Search Results - "Gambs, Sebastien"
-
1
Quantum speed-up for unsupervised learning
Published in Machine learning (01-02-2013)“…We show how the quantum paradigm can be used to speed up unsupervised learning algorithms. More precisely, we explain how it is possible to accelerate learning…”
Get full text
Journal Article -
2
RSSI-based attacks for identification of BLE devices
Published in Computers & security (01-12-2024)“…To prevent tracking, the Bluetooth Low Energy (BLE) protocol integrates privacy mechanisms such as address randomization. However, as highlighted by previous…”
Get full text
Journal Article -
3
Meeting points in ridesharing: A privacy-preserving approach
Published in Transportation research. Part C, Emerging technologies (01-11-2016)“…•We propose a distributed and privacy preserving approach for ridesharing systems.•It combines multimodal routing algorithms and secure multiparty…”
Get full text
Journal Article -
4
Machine-Learning Approach for Automatic Detection of Wild Beluga Whales from Hand-Held Camera Pictures
Published in Sensors (Basel, Switzerland) (28-05-2022)“…A key aspect of ocean protection consists in estimating the abundance of marine mammal population density within their habitat, which is usually accomplished…”
Get full text
Journal Article -
5
De-anonymization attack on geolocated data
Published in Journal of computer and system sciences (01-12-2014)“…With the advent of GPS-equipped devices, a massive amount of location data is being collected, raising the issue of the privacy risks incurred by the…”
Get full text
Journal Article -
6
Improving fairness generalization through a sample-robust optimization method
Published in Machine learning (01-06-2023)“…Unwanted bias is a major concern in machine learning, raising in particular significant ethical issues when machine learning models are deployed within…”
Get full text
Journal Article -
7
Optimal noise functions for location privacy on continuous regions
Published in International journal of information security (01-11-2018)“…Users of location-based services are highly vulnerable to privacy risks since they need to disclose, at least partially, their locations to benefit from these…”
Get full text
Journal Article -
8
Comment: On the privacy-conscientious use of mobile phone data
Published in Scientific data (11-12-2018)“…The breadcrumbs we leave behind when using our mobile phones—who somebody calls, for how long, and from where—contain unprecedented insights about us and our…”
Get full text
Journal Article -
9
Membership inference attack for beluga whales discrimination
Published in Ecological informatics (01-03-2024)“…To efficiently monitor the growth and evolution of a particular wildlife population, one of the fundamental challenges to address in animal ecology is the…”
Get full text
Journal Article -
10
Local Data Debiasing for Fairness Based on Generative Adversarial Training
Published in Algorithms (01-03-2021)“…The widespread use of automated decision processes in many areas of our society raises serious ethical issues with respect to the fairness of the process and…”
Get full text
Journal Article -
11
PROPS: A PRivacy-Preserving Location Proof System
Published in 2014 IEEE 33rd International Symposium on Reliable Distributed Systems (01-10-2014)“…A secure location-based service requires that a mobile user certifies his position before gaining access to a resource. Currently, most of the existing…”
Get full text
Conference Proceeding -
12
Towards privacy-driven design of a dynamic carpooling system
Published in Pervasive and mobile computing (01-10-2014)“…Dynamic carpooling (also known as instant or ad-hoc ridesharing) is a service that arranges one-time shared rides on very short notice. This type of carpooling…”
Get full text
Journal Article -
13
Privacy-preserving boosting
Published in Data mining and knowledge discovery (01-02-2007)“…We describe two algorithms, BiBoost (Bipartite Boosting) and MultBoost (Multiparty Boosting), that allow two or more participants to construct a boosting…”
Get full text
Journal Article -
14
Heterogeneous Differential Privacy
Published in The journal of privacy and confidentiality (12-01-2017)“…The massive collection of personal data by personalization systems has rendered the preservation of privacy of individuals more and more difficult. Most of the…”
Get full text
Journal Article -
15
Leveraging In-Network Computing for Privacy-Aware Real-Time Surveillance mHealth Applications
Published in GLOBECOM 2023 - 2023 IEEE Global Communications Conference (04-12-2023)“…The Internet of Things has become highly popular in the healthcare sector due to its benefits for patients, doctors and health authorities. In particular, the…”
Get full text
Conference Proceeding -
16
Exploiting Fairness to Enhance Sensitive Attributes Reconstruction
Published in 2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) (01-02-2023)“…In recent years, a growing body of work has emerged on how to learn machine learning models under fairness constraints, often expressed with respect to some…”
Get full text
Conference Proceeding -
17
A Privacy-Preserving NFC Mobile Pass for Transport Systems
Published in ICST Transactions on Mobile Communications and Applications (28-12-2014)“…The emergence of the NFC (Near Field Communication) technology brings new capacities to the next generation of smartphones, but also new security and privacy…”
Get full text
Journal Article -
18
Probabilistic Dataset Reconstruction from Interpretable Models
Published in 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) (09-04-2024)“…Interpretability is often pointed out as a key requirement for trustworthy machine learning. However, learning and releasing models that are inherently…”
Get full text
Conference Proceeding -
19
[~Re]Simulating socioeconomic-based affirmative action
Published in ReScience journal (16-11-2023)“…Replication…”
Get full text
Journal Article -
20
IOTFLA : A Secured and Privacy-Preserving Smart Home Architecture Implementing Federated Learning
Published in 2019 IEEE Security and Privacy Workshops (SPW) (01-05-2019)“…Slowly but steadily, the Internet of Things (IoT) is becoming more and more ubiquitous in our daily life. However, it also brings important security and…”
Get full text
Conference Proceeding