
Information Leakage Games: Exploring Information as a Utility Function
A common goal in the areas of secure information flow and privacy is to ...
read it

The Bayes Security Measure
Security system designers favor worstcase security measures, such as th...
read it

Survey on Causalbased Machine Learning Fairness Notions
Addressing the problem of fairness is crucial to safely use machine lear...
read it

On the Applicability of ML Fairness Notions
MLbased predictive systems are increasingly used to support decisions w...
read it

Estimating gLeakage via Machine Learning
This paper considers the problem of estimating the information leakage o...
read it

Feature selection in machine learning: Rényi minentropy vs Shannon entropy
Feature selection, in the context of machine learning, is the process of...
read it

Full Convergence of the Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection
The iterative Bayesian update (IBU) and the matrix inversion (INV) are t...
read it

UtilityPreserving Privacy Mechanisms for Counting Queries
Differential privacy (DP) and local differential privacy (LPD) are frame...
read it

Generating Optimal PrivacyProtection Mechanisms via Machine Learning
We consider the problem of obfuscating sensitive information while prese...
read it

FBLEAU: Fast Blackbox Leakage Estimation
We consider the problem of measuring how much a system reveals about its...
read it

Metricbased local differential privacy for statistical applications
Local differential privacy (LPD) is a distributed variant of differentia...
read it

A GameTheoretic Approach to InformationFlow Control via Protocol Composition
In the inference attacks studied in Quantitative Information Flow (QIF),...
read it

Leakage and Protocol Composition in a GameTheoretic Perspective
In the inference attacks studied in Quantitative Information Flow (QIF),...
read it
Catuscia Palamidessi
is this you? claim profile