Skip to main content

Showing 1–50 of 107 results for author: Haddadi, H

  1. arXiv:2405.17697  [pdf, other

    cs.LG

    P4: Towards private, personalized, and Peer-to-Peer learning

    Authors: Mohammad Mahdi Maheri, Sandra Siby, Sina Abdollahi, Anastasia Borovykh, Hamed Haddadi

    Abstract: Personalized learning is a proposed approach to address the problem of data heterogeneity in collaborative machine learning. In a decentralized setting, the two main challenges of personalization are client clustering and data privacy. In this paper, we address these challenges by developing P4 (Personalized Private Peer-to-Peer) a method that ensures that each client receives a personalized model… ▽ More

    Submitted 31 May, 2024; v1 submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2405.06545  [pdf, other

    cs.CL cs.LG

    Mitigating Hallucinations in Large Language Models via Self-Refinement-Enhanced Knowledge Retrieval

    Authors: Mengjia Niu, Hao Li, Jie Shi, Hamed Haddadi, Fan Mo

    Abstract: Large language models (LLMs) have demonstrated remarkable capabilities across various domains, although their susceptibility to hallucination poses significant challenges for their deployment in critical areas such as healthcare. To address this issue, retrieving relevant facts from knowledge graphs (KGs) is considered a promising method. Existing KG-augmented approaches tend to be resource-intens… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    ACM Class: I.2.7; H.3.3

  3. arXiv:2405.00596  [pdf, other

    cs.CR

    Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles

    Authors: Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi

    Abstract: This work presents Unbundle-Rewrite-Rebundle (URR), a system for detecting privacy-harming portions of bundled JavaScript code, and rewriting that code at runtime to remove the privacy harming behavior without breaking the surrounding code or overall application. URR is a novel solution to the problem of JavaScript bundles, where websites pre-compile multiple code units into a single file, making… ▽ More

    Submitted 7 May, 2024; v1 submitted 1 May, 2024; originally announced May 2024.

  4. arXiv:2404.00190  [pdf, other

    cs.CR

    GuaranTEE: Towards Attestable and Private ML with CCA

    Authors: Sandra Siby, Sina Abdollahi, Mohammad Maheri, Marios Kogias, Hamed Haddadi

    Abstract: Machine-learning (ML) models are increasingly being deployed on edge devices to provide a variety of services. However, their deployment is accompanied by challenges in model privacy and auditability. Model providers want to ensure that (i) their proprietary models are not exposed to third parties; and (ii) be able to get attestations that their genuine models are operating on edge devices in acco… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

    Comments: Accepted at the 4th Workshop on Machine Learning and Systems (EuroMLSys '24)

  5. arXiv:2403.15905  [pdf, other

    cs.LG cs.CV

    Towards Low-Energy Adaptive Personalization for Resource-Constrained Devices

    Authors: Yushan Huang, Josh Millar, Yuxuan Long, Yuchen Zhao, Hamed Haddadi

    Abstract: The personalization of machine learning (ML) models to address data drift is a significant challenge in the context of Internet of Things (IoT) applications. Presently, most approaches focus on fine-tuning either the full base model or its last few layers to adapt to new data, while often neglecting energy costs. However, various types of data drift exist, and fine-tuning the full base model or th… ▽ More

    Submitted 29 March, 2024; v1 submitted 23 March, 2024; originally announced March 2024.

    Comments: Accepetd to The 4th Workshop on Machine Learning and Systems (EuroMLSys '24)

  6. arXiv:2403.12844  [pdf, other

    cs.LG

    MELTing point: Mobile Evaluation of Language Transformers

    Authors: Stefanos Laskaridis, Kleomenis Katevas, Lorenzo Minto, Hamed Haddadi

    Abstract: Transformers have revolutionized the machine learning landscape, gradually making their way into everyday tasks and equipping our computers with "sparks of intelligence". However, their runtime requirements have prevented them from being broadly deployed on mobile. As personal devices become increasingly powerful and prompt privacy becomes an ever more pressing issue, we explore the current state… ▽ More

    Submitted 25 July, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

    Comments: Accepted at the 30th Annual International Conference On Mobile Computing And Networking (MobiCom 2024)

  7. arXiv:2403.08040  [pdf, other

    cs.LG cs.AR

    MicroT: Low-Energy and Adaptive Models for MCUs

    Authors: Yushan Huang, Ranya Aloufi, Xavier Cadet, Yuchen Zhao, Payam Barnaghi, Hamed Haddadi

    Abstract: We propose MicroT, a low-energy, multi-task adaptive model framework for resource-constrained MCUs. We divide the original model into a feature extractor and a classifier. The feature extractor is obtained through self-supervised knowledge distillation and further optimized into part and full models through model splitting and joint training. These models are then deployed on MCUs, with classifier… ▽ More

    Submitted 9 July, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

  8. arXiv:2402.02877  [pdf

    cs.CR cs.CY cs.HC

    Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive

    Authors: Cristiana Santos, Nataliia Bielova, Vincent Roca, Mathieu Cunche, Gilles Mertens, Karel Kubicek, Hamed Haddadi

    Abstract: We very much welcome the EDPB's Guidelines. Please find hereunder our feedback to the Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive. Our comments are presented after a quotation from the proposed text by the EDPB in a box.

    Submitted 5 February, 2024; originally announced February 2024.

  9. arXiv:2401.14332  [pdf, other

    cs.CR cs.LG

    SunBlock: Cloudless Protection for IoT Systems

    Authors: Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David Choffnes, Hamed Haddadi

    Abstract: With an increasing number of Internet of Things (IoT) devices present in homes, there is a rise in the number of potential information leakage channels and their associated security threats and privacy risks. Despite a long history of attacks on IoT devices in unprotected home networks, the problem of accurate, rapid detection and prevention of such attacks remains open. Many existing IoT protecti… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: This paper is accepted at Passive and Active Measurement (PAM) conference 2024

  10. arXiv:2401.01353  [pdf, other

    cs.CR

    The Boomerang protocol: A Decentralised Privacy-Preserving Verifiable Incentive Protocol

    Authors: Ralph Ankele, Hamed Haddadi

    Abstract: In the era of data-driven economies, incentive systems and loyalty programs, have become ubiquitous in various sectors, including advertising, retail, travel, and financial services. While these systems offer advantages for both users and companies, they necessitate the transfer and analysis of substantial amounts of sensitive data. Privacy concerns have become increasingly pertinent, necessitatin… ▽ More

    Submitted 9 January, 2024; v1 submitted 6 December, 2023; originally announced January 2024.

    Comments: fix formatting issue in abstract

  11. arXiv:2311.03417  [pdf

    cs.LG cs.AI

    Federated Learning for Clinical Structured Data: A Benchmark Comparison of Engineering and Statistical Approaches

    Authors: Siqi Li, Di Miao, Qiming Wu, Chuan Hong, Danny D'Agostino, Xin Li, Yilin Ning, Yuqing Shang, Huazhu Fu, Marcus Eng Hock Ong, Hamed Haddadi, Nan Liu

    Abstract: Federated learning (FL) has shown promising potential in safeguarding data privacy in healthcare collaborations. While the term "FL" was originally coined by the engineering community, the statistical field has also explored similar privacy-preserving algorithms. Statistical FL algorithms, however, remain considerably less recognized than their engineering counterparts. Our goal was to bridge the… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

  12. arXiv:2310.08147  [pdf, other

    cs.DC

    Optimization of Federated Learning's Client Selection for Non-IID Data Based on Grey Relational Analysis

    Authors: Shuaijun Chen, Omid Tavallaie, Michael Henri Hambali, Seid Miad Zandavi, Hamed Haddadi, Nicholas Lane, Song Guo, Albert Y. Zomaya

    Abstract: Federated learning (FL) is a novel distributed learning framework designed for applications with privacy-sensitive data. Without sharing data, FL trains local models on individual devices and constructs the global model on the server by performing model aggregation. However, to reduce the communication cost, the participants in each training round are randomly selected, which significantly decreas… ▽ More

    Submitted 23 January, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

  13. arXiv:2309.05845  [pdf, other

    cs.LG cs.AI

    Effective Abnormal Activity Detection on Multivariate Time Series Healthcare Data

    Authors: Mengjia Niu, Yuchen Zhao, Hamed Haddadi

    Abstract: Multivariate time series (MTS) data collected from multiple sensors provide the potential for accurate abnormal activity detection in smart healthcare scenarios. However, anomalies exhibit diverse patterns and become unnoticeable in MTS data. Consequently, achieving accurate anomaly detection is challenging since we have to capture both temporal dependencies of time series and inter-relationships… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Comments: Poster accepted by the 29th Annual International Conference On Mobile Computing And Networking (ACM MobiCom 2023)

    ACM Class: J.3; I.2.6

  14. arXiv:2308.15309  [pdf, other

    cs.CY

    Understanding the Privacy Risks of Popular Search Engine Advertising Systems

    Authors: Salim Chouaki, Oana Goga, Hamed Haddadi, Peter Snyder

    Abstract: We present the first extensive measurement of the privacy properties of the advertising systems used by privacy-focused search engines. We propose an automated methodology to study the impact of clicking on search ads on three popular private search engines which have advertising-based business models: StartPage, Qwant, and DuckDuckGo, and we compare them to two dominant data-harvesting ones: Goog… ▽ More

    Submitted 23 September, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  15. arXiv:2306.13039  [pdf, other

    cs.NI

    GT-TSCH: Game-Theoretic Distributed TSCH Scheduler for Low-Power IoT Networks

    Authors: Omid Tavallaie, Seid Miad Zandavi, Hamed Haddadi, Albert Y. Zomaya

    Abstract: Time-Slotted Channel Hopping (TSCH) is a synchronous medium access mode of the IEEE 802.15.4e standard designed for providing low-latency and highly-reliable end-to-end communication. TSCH constructs a communication schedule by combining frequency channel hopping with Time Division Multiple Access (TDMA). In recent years, IETF designed several standards to define general mechanisms for the impleme… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

    Comments: 43rd IEEE International Conference on Distributed Computing Systems

  16. arXiv:2306.04337  [pdf, other

    cs.CL

    A study on the impact of Self-Supervised Learning on automatic dysarthric speech assessment

    Authors: Xavier F. Cadet, Ranya Aloufi, Sara Ahmadi-Abhari, Hamed Haddadi

    Abstract: Automating dysarthria assessments offers the opportunity to develop practical, low-cost tools that address the current limitations of manual and subjective assessments. Nonetheless, the small size of most dysarthria datasets makes it challenging to develop automated assessment. Recent research showed that speech representations from models pre-trained on large unlabelled data can enhance Automatic… ▽ More

    Submitted 22 March, 2024; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: Accepted as a workshop paper at ICASSP SASB 2024

  17. arXiv:2306.01398  [pdf, other

    cs.CV

    Evaluating The Robustness of Self-Supervised Representations to Background/Foreground Removal

    Authors: Xavier F. Cadet, Ranya Aloufi, Alain Miranville, Sara Ahmadi-Abhari, Hamed Haddadi

    Abstract: Despite impressive empirical advances of SSL in solving various tasks, the problem of understanding and characterizing SSL representations learned from input data remains relatively under-explored. We provide a comparative analysis of how the representations produced by SSL models differ when masking parts of the input. Specifically, we considered state-of-the-art SSL pretrained models, such as DI… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

  18. arXiv:2305.18954  [pdf, other

    cs.LG cs.AI cs.CV

    Towards Machine Learning and Inference for Resource-constrained MCUs

    Authors: Yushan Huang, Hamed Haddadi

    Abstract: Machine learning (ML) is moving towards edge devices. However, ML models with high computational demands and energy consumption pose challenges for ML inference in resource-constrained environments, such as the deep sea. To address these challenges, we propose a battery-free ML inference and model personalization pipeline for microcontroller units (MCUs). As an example, we performed fish image rec… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: Poster accepted by the 21st ACM International Conference on Mobile Systems, Applications, and Services (ACM MobiSys 2023)

  19. arXiv:2305.05257  [pdf, other

    cs.LG cs.AI cs.DC cs.IR cs.SI

    Survey of Federated Learning Models for Spatial-Temporal Mobility Applications

    Authors: Yacine Belal, Sonia Ben Mokhtar, Hamed Haddadi, Jaron Wang, Afra Mashhadi

    Abstract: Federated learning involves training statistical models over edge devices such as mobile phones such that the training data is kept local. Federated Learning (FL) can serve as an ideal candidate for training spatial temporal models that rely on heterogeneous and potentially massive numbers of participants while preserving the privacy of highly sensitive location data. However, there are unique cha… ▽ More

    Submitted 8 February, 2024; v1 submitted 9 May, 2023; originally announced May 2023.

    ACM Class: A.1; D.4.6; H.4.3; H.5.6; I.2.6; I.5.3; I.5.8

  20. Federated and distributed learning applications for electronic health records and structured medical data: A scoping review

    Authors: Siqi Li, Pinyan Liu, Gustavo G. Nascimento, Xinru Wang, Fabio Renato Manzolli Leite, Bibhas Chakraborty, Chuan Hong, Yilin Ning, Feng Xie, Zhen Ling Teo, Daniel Shu Wei Ting, Hamed Haddadi, Marcus Eng Hock Ong, Marco Aurélio Peres, Nan Liu

    Abstract: Federated learning (FL) has gained popularity in clinical research in recent years to facilitate privacy-preserving collaboration. Structured data, one of the most prevalent forms of clinical data, has experienced significant growth in volume concurrently, notably with the widespread adoption of electronic health records in clinical practice. This review examines FL applications on structured medi… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

  21. arXiv:2304.06469  [pdf, other

    cs.LG cs.AI cs.CR cs.CY

    Analysing Fairness of Privacy-Utility Mobility Models

    Authors: Yuting Zhan, Hamed Haddadi, Afra Mashhadi

    Abstract: Preserving the individuals' privacy in sharing spatial-temporal datasets is critical to prevent re-identification attacks based on unique trajectories. Existing privacy techniques tend to propose ideal privacy-utility tradeoffs, however, largely ignore the fairness implications of mobility models and whether such techniques perform equally for different groups of users. The quantification between… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

  22. arXiv:2304.03045  [pdf, other

    cs.CR

    Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards

    Authors: Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois, David Choffnes

    Abstract: Consumer Internet of Things (IoT) devices are increasingly common, from smart speakers to security cameras, in homes. Along with their benefits come potential privacy and security threats. To limit these threats a number of commercial services have become available (IoT safeguards). The safeguards claim to provide protection against IoT privacy risks and security threats. However, the effectivenes… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

  23. arXiv:2302.11654  [pdf, other

    cs.AI cs.IT

    Information Theory Inspired Pattern Analysis for Time-series Data

    Authors: Yushan Huang, Yuchen Zhao, Alexander Capstick, Francesca Palermo, Hamed Haddadi, Payam Barnaghi

    Abstract: Current methods for pattern analysis in time series mainly rely on statistical features or probabilistic learning and inference methods to identify patterns and trends in the data. Such methods do not generalize well when applied to multivariate, multi-source, state-varying, and noisy time-series data. To address these issues, we propose a highly generalizable method that uses information theory-b… ▽ More

    Submitted 28 April, 2023; v1 submitted 22 February, 2023; originally announced February 2023.

  24. arXiv:2212.14736  [pdf, other

    eess.SY cs.CR

    PRISM: Privacy Preserving Healthcare Internet of Things Security Management

    Authors: Savvas Hadjixenophontos, Anna Maria Mandalari, Yuchen Zhao, Hamed Haddadi

    Abstract: Consumer healthcare Internet of Things (IoT) devices are gaining popularity in our homes and hospitals. These devices provide continuous monitoring at a low cost and can be used to augment high-precision medical equipment. However, major challenges remain in applying pre-trained global models for anomaly detection on smart health monitoring, for a diverse set of individuals that they provide care… ▽ More

    Submitted 2 June, 2023; v1 submitted 27 December, 2022; originally announced December 2022.

  25. Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers?

    Authors: Alex Davidson, Matthias Frei, Marten Gartner, Hamed Haddadi, Jordi Subirà Nieto, Adrian Perrig, Philipp Winter, François Wirz

    Abstract: The question at which layer network functionality is presented or abstracted remains a research challenge. Traditionally, network functionality was either placed into the core network, middleboxes, or into the operating system -- but recent developments have expanded the design space to directly introduce functionality into the application (and in particular into the browser) as a way to expose it… ▽ More

    Submitted 10 October, 2022; originally announced October 2022.

    Comments: 1 table, 6 figures

  26. arXiv:2210.01736  [pdf, other

    cs.LG stat.AP

    Using Entropy Measures for Monitoring the Evolution of Activity Patterns

    Authors: Yushan Huang, Yuchen Zhao, Hamed Haddadi, Payam Barnaghi

    Abstract: In this work, we apply information theory inspired methods to quantify changes in daily activity patterns. We use in-home movement monitoring data and show how they can help indicate the occurrence of healthcare-related events. Three different types of entropy measures namely Shannon's entropy, entropy rates for Markov chains, and entropy production rate have been utilised. The measures are evalua… ▽ More

    Submitted 5 October, 2022; v1 submitted 4 October, 2022; originally announced October 2022.

  27. arXiv:2208.10134  [pdf, other

    cs.CR cs.LG

    Machine Learning with Confidential Computing: A Systematization of Knowledge

    Authors: Fan Mo, Zahra Tarkhani, Hamed Haddadi

    Abstract: Privacy and security challenges in Machine Learning (ML) have become increasingly severe, along with ML's pervasive development and the recent demonstration of large attack surfaces. As a mature system-oriented approach, Confidential Computing has been utilized in both academia and industry to mitigate privacy and security issues in various ML scenarios. In this paper, the conjunction between ML a… ▽ More

    Submitted 3 June, 2024; v1 submitted 22 August, 2022; originally announced August 2022.

    Comments: Survey paper, 37 pages, accepted to ACM Computing Surveys

  28. arXiv:2208.05009  [pdf, other

    cs.LG cs.CR cs.CY

    Privacy-Aware Adversarial Network in Human Mobility Prediction

    Authors: Yuting Zhan, Hamed Haddadi, Afra Mashhadi

    Abstract: As mobile devices and location-based services are increasingly developed in different smart city scenarios and applications, many unexpected privacy leakages have arisen due to geolocated data collection and sharing. User re-identification and other sensitive inferences are major privacy threats when geolocated data are shared with cloud-assisted applications. Significantly, four spatio-temporal p… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: 15 pages, PoPETs'23, July 10--14, 2023, Lausanne, Switzerland. arXiv admin note: substantial text overlap with arXiv:2201.07519

  29. arXiv:2207.04500  [pdf, other

    cs.LG cs.AI

    FIB: A Method for Evaluation of Feature Impact Balance in Multi-Dimensional Data

    Authors: Xavier F. Cadet, Sara Ahmadi-Abhari, Hamed Haddadi

    Abstract: Errors might not have the same consequences depending on the task at hand. Nevertheless, there is limited research investigating the impact of imbalance in the contribution of different features in an error vector. Therefore, we propose the Feature Impact Balance (FIB) score. It measures whether there is a balanced impact of features in the discrepancies between two vectors. We designed the FIB sc… ▽ More

    Submitted 10 July, 2022; originally announced July 2022.

  30. arXiv:2206.04123  [pdf, ps, other

    cs.CR

    Nitriding: A tool kit for building scalable, networked, secure enclaves

    Authors: Philipp Winter, Ralph Giles, Moritz Schafhuber, Hamed Haddadi

    Abstract: Enclave deployments often fail to simultaneously be secure (e.g., resistant to side channel attacks), powerful (i.e., as fast as an off-the-shelf server), and flexible (i.e., unconstrained by development hurdles). In this paper, we present nitriding, an open tool kit that enables the development of enclave applications that satisfy all three properties. We build nitriding on top of the recently-pr… ▽ More

    Submitted 29 July, 2023; v1 submitted 8 June, 2022; originally announced June 2022.

  31. arXiv:2205.14026  [pdf, other

    cs.CY

    On-Device Voice Authentication with Paralinguistic Privacy

    Authors: Ranya Aloufi, Hamed Haddadi, David Boyle

    Abstract: Using our voices to access, and interact with, online services raises concerns about the trade-offs between convenience, privacy, and security. The conflict between maintaining privacy and ensuring input authenticity has often been hindered by the need to share raw data, which contains all the paralinguistic information required to infer a variety of sensitive characteristics. Users of voice assis… ▽ More

    Submitted 24 February, 2023; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: 15 pages

  32. arXiv:2203.14088  [pdf

    cs.DC cs.CR cs.LG

    Distributed data analytics

    Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang

    Abstract: Machine Learning (ML) techniques have begun to dominate data analytics applications and services. Recommendation systems are a key component of online service providers. The financial industry has adopted ML to harness large volumes of data in areas such as fraud detection, risk-management, and compliance. Deep Learning is the technology behind voice-based personal assistants, etc. Deployment of M… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

    Comments: Accepted as Chapter 8 of "Privacy by Design for the Internet of Things: Building accountability and security"

  33. arXiv:2203.03528  [pdf, other

    cs.CR

    Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites

    Authors: Michael Smith, Peter Snyder, Moritz Haller, Benjamin Livshits, Deian Stefan, Hamed Haddadi

    Abstract: A core problem in the development and maintenance of crowd-sourced filter lists is that their maintainers cannot confidently predict whether (and where) a new filter list rule will break websites. This is a result of enormity of the Web, which prevents filter list authors from broadly understanding the impact of a new blocking rule before they ship it to millions of users. The inability of filter… ▽ More

    Submitted 2 May, 2022; v1 submitted 7 March, 2022; originally announced March 2022.

  34. Towards Battery-Free Machine Learning and Inference in Underwater Environments

    Authors: Yuchen Zhao, Sayed Saad Afzal, Waleed Akbar, Osvy Rodriguez, Fan Mo, David Boyle, Fadel Adib, Hamed Haddadi

    Abstract: This paper is motivated by a simple question: Can we design and build battery-free devices capable of machine learning and inference in underwater environments? An affirmative answer to this question would have significant implications for a new generation of underwater sensing and monitoring applications for environmental monitoring, scientific exploration, and climate/weather prediction. To an… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: 6 pages, HotMobile '22, March 9-10, 2022, Tempe, AZ, USA

  35. arXiv:2201.12614  [pdf, other

    cs.NI

    BatteryLab: A Collaborative Platform for Power Monitoring

    Authors: Matteo Varvello, Kleomenis Katevas, Mihai Plesa, Hamed Haddadi, Fabian Bustamante, Ben Livshits

    Abstract: Advances in cloud computing have simplified the way that both software development and testing are performed. This is not true for battery testing for which state of the art test-beds simply consist of one phone attached to a power meter. These test-beds have limited resources, access, and are overall hard to maintain; for these reasons, they often sit idle with no experiment to run. In this paper… ▽ More

    Submitted 29 January, 2022; originally announced January 2022.

    Comments: 25 pages, 11 figures, Passive and Active Measurement Conference 2022 (PAM '22). arXiv admin note: text overlap with arXiv:1910.08951

  36. arXiv:2201.07519  [pdf, other

    cs.LG cs.CR

    Privacy-Aware Human Mobility Prediction via Adversarial Networks

    Authors: Yuting Zhan, Alex Kyllo, Afra Mashhadi, Hamed Haddadi

    Abstract: As various mobile devices and location-based services are increasingly developed in different smart city scenarios and applications, many unexpected privacy leakages have arisen due to geolocated data collection and sharing. While these geolocated data could provide a rich understanding of human mobility patterns and address various societal research questions, privacy concerns for users' sensitiv… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

  37. arXiv:2112.06498  [pdf, other

    cs.CR

    Proof of Steak

    Authors: Jon Crowcroft, Hamed Haddadi, Arthur Gervais, Tristan Henderson

    Abstract: We introduce Proof-of-Steak (PoS) as a fundamental net-zero block generation technique, often accompanied by Non-Frangipane Tokens. Genesis cut is gradually heated and minted (using the appropriate sauce), enabling the miners to redirect the extracted gold and the dissipated heat into the furnace, hence enabling the first fully-circular economy ever built using blockchain technology, utilising tam… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: This is a silly article

  38. arXiv:2112.06324  [pdf, other

    cs.CR

    Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking

    Authors: Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi

    Abstract: We identify class of covert channels in browsers that are not mitigated by current defenses, which we call "pool-party" attacks. Pool-party attacks allow sites to create covert channels by manipulating limited-but-unpartitioned resource pools. These class of attacks have been known, but in this work we show that they are both more prevalent, more practical for exploitation, and allow exploitation… ▽ More

    Submitted 21 March, 2023; v1 submitted 12 December, 2021; originally announced December 2021.

  39. Rapid IoT Device Identification at the Edge

    Authors: Oliver Thompson, Anna Maria Mandalari, Hamed Haddadi

    Abstract: Consumer Internet of Things (IoT) devices are increasingly common in everyday homes, from smart speakers to security cameras. Along with their benefits come potential privacy and security threats. To limit these threats we must implement solutions to filter IoT traffic at the edge. To this end the identification of the IoT device is the first natural step. In this paper we demonstrate a novel me… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

    Journal ref: 2nd Workshop on Distributed Machine Learning, co-located with CoNEXT 2021

  40. STAR: Secret Sharing for Private Threshold Aggregation Reporting

    Authors: Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi

    Abstract: Threshold aggregation reporting systems promise a practical, privacy-preserving solution for developers to learn how their applications are used "\emph{in-the-wild}". Unfortunately, proposed systems to date prove impractical for wide scale adoption, suffering from a combination of requiring: \emph{i)} prohibitive trust assumptions; \emph{ii)} high computation costs; or \emph{iii)} massive user bas… ▽ More

    Submitted 7 September, 2022; v1 submitted 21 September, 2021; originally announced September 2021.

    Journal ref: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22), November 7--11, 2022, Los Angeles, CA, USA

  41. arXiv:2109.04833  [pdf, other

    cs.LG

    Multimodal Federated Learning on IoT Data

    Authors: Yuchen Zhao, Payam Barnaghi, Hamed Haddadi

    Abstract: Federated learning is proposed as an alternative to centralized machine learning since its client-server structure provides better privacy protection and scalability in real-world applications. In many applications, such as smart homes with Internet-of-Things (IoT) devices, local data on clients are generated from different modalities such as sensory, visual, and audio data. Existing federated lea… ▽ More

    Submitted 18 February, 2022; v1 submitted 10 September, 2021; originally announced September 2021.

    Comments: 12 pages, IoTDI '22, May 3-6, 2022, Milan, Italy

  42. arXiv:2107.10045  [pdf, other

    cs.CR cs.SD eess.AS

    A Tandem Framework Balancing Privacy and Security for Voice User Interfaces

    Authors: Ranya Aloufi, Hamed Haddadi, David Boyle

    Abstract: Speech synthesis, voice cloning, and voice conversion techniques present severe privacy and security threats to users of voice user interfaces (VUIs). These techniques transform one or more elements of a speech signal, e.g., identity and emotion, while preserving linguistic information. Adversaries may use advanced transformation tools to trigger a spoofing attack using fraudulent biometrics for a… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 14 pages, 6 figures. arXiv admin note: text overlap with arXiv:2008.03648, arXiv:2010.13995, arXiv:1911.01601 by other authors

  43. arXiv:2107.07818  [pdf, other

    cs.CR cs.LG

    Revisiting IoT Device Identification

    Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi

    Abstract: Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such, they would greatly benefit from automated management. This requires robustly identifying devices so that appropriate network security policies can be applied. We address this challenge by exploring how to accurately identify IoT devices based on their network behavior, while leveraging approaches pr… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

    Comments: To appear in TMA 2021 conference. 9 pages, 6 figures. arXiv admin note: text overlap with arXiv:2011.08605

  44. arXiv:2105.13929  [pdf, other

    cs.LG

    Quantifying and Localizing Usable Information Leakage from Neural Network Gradients

    Authors: Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Soteris Demetriou, Deniz Gündüz, Hamed Haddadi

    Abstract: In collaborative learning, clients keep their data private and communicate only the computed gradients of the deep neural network being trained on their local data. Several recent attacks show that one can still extract private information from the shared network's gradients compromising clients' privacy. In this paper, to quantify the private information leakage from gradients we adopt usable inf… ▽ More

    Submitted 25 July, 2022; v1 submitted 28 May, 2021; originally announced May 2021.

    Comments: 13 pages

  45. arXiv:2105.05162  [pdf, other

    cs.NI

    Blocking without Breaking: Identification and Mitigation of Non-Essential IoT Traffic

    Authors: Anna Maria Mandalari, Daniel J. Dubois, Roman Kolcun, Muhammad Talha Paracha, Hamed Haddadi, David Choffnes

    Abstract: Despite the prevalence of Internet of Things (IoT) devices, there is little information about the purpose and risks of the Internet traffic these devices generate, and consumers have limited options for controlling those risks. A key open question is whether one can mitigate these risks by automatically blocking some of the Internet connections from IoT devices, without rendering the devices inope… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

    Journal ref: Privacy Enhancing Technologies Symposium (PETS) 2021

  46. arXiv:2105.03941  [pdf, other

    cs.LG cs.CR cs.MA

    Stronger Privacy for Federated Collaborative Filtering with Implicit Feedback

    Authors: Lorenzo Minto, Moritz Haller, Hamed Haddadi, Benjamin Livshits

    Abstract: Recommender systems are commonly trained on centrally collected user interaction data like views or clicks. This practice however raises serious privacy concerns regarding the recommender's collection and handling of potentially sensitive data. Several privacy-aware recommender systems have been proposed in recent literature, but comparatively little attention has been given to systems at the inte… ▽ More

    Submitted 28 July, 2021; v1 submitted 9 May, 2021; originally announced May 2021.

    Comments: Accepted for publication at RecSys 2021

  47. arXiv:2104.14380  [pdf, other

    cs.CR cs.DC cs.LG

    PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments

    Authors: Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis

    Abstract: We propose and implement a Privacy-preserving Federated Learning ($PPFL$) framework for mobile systems to limit privacy leakages in federated learning. Leveraging the widespread presence of Trusted Execution Environments (TEEs) in high-end and mobile devices, we utilize TEEs on clients for local training, and on servers for secure aggregation, so that model/gradient updates are hidden from adversa… ▽ More

    Submitted 28 June, 2021; v1 submitted 29 April, 2021; originally announced April 2021.

    Comments: 15 pages, 8 figures, accepted to MobiSys 2021

  48. arXiv:2104.00766  [pdf, other

    cs.CL

    Configurable Privacy-Preserving Automatic Speech Recognition

    Authors: Ranya Aloufi, Hamed Haddadi, David Boyle

    Abstract: Voice assistive technologies have given rise to far-reaching privacy and security concerns. In this paper we investigate whether modular automatic speech recognition (ASR) can improve privacy in voice assistive systems by combining independently trained separation, recognition, and discretization modules to design configurable privacy-preserving ASR systems. We evaluate privacy concerns and the ef… ▽ More

    Submitted 1 April, 2021; originally announced April 2021.

    Comments: 5 pages, 1 figure

  49. arXiv:2101.00235  [pdf, other

    cs.HC

    MoSen: Activity Modelling in Multiple-Occupancy Smart Homes

    Authors: Yuting Zhan, Hamed Haddadi

    Abstract: Smart home solutions increasingly rely on a variety of sensors for behavioral analytics and activity recognition to provide context-aware applications and personalized care. Optimizing the sensor network is one of the most important approaches to ensure classification accuracy and the system's efficiency. However, the trade-off between the cost and performance is often a challenge in real deployme… ▽ More

    Submitted 1 January, 2021; originally announced January 2021.

  50. arXiv:2011.08605  [pdf, other

    cs.NI cs.LG

    The Case for Retraining of ML Models for IoT Device Identification at the Edge

    Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Yiming Xie, Richard Mortier, Hamed Haddadi

    Abstract: Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such they would greatly benefit from automated management. This requires robustly identifying devices so that appropriate network security policies can be applied. We address this challenge by exploring how to accurately identify IoT devices based on their network behavior, using resources available at th… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

    Comments: 13 pages, 8 figures, 4 tables