- document
-
Li, Qiongxiu (author), Gundersen, Jaron Skovsted (author), Lopuhaa-Zwakenberg, Milan (author), Heusdens, R. (author)Privacy-preserving distributed average consensus has received significant attention recently due to its wide applicability. Based on the achieved performances, existing approaches can be broadly classified into perfect accuracy-prioritized approaches such as secure multiparty computation (SMPC), and worst-case privacy-prioritized approaches...journal article 2024
- document
-
Ghavamipour, Ali Reza (author), Turkmen, Fatih (author), Wang, Rui (author), Liang, K. (author)Synthetic data generation plays a crucial role in many areas where data is scarce and privacy/confidentiality is a significant concern. Generative Adversarial Networks (GANs), arguably one of the most widely used data synthesis techniques, allow for the training of a model (i.e., generator) that can generate real-looking data by playing a min...conference paper 2023
- document
-
de With, Wim (author)Recommender systems usually base their predictions on user-item interaction, a technique known as collaborative filtering. Vendors that utilize collaborative filtering generally exclusively use their own user-item interactions, but the accuracy of the recommendations may improve if several vendors share their data. Since user-item interaction...master thesis 2022
- document
-
Tian, Yuhang (author)In this work, we propose FLVoogd, an updated federated learning method in which servers and clients collaboratively eliminate Byzantine attacks while preserving privacy. In particular, servers use automatic Density-based Spatial Clustering of Applications with Noise (DBSCAN) combined with S2PC to cluster the benign majority without acquiring...master thesis 2022
- document
-
Li, T. (author), Erkin, Z. (author), Lagendijk, R.L. (author)With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service. Information leakage during transportation is an important reason for theft since thieves can identify which truck is...journal article 2022
- document
-
Li, Qiongxiu (author), Gundersen, Jaron Skovsted (author), Heusdens, R. (author), Christensen, Mads Græsbøll (author)Privacy-preserving distributed processing has recently attracted considerable attention. It aims to design solutions for conducting signal processing tasks over networks in a decentralized fashion without violating privacy. Many existing algorithms can be adopted to solve this problem such as differential privacy, secure multiparty...journal article 2021