Skip to main content

Showing 1–25 of 25 results for author: Psounis, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.00951  [pdf, other

    cs.IR cs.CR cs.LG

    Preserving Privacy and Utility in LLM-Based Product Recommendations

    Authors: Tina Khezresmaeilzadeh, Jiang Zhang, Dimitrios Andreadis, Konstantinos Psounis

    Abstract: Large Language Model (LLM)-based recommendation systems leverage powerful language models to generate personalized suggestions by processing user interactions and preferences. Unlike traditional recommendation systems that rely on structured data and collaborative filtering, LLM-based models process textual and contextual information, often using cloud-based infrastructure. This raises privacy con… ▽ More

    Submitted 1 May, 2025; originally announced May 2025.

  2. arXiv:2503.03160  [pdf, other

    cs.LG cs.CR

    SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models

    Authors: Jiang Zhang, Rohan Xavier Sequeira, Konstantinos Psounis

    Abstract: Specialized machine learning (ML) models tailored to users needs and requests are increasingly being deployed on smart devices with cameras, to provide personalized intelligent services taking advantage of camera data. However, two primary challenges hinder the training of such models: the lack of publicly available labeled data suitable for specialized tasks and the inaccessibility of labeled pri… ▽ More

    Submitted 7 April, 2025; v1 submitted 4 March, 2025; originally announced March 2025.

    Comments: 17 pages (with appendix), 6 figures, Accepted at The 25th Privacy Enhancing Technologies Symposium (PETS2025)

  3. arXiv:2503.00659  [pdf, other

    cs.CR cs.NI

    CATS: A framework for Cooperative Autonomy Trust & Security

    Authors: Namo Asavisanu, Tina Khezresmaeilzadeh, Rohan Sequeira, Hang Qiu, Fawad Ahmad, Konstantinos Psounis, Ramesh Govindan

    Abstract: With cooperative perception, autonomous vehicles can wirelessly share sensor data and representations to overcome sensor occlusions, improving situational awareness. Securing such data exchanges is crucial for connected autonomous vehicles. Existing, automated reputation-based approaches often suffer from a delay between detection and exclusion of misbehaving vehicles, while majority-based approac… ▽ More

    Submitted 1 March, 2025; originally announced March 2025.

  4. arXiv:2411.01492  [pdf, other

    cs.CV

    EEE-Bench: A Comprehensive Multimodal Electrical And Electronics Engineering Benchmark

    Authors: Ming Li, Jike Zhong, Tianle Chen, Yuxiang Lai, Konstantinos Psounis

    Abstract: Recent studies on large language models (LLMs) and large multimodal models (LMMs) have demonstrated promising skills in various domains including science and mathematics. However, their capability in more challenging and real-world related scenarios like engineering has not been systematically studied. To bridge this gap, we propose EEE-Bench, a multimodal benchmark aimed at assessing LMMs' capabi… ▽ More

    Submitted 27 February, 2025; v1 submitted 3 November, 2024; originally announced November 2024.

    Comments: Accepted to CVPR 2025

  5. arXiv:2409.07444  [pdf, other

    cs.HC cs.NI

    Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants

    Authors: Tina Khezresmaeilzadeh, Elaine Zhu, Kiersten Grieco, Daniel J. Dubois, Konstantinos Psounis, David Choffnes

    Abstract: Many companies, including Google, Amazon, and Apple, offer voice assistants as a convenient solution for answering general voice queries and accessing their services. These voice assistants have gained popularity and can be easily accessed through various smart devices such as smartphones, smart speakers, smartwatches, and an increasing array of other devices. However, this convenience comes with… ▽ More

    Submitted 13 September, 2024; v1 submitted 11 September, 2024; originally announced September 2024.

  6. arXiv:2405.04551  [pdf, other

    cs.CR cs.LG

    Differentially Private Federated Learning without Noise Addition: When is it Possible?

    Authors: Jiang Zhang, Konstantinos Psounis, Salman Avestimehr

    Abstract: Federated Learning (FL) with Secure Aggregation (SA) has gained significant attention as a privacy preserving framework for training machine learning models while preventing the server from learning information about users' data from their individual encrypted model updates. Recent research has extended privacy guarantees of FL with SA by bounding the information leakage through the aggregate mode… ▽ More

    Submitted 23 October, 2024; v1 submitted 5 May, 2024; originally announced May 2024.

  7. arXiv:2312.08303  [pdf, other

    cs.CL cs.AI

    Efficient Toxic Content Detection by Bootstrapping and Distilling Large Language Models

    Authors: Jiang Zhang, Qiong Wu, Yiming Xu, Cheng Cao, Zheng Du, Konstantinos Psounis

    Abstract: Toxic content detection is crucial for online services to remove inappropriate content that violates community standards. To automate the detection process, prior works have proposed varieties of machine learning (ML) approaches to train Language Models (LMs) for toxic content detection. However, both their accuracy and transferability across datasets are limited. Recently, Large Language Models (… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  8. arXiv:2308.03164  [pdf, other

    cs.CV cs.LG

    FireFly A Synthetic Dataset for Ember Detection in Wildfire

    Authors: Yue Hu, Xinan Ye, Yifei Liu, Souvik Kundu, Gourav Datta, Srikar Mutnuri, Namo Asavisanu, Nora Ayanian, Konstantinos Psounis, Peter Beerel

    Abstract: This paper presents "FireFly", a synthetic dataset for ember detection created using Unreal Engine 4 (UE4), designed to overcome the current lack of ember-specific training resources. To create the dataset, we present a tool that allows the automated generation of the synthetic labeled dataset with adjustable parameters, enabling data diversity from various environmental conditions, making the dat… ▽ More

    Submitted 6 August, 2023; originally announced August 2023.

    Comments: Artificial Intelligence (AI) and Humanitarian Assistance and Disaster Recovery (HADR) workshop, ICCV 2023 in Paris, France

    ACM Class: I.4

  9. arXiv:2210.08136  [pdf, other

    cs.CR

    A Utility-Preserving Obfuscation Approach for YouTube Recommendations

    Authors: Jiang Zhang, Hadi Askari, Konstantinos Psounis, Zubair Shafiq

    Abstract: Online content platforms optimize engagement by providing personalized recommendations to their users. These recommendation systems track and profile users to predict relevant content a user is likely interested in. While the personalized recommendations provide utility to users, the tracking and profiling that enables them poses a privacy issue because the platform might infer potentially sensiti… ▽ More

    Submitted 16 June, 2023; v1 submitted 14 October, 2022; originally announced October 2022.

  10. arXiv:2208.02304  [pdf, other

    cs.LG cs.CR cs.IT

    How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?

    Authors: Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr

    Abstract: Federated learning (FL) has attracted growing interest for enabling privacy-preserving machine learning on data stored at multiple users while avoiding moving the data off-device. However, while data never leaves users' devices, privacy still cannot be guaranteed since significant computations on users' training data are shared in the form of trained local models. These local models have recently… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Comments: Accepted to appear in Proceedings on Privacy Enhancing Technologies (PoPETs) 2023

  11. arXiv:2202.03679  [pdf, other

    cs.LG cs.NI

    A Unified Prediction Framework for Signal Maps

    Authors: Emmanouil Alimpertis, Athina Markopoulou, Carter T. Butts, Evita Bakopoulou, Konstantinos Psounis

    Abstract: Signal maps are essential for the planning and operation of cellular networks. However, the measurements needed to create such maps are expensive, often biased, not always reflecting the metrics of interest, and posing privacy risks. In this paper, we develop a unified framework for predicting cellular signal maps from limited measurements. Our framework builds on a state-of-the-art random-forest… ▽ More

    Submitted 12 February, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

    Comments: Coverage Maps; Signal Strength Maps; LTE; RSRP; CQI; RSRQ; RSS; Importance Sampling; Random Forests; Carrier's Objectives; Call Drops;Key Performance Indicators

  12. arXiv:2201.04782  [pdf, other

    cs.CR cs.LG

    Privacy-Utility Trades in Crowdsourced Signal Map Obfuscation

    Authors: Jiang Zhang, Lillian Clark, Matthew Clark, Konstantinos Psounis, Peter Kairouz

    Abstract: Cellular providers and data aggregating companies crowdsource celluar signal strength measurements from user devices to generate signal maps, which can be used to improve network performance. Recognizing that this data collection may be at odds with growing awareness of privacy concerns, we consider obfuscating such data before the data leaves the mobile device. The goal is to increase privacy suc… ▽ More

    Submitted 12 January, 2022; originally announced January 2022.

  13. arXiv:2112.14947  [pdf, other

    cs.NI cs.MA eess.SY

    AutoCast: Scalable Infrastructure-less Cooperative Perception for Distributed Collaborative Driving

    Authors: Hang Qiu, Pohan Huang, Namo Asavisanu, Xiaochen Liu, Konstantinos Psounis, Ramesh Govindan

    Abstract: Autonomous vehicles use 3D sensors for perception. Cooperative perception enables vehicles to share sensor readings with each other to improve safety. Prior work in cooperative perception scales poorly even with infrastructure support. AutoCast enables scalable infrastructure-less cooperative perception using direct vehicle-to-vehicle communication. It carefully determines which objects to share b… ▽ More

    Submitted 30 December, 2021; originally announced December 2021.

    Journal ref: ACM Mobisys 2022

  14. Location Leakage in Federated Signal Maps

    Authors: Evita Bakopoulou, Mengwei Yang, Jiang Zhang, Konstantinos Psounis, Athina Markopoulou

    Abstract: We consider the problem of predicting cellular network performance (signal maps) from measurements collected by several mobile devices. We formulate the problem within the online federated learning framework: (i) federated learning (FL) enables users to collaboratively train a model, while keeping their training data on their devices; (ii) measurements are collected as users move around over time… ▽ More

    Submitted 5 January, 2024; v1 submitted 6 December, 2021; originally announced December 2021.

  15. HARPO: Learning to Subvert Online Behavioral Advertising

    Authors: Jiang Zhang, Konstantinos Psounis, Muhammad Haroon, Zubair Shafiq

    Abstract: Online behavioral advertising, and the associated tracking paraphernalia, poses a real privacy threat. Unfortunately, existing privacy-enhancing tools are not always effective against online advertising and tracking. We propose Harpo, a principled learning-based approach to subvert online behavioral advertising through obfuscation. Harpo uses reinforcement learning to adaptively interleave real pa… ▽ More

    Submitted 23 November, 2021; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: Accepted at NDSS'22

  16. arXiv:2007.04376  [pdf, other

    cs.RO

    TEAM: Trilateration for Exploration and Mapping with Robotic Networks

    Authors: Lillian Clark, Charles Andre, Joseph Galante, Bhaskar Krishnamachari, Konstantinos Psounis

    Abstract: Motivated by lunar exploration, we consider deploying a network of mobile robots to explore an unknown environment while acting as a cooperative positioning system. Robots measure and communicate position-related data in order to perform localization in the absence of infrastructure-based solutions (e.g. stationary beacons or GPS). We present Trilateration for Exploration and Mapping (TEAM), a nov… ▽ More

    Submitted 15 April, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Comments: 8 pages, 15 figures, 2021

  17. arXiv:2004.04824  [pdf, other

    cs.NI

    Optimal User-Cell Association for 360 Video Streaming over Dense Wireless Networks

    Authors: Po-Han Huang, Konstantinos Psounis

    Abstract: Delivering 360 degree video streaming for virtual and augmented reality presents many technical challenges especially in bandwidth starved wireless environments. Recently, a so-called two-tier approach has been proposed which delivers a basic-tier chunk and select enhancement-tier chunks to improve user experience while reducing network resources consumption. The video chunks are to be transmitted… ▽ More

    Submitted 18 April, 2020; v1 submitted 9 April, 2020; originally announced April 2020.

    Comments: 12 pages

  18. arXiv:1607.02598  [pdf, other

    cs.GT

    Security Pricing as an Enabler of Cyber-Insurance: A First Look at Differentiated Pricing Markets

    Authors: Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui

    Abstract: Despite the promising potential of network risk management services (e.g., cyber-insurance) to improve information security, their deployment is relatively scarce, primarily due to such service companies being unable to guarantee profitability. As a novel approach to making cyber-insurance services more viable, we explore a symbiotic relationship between security vendors (e.g., Symantec) capable o… ▽ More

    Submitted 9 July, 2016; originally announced July 2016.

    Comments: arXiv admin note: text overlap with arXiv:1101.5617 by other authors without attribution

  19. arXiv:1405.0089  [pdf, other

    cs.NI cs.IT

    Performance Modeling of Next-Generation Wireless Networks

    Authors: Antonios Michaloliakos, Ryan Rogalin, Yonglong Zhang, Konstantinos Psounis, Giuseppe Caire

    Abstract: The industry is satisfying the increasing demand for wireless bandwidth by densely deploying a large number of access points which are centrally managed, e.g. enterprise WiFi networks deployed in university campuses, companies, airports etc. This small cell architecture is gaining traction in the cellular world as well, as witnessed by the direction in which 4G+ and 5G standardization is moving. P… ▽ More

    Submitted 1 May, 2014; originally announced May 2014.

  20. arXiv:1310.7001  [pdf, other

    cs.NI cs.IT

    Scalable Synchronization and Reciprocity Calibration for Distributed Multiuser MIMO

    Authors: Ryan Rogalin, Ozgun Bursalioglu, Haralabos Papadopoulos, Giuseppe Caire, Andreas Molisch, Antonios Michaloliakos, Vlad Balan, Konstantinos Psounis

    Abstract: Large-scale distributed Multiuser MIMO (MU-MIMO) is a promising wireless network architecture that combines the advantages of "massive MIMO" and "small cells." It consists of several Access Points (APs) connected to a central server via a wired backhaul network and acting as a large distributed antenna system. We focus on the downlink, which is both more demanding in terms of traffic and more chal… ▽ More

    Submitted 31 March, 2015; v1 submitted 25 October, 2013; originally announced October 2013.

    Comments: Replaced Figure 5 with correct version

  21. arXiv:1208.2002  [pdf, ps, other

    cs.NI

    Tag Spotting at the Interference Range

    Authors: Horia Vlad Balan, Konstantinos Psounis

    Abstract: In wireless networks, the presence of interference among wireless links in- troduces dependencies among flows that do not share a single link or node. As a result, when designing a resource allocation scheme, be it a medium access scheduler or a flow rate controller, one needs to consider the interdependence among nodes within interference range of each other. Specifically, control plane informati… ▽ More

    Submitted 9 August, 2012; originally announced August 2012.

    Comments: 30 pages

  22. arXiv:1205.6862  [pdf, other

    cs.NI

    AirSync: Enabling Distributed Multiuser MIMO with Full Spatial Multiplexing

    Authors: Horia Vlad Balan, Ryan Rogalin, Antonios Michaloliakos, Konstantinos Psounis, Giuseppe Caire

    Abstract: The enormous success of advanced wireless devices is pushing the demand for higher wireless data rates. Denser spectrum reuse through the deployment of more access points per square mile has the potential to successfully meet the increasing demand for more bandwidth. In theory, the best approach to density increase is via distributed multiuser MIMO, where several access points are connected to a c… ▽ More

    Submitted 14 August, 2012; v1 submitted 30 May, 2012; originally announced May 2012.

    Comments: Submitted to Transactions on Networking

    Report number: CENG-TR-2012-1

  23. arXiv:1107.4785  [pdf, ps, other

    cs.CR

    A Novel Cyber-Insurance for Internet Security

    Authors: Ranjan Pal, Leana Golubchik, Konstantinos Psounis

    Abstract: Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk eliminati… ▽ More

    Submitted 24 July, 2011; originally announced July 2011.

  24. arXiv:1007.4724  [pdf, ps, other

    cs.NI

    CapEst: A Measurement-based Approach to Estimating Link Capacity in Wireless Networks

    Authors: Apoorva Jindal, Konstantinos Psounis, Mingyan Liu

    Abstract: Estimating link capacity in a wireless network is a complex task because the available capacity at a link is a function of not only the current arrival rate at that link, but also of the arrival rate at links which interfere with that link as well as of the nature of interference between these links. Models which accurately characterize this dependence are either too computationally complex to be… ▽ More

    Submitted 27 July, 2010; originally announced July 2010.

  25. arXiv:0810.3935  [pdf, ps, other

    cs.NI

    Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks

    Authors: Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ahmed Helmy

    Abstract: Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the non-homogeneous behaviors in both space and time commonly found in reality, while at the same time being easy to use and analyze. Motivated by this, we propose a time-variant community mobility model, referred to as the TVC mod… ▽ More

    Submitted 21 October, 2008; originally announced October 2008.

    Comments: 14 pages, 9 figures