Skip to main content

Showing 1–12 of 12 results for author: Juarez, M

  1. arXiv:2306.06130  [pdf, other

    cs.AI cs.CV cs.LG

    Towards Understanding the Interplay of Generative Artificial Intelligence and the Internet

    Authors: Gonzalo Martínez, Lauren Watson, Pedro Reviriego, José Alberto Hernández, Marc Juarez, Rik Sarkar

    Abstract: The rapid adoption of generative Artificial Intelligence (AI) tools that can generate realistic images or text, such as DALL-E, MidJourney, or ChatGPT, have put the societal impacts of these technologies at the center of public debate. These tools are possible due to the massive amount of data (text and images) that is publicly available through the Internet. At the same time, these generative AI… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  2. arXiv:2303.01255  [pdf, other

    cs.CV

    Combining Generative Artificial Intelligence (AI) and the Internet: Heading towards Evolution or Degradation?

    Authors: Gonzalo Martínez, Lauren Watson, Pedro Reviriego, José Alberto Hernández, Marc Juarez, Rik Sarkar

    Abstract: In the span of a few months, generative Artificial Intelligence (AI) tools that can generate realistic images or text have taken the Internet by storm, making them one of the technologies with fastest adoption ever. Some of these generative AI tools such as DALL-E, MidJourney, or ChatGPT have gained wide public notoriety. Interestingly, these tools are possible because of the massive amount of dat… ▽ More

    Submitted 17 February, 2023; originally announced March 2023.

    Comments: First version

  3. arXiv:2209.03620  [pdf, other

    cs.LG cs.CR cs.CY

    Black-Box Audits for Group Distribution Shifts

    Authors: Marc Juarez, Samuel Yeom, Matt Fredrikson

    Abstract: When a model informs decisions about people, distribution shifts can create undue disparities. However, it is hard for external entities to check for distribution shift, as the model and its training set are often proprietary. In this paper, we introduce and study a black-box auditing method to detect cases of distribution shift that lead to a performance disparity of the model across demographic… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

  4. arXiv:2206.12183  [pdf, other

    cs.LG cs.CR cs.CY

    "You Can't Fix What You Can't Measure": Privately Measuring Demographic Performance Disparities in Federated Learning

    Authors: Marc Juarez, Aleksandra Korolova

    Abstract: As in traditional machine learning models, models trained with federated learning may exhibit disparate performance across demographic groups. Model holders must identify these disparities to mitigate undue harm to the groups. However, measuring a model's performance in a group requires access to information about group membership which, for privacy reasons, often has limited availability. We prop… ▽ More

    Submitted 11 January, 2023; v1 submitted 24 June, 2022; originally announced June 2022.

    Comments: 14 pages, 6 figures

  5. arXiv:2202.09727  [pdf, other

    cs.SI

    Online Platforms and the Fair Exposure Problem Under Homophily

    Authors: Jakob Schoeffer, Alexander Ritchie, Keziah Naggita, Faidra Monachou, Jessie Finocchiaro, Marc Juarez

    Abstract: In the wake of increasing political extremism, online platforms have been criticized for contributing to polarization. One line of criticism has focused on echo chambers and the recommended content served to users by these platforms. In this work, we introduce the fair exposure problem: given limited intervention power of the platform, the goal is to enforce balance in the spread of content (e.g.,… ▽ More

    Submitted 10 March, 2023; v1 submitted 19 February, 2022; originally announced February 2022.

    Comments: 37th AAAI Conference on Artificial Intelligence (AAAI-23)

  6. arXiv:1910.12293  [pdf, other

    q-bio.QM cs.MA

    Generation of digital patients for the simulation of tuberculosis with UISS-TB

    Authors: Marzio Pennisi, Miguel A. Juarez, Giulia Russo, Marco Viceconti, Francesco Pappalardo

    Abstract: EC funded STriTuVaD project aims to test, through a phase IIb clinical trial, two of the most advanced therapeutic vaccines against tuberculosis. In parallel, we have extended the Universal Immune System Simulator to include all relevant determinants of such clinical trial, to establish its predictive accuracy against the individual patients recruited in the trial, to use it to generate digital pa… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

    Comments: 5 pages

  7. arXiv:1909.04660  [pdf

    q-bio.QM cs.CE

    POSITION PAPER: Credibility of In Silico Trial Technologies: A Theoretical Framing

    Authors: Marco Viceconti, Miguel A. Juárez, Cristina Curreli, Marzio Pennisi, Giulia Russo, Francesco Pappalardo

    Abstract: Different research communities have developed various approaches to assess the credibility of predictive models. Each approach usually works well for a specific type of model, and under some epistemic conditions that are normally satisfied within that specific research domain. Some regulatory agencies recently started to consider evidences of safety and efficacy on new medical products obtained us… ▽ More

    Submitted 24 October, 2019; v1 submitted 10 September, 2019; originally announced September 2019.

    Comments: 11 pages

  8. arXiv:1906.09682  [pdf, other

    cs.CR

    Encrypted DNS --> Privacy? A Traffic Analysis Perspective

    Authors: Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso

    Abstract: Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship. To address these issues, large organizations such as Google and Cloudflare are deploying recently standardized protocols that encrypt DNS traffic between end users and recursive resolvers such a… ▽ More

    Submitted 6 October, 2019; v1 submitted 23 June, 2019; originally announced June 2019.

  9. arXiv:1801.02265  [pdf, other

    cs.CR

    Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

    Authors: Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright

    Abstract: Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we pre… ▽ More

    Submitted 19 August, 2018; v1 submitted 7 January, 2018; originally announced January 2018.

    Comments: To appear in the 2018 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2018)

  10. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services

    Authors: Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz

    Abstract: Recent studies have shown that Tor onion (hidden) service websites are particularly vulnerable to website fingerprinting attacks due to their limited number and sensitive nature. In this work we present a multi-level feature analysis of onion site fingerprintability, considering three state-of-the-art website fingerprinting methods and 482 Tor onion services, making this the largest analysis of th… ▽ More

    Submitted 20 September, 2017; v1 submitted 28 August, 2017; originally announced August 2017.

    Comments: Accepted by ACM CCS 2017

  11. Automated Website Fingerprinting through Deep Learning

    Authors: Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, Wouter Joosen

    Abstract: Several studies have shown that the network traffic that is generated by a visit to a website over Tor reveals information specific to the website through the timing and sizes of network packets. By capturing traffic traces between users and their Tor entry guard, a network eavesdropper can leverage this meta-data to reveal which website Tor users are visiting. The success of such attacks heavily… ▽ More

    Submitted 5 December, 2017; v1 submitted 21 August, 2017; originally announced August 2017.

    Comments: To appear in the 25th Symposium on Network and Distributed System Security (NDSS 2018)

  12. arXiv:1512.00524  [pdf, other

    cs.CR

    Toward an Efficient Website Fingerprinting Defense

    Authors: Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright

    Abstract: Website Fingerprinting attacks enable a passive eavesdropper to recover the user's otherwise anonymized web browsing activity by matching the observed traffic with prerecorded web traffic templates. The defenses that have been proposed to counter these attacks are impractical for deployment in real-world systems due to their high cost in terms of added delay and bandwidth overhead. Further, these… ▽ More

    Submitted 19 July, 2016; v1 submitted 1 December, 2015; originally announced December 2015.

    Comments: To appear In the proceedings of the European Symposium on Research in Computer Security (ESORICS), pp. 20, Springer, 2016