,… ▽ More

    Submitted 11 November, 2019; originally announced November 2019.

  17. X-Search: Revisiting Private Web Search using Intel SGX

    Authors: Sonia Ben Mokhtar, Antoine Boutet, Pascal Felber, Marcelo Pasin, Rafael Pires, Valerio Schiavoni

    Abstract: The exploitation of user search queries by search engines is at the heart of their economic model. As consequence, offering private Web search functionalities is essential to the users who care about their privacy. Nowadays, there exists no satisfactory approach to enable users to access search engines in a privacy-preserving way. Existing solutions are either too costly due to the heavy use of cr… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference. Las Vegas, NV, USA, December 11-15, 2017, 11 pages

    Journal ref: 2017 In Proceedings of Middleware '17

  18. CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions

    Authors: Rafael Pires, David Goltzsche, Sonia Ben Mokhtar, Sara Bouchenak, Antoine Boutet, Pascal Felber, Rüdiger Kapitza, Marcelo Pasin, Valerio Schiavoni

    Abstract: By regularly querying Web search engines, users (unconsciously) disclose large amounts of their personal data as part of their search queries, among which some might reveal sensitive information (e.g. health issues, sexual, political or religious preferences). Several solutions exist to allow users querying search engines while improving privacy protection. However, these solutions suffer from a n… ▽ More

    Submitted 27 July, 2018; v1 submitted 3 May, 2018; originally announced May 2018.

    Journal ref: 38th IEEE International Conference on Distributed Computing Systems (ICDCS 2018)

  19. arXiv:1609.07349  [pdf, other

    cs.CR

    Adaptive Location Privacy with ALP

    Authors: Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Lionel Brunie

    Abstract: With the increasing amount of mobility data being collected on a daily basis by location-based services (LBSs) comes a new range of threats for users, related to the over-sharing of their location information. To deal with this issue, several location privacy protection mechanisms (LPPMs) have been proposed in the past years. However, each of these mechanisms comes with different configuration par… ▽ More

    Submitted 23 September, 2016; originally announced September 2016.

    Comments: 35th Symposium on Reliable Distributed Systems, Sep 2016, Budapest, Hungary

  20. arXiv:1507.00443  [pdf, other

    cs.CR

    Time Distortion Anonymization for the Publication of Mobility Data with High Utility

    Authors: Vincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie

    Abstract: An increasing amount of mobility data is being collected every day by different means, such as mobile applications or crowd-sensing campaigns. This data is sometimes published after the application of simple anonymization techniques (e.g., putting an identifier instead of the users' names), which might lead to severe threats to the privacy of the participating users. Literature contains more sophi… ▽ More

    Submitted 2 July, 2015; originally announced July 2015.

    Comments: in 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2015, Helsinki, Finland

  21. Privacy-preserving Publication of Mobility Data with High Utility

    Authors: Vincent Primault, Sonia Ben Mokhtar, Lionel Brunie

    Abstract: An increasing amount of mobility data is being collected every day by different means, e.g., by mobile phone operators. This data is sometimes published after the application of simple anonymization techniques, which might lead to severe privacy threats. We propose in this paper a new solution whose novelty is twofold. Firstly, we introduce an algorithm designed to hide places where a user stops d… ▽ More

    Submitted 30 June, 2015; originally announced June 2015.

    Comments: 2015 35th IEEE International Conference on Distributed Computed Systems

  22. arXiv:1410.7744  [pdf

    cs.CR

    Differentially Private Location Privacy in Practice

    Authors: Vincent Primault, Sonia Ben Mokhtar, Cedric Lauradoux, Lionel Brunie

    Abstract: With the wide adoption of handheld devices (e.g. smartphones, tablets) a large number of location-based services (also called LBSs) have flourished providing mobile users with real-time and contextual information on the move. Accounting for the amount of location information they are given by users, these services are able to track users wherever they go and to learn sensitive information about th… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (https://arxiv.boxedpaper.com/abs/1410.6674)

    Report number: MoST/2014/02