1 code implementation • 5 Feb 2021 • Giovanni Cherubin, Konstantinos Chatzikokolakis, Martin Jaggi
We evaluate our findings empirically, and discuss when methods are suitable for CP optimization.
no code implementations • 22 Dec 2020 • Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi
A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage of information.
1 code implementation • 9 May 2020 • Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida
A feature of our approach is that it does not require to estimate the conditional probabilities, and that it is suitable for a large class of ML algorithms.
1 code implementation • 1 Apr 2019 • Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi
The idea is to set up two nets: the generator, that tries to produce an optimal obfuscation mechanism to protect the data, and the classifier, that tries to de-obfuscate the data.
1 code implementation • 4 Feb 2019 • Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi
The state-of-the-art method for estimating these leakage measures is the frequentist paradigm, which approximates the system's internals by looking at the frequencies of its inputs and outputs.
Cryptography and Security
2 code implementations • 10 Dec 2012 • Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi
The growing popularity of location-based systems, allowing unknown/untrusted servers to easily collect huge amounts of information regarding users' location, has recently started raising serious privacy concerns.
Cryptography and Security C.2.0; K.4.1