Search Results for author: Konstantinos Chatzikokolakis

Found 6 papers, 5 papers with code

Information Leakage Games: Exploring Information as a Utility Function

no code implementations22 Dec 2020 Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage of information.

Estimating g-Leakage via Machine Learning

1 code implementation9 May 2020 Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida

A feature of our approach is that it does not require to estimate the conditional probabilities, and that it is suitable for a large class of ML algorithms.

BIG-bench Machine Learning

Optimal Obfuscation Mechanisms via Machine Learning

1 code implementation1 Apr 2019 Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi

The idea is to set up two nets: the generator, that tries to produce an optimal obfuscation mechanism to protect the data, and the classifier, that tries to de-obfuscate the data.

BIG-bench Machine Learning

F-BLEAU: Fast Black-box Leakage Estimation

1 code implementation4 Feb 2019 Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi

The state-of-the-art method for estimating these leakage measures is the frequentist paradigm, which approximates the system's internals by looking at the frequencies of its inputs and outputs.

Cryptography and Security

Geo-Indistinguishability: Differential Privacy for Location-Based Systems

2 code implementations10 Dec 2012 Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi

The growing popularity of location-based systems, allowing unknown/untrusted servers to easily collect huge amounts of information regarding users' location, has recently started raising serious privacy concerns.

Cryptography and Security C.2.0; K.4.1

Cannot find the paper you are looking for? You can Submit a new open access paper.