Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–4 of 4 results for author: Cotrini, C

.
  1. arXiv:2312.14329  [pdf, other

    cs.LG

    Invariant Anomaly Detection under Distribution Shifts: A Causal Perspective

    Authors: João B. S. Carvalho, Mengtao Zhang, Robin Geyer, Carlos Cotrini, Joachim M. Buhmann

    Abstract: Anomaly detection (AD) is the machine learning task of identifying highly discrepant abnormal samples by solely relying on the consistency of the normal training samples. Under the constraints of a distribution shift, the assumption that training samples and test samples are drawn from the same distribution breaks down. In this work, by leveraging tools from causal inference we attempt to increase… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  2. arXiv:2309.12041  [pdf, other

    cs.CR cs.LG

    S-BDT: Distributed Differentially Private Boosted Decision Trees

    Authors: Thorsten Peinemann, Moritz Kirschte, Joshua Stock, Carlos Cotrini, Esfandiar Mohammadi

    Abstract: We introduce S-BDT: a novel $(\varepsilon,δ)$-differentially private distributed gradient boosted decision tree (GBDT) learner that improves the protection of single training data points (privacy) while achieving meaningful learning goals, such as accuracy or regression error (utility). S-BDT uses less noise by relying on non-spherical multivariate Gaussian noise, for which we show tight subsampli… ▽ More

    Submitted 16 August, 2024; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: The first two authors equally contributed to this work

  3. Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System

    Authors: Florian Turati, Carlos Cotrini, Karel Kubicek, David Basin

    Abstract: Recently proposed systems aim at achieving privacy using locality-sensitive hashing. We show how these approaches fail by presenting attacks against two such systems: Google's FLoC proposal for privacy-preserving targeted advertising and the MinHash Hierarchy, a system for processing mobile users' traffic behavior in a privacy-preserving way. Our attacks refute the pre-image resistance, anonymity,… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

    Comments: 14 pages, 9 figures submitted to PETS 2023

    ACM Class: K.6.5

  4. arXiv:1908.05994  [pdf, other

    cs.CR

    The Next 700 Policy Miners: A Universal Method for Building Policy Miners

    Authors: Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin

    Abstract: A myriad of access control policy languages have been and continue to be proposed. The design of policy miners for each such language is a challenging task that has required specialized machine learning and combinatorial algorithms. We present an alternative method, universal access control policy mining (Unicorn). We show how this method streamlines the design of policy miners for a wide variety… ▽ More

    Submitted 27 August, 2019; v1 submitted 16 August, 2019; originally announced August 2019.

    Comments: Full version of the paper accepted to CCS'19