Search Results for author: Emiliano De Cristofaro

Found 36 papers, 7 papers with code

On the Inadequacy of Similarity-based Privacy Metrics: Reconstruction Attacks against "Truly Anonymous Synthetic Data''

no code implementations8 Dec 2023 Georgi Ganev, Emiliano De Cristofaro

Alas, this is not the standard in industry as many companies use ad-hoc strategies to empirically evaluate privacy based on the statistical similarity between synthetic and real data.

Privacy Preserving Reconstruction Attack

Understanding how Differentially Private Generative Models Spend their Privacy Budget

no code implementations18 May 2023 Georgi Ganev, Kai Xu, Emiliano De Cristofaro

Generative models trained with Differential Privacy (DP) are increasingly used to produce synthetic data while reducing privacy risks.

BadVFL: Backdoor Attacks in Vertical Federated Learning

no code implementations18 Apr 2023 Mohammad Naseri, Yufei Han, Emiliano De Cristofaro

In VFL, the participants share the same set of training instances but only host a different and non-overlapping subset of the whole feature space.

Backdoor Attack Fraud Detection +1

Synthetic Data: Methods, Use Cases, and Risks

no code implementations1 Mar 2023 Emiliano De Cristofaro

Sharing data can often enable compelling applications and analytics.

Cerberus: Exploring Federated Prediction of Security Events

no code implementations7 Sep 2022 Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro

Modern defenses against cyberattacks increasingly rely on proactive approaches, e. g., to predict the adversary's next actions based on past events.

Federated Learning

Feels Bad Man: Dissecting Automated Hateful Meme Detection Through the Lens of Facebook's Challenge

no code implementations17 Feb 2022 Catherine Jennifer, Fatemeh Tahmasbi, Jeremy Blackburn, Gianluca Stringhini, Savvas Zannettou, Emiliano De Cristofaro

Internet memes have become a dominant method of communication; at the same time, however, they are also increasingly being used to advocate extremism and foster derogatory beliefs.

Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos

no code implementations3 Nov 2021 Chen Ling, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini

We do so vis-\`a-vis three research hypotheses; namely, that: 1) the video content, 2) TikTok's recommendation algorithm, and 3) the popularity of the video creator contribute to virality.

Cultural Vocal Bursts Intensity Prediction

Robin Hood and Matthew Effects: Differential Privacy Has Disparate Impact on Synthetic Data

no code implementations23 Sep 2021 Georgi Ganev, Bristena Oprisanu, Emiliano De Cristofaro

We analyze the impact of DP on these models vis-a-vis underrepresented classes/subgroups of data, specifically, studying: 1) the size of classes/subgroups in the synthetic data, and 2) the accuracy of classification tasks run on them.

On Utility and Privacy in Synthetic Genomic Data

no code implementations5 Feb 2021 Bristena Oprisanu, Georgi Ganev, Emiliano De Cristofaro

The availability of genomic data is essential to progress in biomedical research, personalized medicine, etc.

ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models

1 code implementation4 Feb 2021 Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang

As a result, we lack a comprehensive picture of the risks caused by the attacks, e. g., the different scenarios they can be applied to, the common factors that influence their performance, the relationship among them, or the effectiveness of possible defenses.

Attribute BIG-bench Machine Learning +3

The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information

no code implementations21 Jan 2021 Max Aliapoulios, Antonis Papasavva, Cameron Ballard, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Jeremy Blackburn

By interpreting cryptic "drops" of information from an anonymous insider calling themself Q, adherents of the conspiracy theory believe that Donald Trump is leading them in an active fight against this cabal.

Computers and Society Social and Information Networks

An Early Look at the Parler Online Social Network

no code implementations11 Jan 2021 Max Aliapoulios, Emmi Bevensee, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou

Parler is as an "alternative" social network promoting itself as a service that allows to "speak freely and express yourself openly, without fear of being deplatformed for your views."

Social and Information Networks Computers and Society Physics and Society

Local and Central Differential Privacy for Robustness and Privacy in Federated Learning

no code implementations8 Sep 2020 Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro

This paper investigates whether and to what extent one can use differential Privacy (DP) to protect both privacy and robustness in FL.

Federated Learning

An Overview of Privacy in Machine Learning

no code implementations18 May 2020 Emiliano De Cristofaro

In this document, we set to review privacy challenges in this space, providing a systematic review of the relevant research literature, also exploring possible countermeasures.

BIG-bench Machine Learning Clustering

The Evolution of the Manosphere Across the Web

no code implementations21 Jan 2020 Manoel Horta Ribeiro, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, Summer Long, Stephanie Greenberg, Savvas Zannettou

In this paper, we present a large-scale characterization of the Manosphere, a conglomerate of Web-based misogynist movements roughly focused on "men's issues," which has seen significant growth over the past years.

Computers and Society

Challenges in the Decentralised Web: The Mastodon Case

1 code implementation12 Sep 2019 Aravindh Raman, Sagar Joglekar, Emiliano De Cristofaro, Nishanth Sastry, Gareth Tyson

The Decentralised Web (DW) has recently seen a renewed momentum, with a number of DW platforms like Mastodon, Peer-Tube, and Hubzilla gaining increasing traction.

Networking and Internet Architecture Cryptography and Security Computers and Society

Detecting Cyberbullying and Cyberaggression in Social Media

no code implementations20 Jul 2019 Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis

We also explore specific manifestations of abusive behavior, i. e., cyberbullying and cyberaggression, in one of the hate-related communities (Gamergate).

On Collaborative Predictive Blacklisting

1 code implementation5 Oct 2018 Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro

Unfortunately, however, research on CPB has only focused on increasing the number of predicted attacks but has not considered the impact on false positives and false negatives.

Cryptography and Security

On the Origins of Memes by Means of Fringe Web Communities

2 code implementations31 May 2018 Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Guillermo Suarez-Tangil

In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2. 6B posts gathered from Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, over the course of 13 months.

Social and Information Networks Computers and Society

Exploiting Unintended Feature Leakage in Collaborative Learning

1 code implementation10 May 2018 Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov

First, we show that an adversarial participant can infer the presence of exact data points -- for example, specific locations -- in others' training data (i. e., membership inference).

Federated Learning

A Family of Droids -- Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis

no code implementations9 Mar 2018 Lucky Onwuzurike, Mario Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro

Aiming to counter them, detection techniques based on either static or dynamic analysis that model Android malware, have been proposed.

Cryptography and Security

Understanding Web Archiving Services and Their (Mis)Use on Social Media

no code implementations31 Jan 2018 Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini

Web archiving services play an increasingly important role in today's information ecosystem, by ensuring the continuing availability of information, or by deliberately caching content that might get deleted or removed.

Computers and Society Digital Libraries Social and Information Networks

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)

no code implementations20 Nov 2017 Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini

Aiming to assess whether MaMaDroid's effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls.

Differentially Private Mixture of Generative Neural Networks

no code implementations13 Sep 2017 Gergely Acs, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro

We model the generator distribution of the training data with a mixture of $k$ generative neural networks.

LOGAN: Membership Inference Attacks Against Generative Models

1 code implementation22 May 2017 Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro

Generative models estimate the underlying distribution of a dataset to generate realistic samples according to that distribution.

Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying

no code implementations24 Feb 2017 Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali

Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms.

Mean Birds: Detecting Aggression and Bullying on Twitter

1 code implementation22 Feb 2017 Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali

In recent years, bullying and aggression against users on social media have grown significantly, causing serious consequences to victims of all demographics.

Computers and Society Social and Information Networks

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models

no code implementations13 Dec 2016 Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini

Finally, we compare against DroidAPIMiner, a state-of-the-art system that relies on the frequency of API calls performed by apps, showing that MaMaDroid significantly outperforms it.

Cryptography and Security

Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web

no code implementations26 Oct 2016 Sina Sajadmanesh, Sina Jafarzadeh, Seyed Ali Osia, Hamid R. Rabiee, Hamed Haddadi, Yelena Mejova, Mirco Musolesi, Emiliano De Cristofaro, Gianluca Stringhini

In this paper, we present a large-scale study of recipes published on the web and their content, aiming to understand cuisines and culinary habits around the world.

Nutrition

Privacy-Friendly Mobility Analytics using Aggregate Location Data

no code implementations21 Sep 2016 Apostolos Pyrgelis, Emiliano De Cristofaro, Gordon Ross

Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes.

Privacy Preserving Time Series +1

Building and Measuring Privacy-Preserving Predictive Blacklists

no code implementations13 Dec 2015 Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro

(Withdrawn) Collaborative security initiatives are increasingly often advocated to improve timeliness and effectiveness of threat mitigation.

Privacy Preserving

Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps

no code implementations4 May 2015 Lucky Onwuzurike, Emiliano De Cristofaro

This paper presents a measurement study of information leakage and SSL vulnerabilities in popular Android apps.

Cryptography and Security Software Engineering

Paying for Likes? Understanding Facebook Like Fraud Using Honeypots

no code implementations7 Sep 2014 Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq

Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform.

Social and Information Networks Cryptography and Security Physics and Society

FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks

no code implementations8 Jan 2009 Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff

This work introduces FAIR, a novel framework for Fuzzy-based Aggregation providing In-network Resilience for Wireless Sensor Networks.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.