Skip to main content

Showing 1–3 of 3 results for author: Zeber, D

  1. arXiv:2003.04463  [pdf, other

    cs.CR

    Actions speak louder than words: Semi-supervised learning for browser fingerprinting detection

    Authors: Sarah Bird, Vikas Mishra, Steven Englehardt, Rob Willoughby, David Zeber, Walter Rudametkin, Martin Lopatka

    Abstract: As online tracking continues to grow, existing anti-tracking and fingerprinting detection techniques that require significant manual input must be augmented. Heuristic approaches to fingerprinting detection are precise but must be carefully curated. Supervised machine learning techniques proposed for detecting tracking require manually generated label-sets. Seeking to overcome these challenges, we… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

  2. Distributed Differential Privacy via Shuffling

    Authors: Albert Cheu, Adam Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaev

    Abstract: We consider the problem of designing scalable, robust protocols for computing statistics about sensitive data. Specifically, we look at how best to design differentially private protocols in a distributed setting, where each user holds a private datum. The literature has mostly considered two models: the "central" model, in which a trusted server collects users' data in the clear, which allows gre… ▽ More

    Submitted 16 May, 2019; v1 submitted 3 August, 2018; originally announced August 2018.

    Comments: Updated to correct a typo

  3. arXiv:1705.00831  [pdf, other

    cs.CR cs.CY cs.IR cs.LG

    BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model

    Authors: Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, Benjamin Livshits

    Abstract: We propose a hybrid model of differential privacy that considers a combination of regular and opt-in users who desire the differential privacy guarantees of the local privacy model and the trusted curator model, respectively. We demonstrate that within this model, it is possible to design a new type of blended algorithm for the task of privately computing the head of a search log. This blended app… ▽ More

    Submitted 21 November, 2019; v1 submitted 2 May, 2017; originally announced May 2017.

    Comments: Proceedings of the 26th USENIX Security Symposium (USENIX Security 17). August 16-18, 2017, Vancouver, BC. ISBN 978-1-931971-40-9

    Journal ref: Journal of Privacy and Confidentiality, Vol. 9 (2) 2019