
-
Information Leakage Games: Exploring Information as a Utility Function
A common goal in the areas of secure information flow and privacy is to ...
read it
-
The Bayes Security Measure
Security system designers favor worst-case security measures, such as th...
read it
-
Survey on Causal-based Machine Learning Fairness Notions
Addressing the problem of fairness is crucial to safely use machine lear...
read it
-
On the Applicability of ML Fairness Notions
ML-based predictive systems are increasingly used to support decisions w...
read it
-
Estimating g-Leakage via Machine Learning
This paper considers the problem of estimating the information leakage o...
read it
-
Feature selection in machine learning: Rényi min-entropy vs Shannon entropy
Feature selection, in the context of machine learning, is the process of...
read it
-
Full Convergence of the Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection
The iterative Bayesian update (IBU) and the matrix inversion (INV) are t...
read it
-
Utility-Preserving Privacy Mechanisms for Counting Queries
Differential privacy (DP) and local differential privacy (LPD) are frame...
read it
-
Generating Optimal Privacy-Protection Mechanisms via Machine Learning
We consider the problem of obfuscating sensitive information while prese...
read it
-
F-BLEAU: Fast Black-box Leakage Estimation
We consider the problem of measuring how much a system reveals about its...
read it
-
Metric-based local differential privacy for statistical applications
Local differential privacy (LPD) is a distributed variant of differentia...
read it
-
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition
In the inference attacks studied in Quantitative Information Flow (QIF),...
read it
-
Leakage and Protocol Composition in a Game-Theoretic Perspective
In the inference attacks studied in Quantitative Information Flow (QIF),...
read it