3 Research products, page 1 of 1
Loading
- Publication . Conference object . Contribution for newspaper or weekly magazine . 2021Closed Access EnglishAuthors:Reza Nasirigerdeh; Reihaneh Torkzadehmahani; Jan Baumbach; David Blumenthal;Reza Nasirigerdeh; Reihaneh Torkzadehmahani; Jan Baumbach; David Blumenthal;Publisher: Association for Computing MachineryCountry: Denmark
Federated learning (FL) is becoming an increasingly popular machine learning paradigm in application scenarios where sensitive data available at various local sites cannot be shared due to privacy protection regulations. In FL, the sensitive data never leaves the local sites and only model parameters are shared with a global aggregator. Nonetheless, it has recently been shown that, under some circumstances, the private data can be reconstructed from the model parameters, which implies that data leakage can occur in FL. In this paper, we draw attention to another risk associated with FL: Even if federated algorithms are individually privacy-preserving, combining them into pipelines is not necessarily privacy-preserving. We provide a concrete example from genome-wide association studies, where the combination of federated principal component analysis and federated linear regression allows the aggregator to retrieve sensitive patient data by solving an instance of the multidimensional subset sum problem. This supports the increasing awareness in the field that, for FL to be truly privacy-preserving, measures have to be undertaken to protect against data leakage at the aggregator.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2021Closed AccessAuthors:Pınar Kaygan; HARUN KAYGAN; Asuman Özgür;Pınar Kaygan; HARUN KAYGAN; Asuman Özgür;Country: Denmark
The social construction of gender through the design of technological artefacts, such as automobiles, motorcycles and domestic technologies, has received growing interest within feminist technology studies (FTS). Building on the extant FTS literature, in this research we explore how design of public transport (bus, minibus, metro) as a sociotechnical system shapes women's experiences of commute in their everyday lives. Drawing on empirical data that comes from interviews with 32 women, we focus on the complex entanglements of the women’s interactions (1) within the vehicle as a technological artefact with its layout, interior elements and technologies such as cameras, and (2) with other passengers (both men and women) and the driver. These entanglements constitute gendered experiences in public transport. Our findings specify the strategies women develop with concerns of (physical and social) personal space, safety, and travel hours in public transport; some of which have gained more prominence during the Covid-19 pandemic. We underline the diversity of these strategies depending on vehicle types, routes, and time of travel within which women negotiate the material and social interactions. We argue that such interactions can, and should, inspire all stakeholders for responsible innovation for inclusive and egalitarian public transport design.
- Publication . Contribution for newspaper or weekly magazine . Conference object . 2020Closed Access EnglishAuthors:Jonas Herskind Sejr; Arthur Zimek; Peter Schneider-Kamp;Jonas Herskind Sejr; Arthur Zimek; Peter Schneider-Kamp;Publisher: IEEECountry: Denmark
The detection of malicious HTTP(S) requests is a pressing concern in cyber security, in particular given the proliferation of HTTP-based (micro-)service architectures. In addition to rule-based systems for known attacks, anomaly detection has been shown to be a promising approach for unknown (zero-day) attacks. This article extends existing work by integrating outlier explanations for individual requests into an end-to-end pipeline. These end-to-end explanations reflect the internal working of the pipeline. Empirically, we show that found explanations coincide with manually labelled explanations for identified outliers, allowing security professionals to quickly identify and understand malicious requests.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.
3 Research products, page 1 of 1
Loading
- Publication . Conference object . Contribution for newspaper or weekly magazine . 2021Closed Access EnglishAuthors:Reza Nasirigerdeh; Reihaneh Torkzadehmahani; Jan Baumbach; David Blumenthal;Reza Nasirigerdeh; Reihaneh Torkzadehmahani; Jan Baumbach; David Blumenthal;Publisher: Association for Computing MachineryCountry: Denmark
Federated learning (FL) is becoming an increasingly popular machine learning paradigm in application scenarios where sensitive data available at various local sites cannot be shared due to privacy protection regulations. In FL, the sensitive data never leaves the local sites and only model parameters are shared with a global aggregator. Nonetheless, it has recently been shown that, under some circumstances, the private data can be reconstructed from the model parameters, which implies that data leakage can occur in FL. In this paper, we draw attention to another risk associated with FL: Even if federated algorithms are individually privacy-preserving, combining them into pipelines is not necessarily privacy-preserving. We provide a concrete example from genome-wide association studies, where the combination of federated principal component analysis and federated linear regression allows the aggregator to retrieve sensitive patient data by solving an instance of the multidimensional subset sum problem. This supports the increasing awareness in the field that, for FL to be truly privacy-preserving, measures have to be undertaken to protect against data leakage at the aggregator.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2021Closed AccessAuthors:Pınar Kaygan; HARUN KAYGAN; Asuman Özgür;Pınar Kaygan; HARUN KAYGAN; Asuman Özgür;Country: Denmark
The social construction of gender through the design of technological artefacts, such as automobiles, motorcycles and domestic technologies, has received growing interest within feminist technology studies (FTS). Building on the extant FTS literature, in this research we explore how design of public transport (bus, minibus, metro) as a sociotechnical system shapes women's experiences of commute in their everyday lives. Drawing on empirical data that comes from interviews with 32 women, we focus on the complex entanglements of the women’s interactions (1) within the vehicle as a technological artefact with its layout, interior elements and technologies such as cameras, and (2) with other passengers (both men and women) and the driver. These entanglements constitute gendered experiences in public transport. Our findings specify the strategies women develop with concerns of (physical and social) personal space, safety, and travel hours in public transport; some of which have gained more prominence during the Covid-19 pandemic. We underline the diversity of these strategies depending on vehicle types, routes, and time of travel within which women negotiate the material and social interactions. We argue that such interactions can, and should, inspire all stakeholders for responsible innovation for inclusive and egalitarian public transport design.
- Publication . Contribution for newspaper or weekly magazine . Conference object . 2020Closed Access EnglishAuthors:Jonas Herskind Sejr; Arthur Zimek; Peter Schneider-Kamp;Jonas Herskind Sejr; Arthur Zimek; Peter Schneider-Kamp;Publisher: IEEECountry: Denmark
The detection of malicious HTTP(S) requests is a pressing concern in cyber security, in particular given the proliferation of HTTP-based (micro-)service architectures. In addition to rule-based systems for known attacks, anomaly detection has been shown to be a promising approach for unknown (zero-day) attacks. This article extends existing work by integrating outlier explanations for individual requests into an end-to-end pipeline. These end-to-end explanations reflect the internal working of the pipeline. Empirically, we show that found explanations coincide with manually labelled explanations for identified outliers, allowing security professionals to quickly identify and understand malicious requests.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.