Change search
Link to record
Permanent link

Direct link
Publications (10 of 19) Show all publications
Eklund, D., Iacovazzi, A., Wang, H., Pyrgelis, A. & Raza, S. (2024). BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection. Paper presented at 29th European Symposium on Research in Computer Security, ESORICS 2024. Bydgoszcz. 16 September 2024 through 20 September 2024. Lecture Notes in Computer Science, 14983 LNCS, 353-373
Open this publication in new window or tab >>BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection
Show others...
2024 (English)In: Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349, Vol. 14983 LNCS, p. 353-373Article in journal (Refereed) Published
Abstract [en]

We introduce low complexity bounds on mutual information for efficient privacy-preserving feature selection with secure multi-party computation (MPC). Considering a discrete feature with N possible values and a discrete label with M possible values, our approach requires O(N) multiplications as opposed to O(NM) in a direct MPC implementation of mutual information. Our experimental results show that for regression tasks, we achieve a computation speed up of over 1,000× compared to a straightforward MPC implementation of mutual information, while achieving similar accuracy for the downstream machine learning model.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2024
Keywords
Differential privacy; Complexity bounds; Computation speed; Features selection; Lower complexity; Multiparty computation; Mutual informations; Privacy; Privacy preserving; Secure multi-party computation; Speed up
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-76193 (URN)10.1007/978-3-031-70890-9_18 (DOI)2-s2.0-85204610017 (Scopus ID)
Conference
29th European Symposium on Research in Computer Security, ESORICS 2024. Bydgoszcz. 16 September 2024 through 20 September 2024
Note

This research is funded by the EU Horizon Europe project HARPOCRATES (Grant ID. 101069535) and H2020 project CONCORDIA (Grant ID. 830927). We thank Tuomas Karhu for preparing the SpO2 data as well as help and advice in the process. We would also like to thank the anonymous reviewers for their comments and suggested improvements.

Available from: 2024-11-18 Created: 2024-11-18 Last updated: 2024-11-18Bibliographically approved
Sinaei, S., Mohammadi, M., Shrestha, R., Alibeigi, M. & Eklund, D. (2024). PRIV-DRIVE: Privacy-Ensured Federated Learning using Homomorphic Encryption for Driver Fatigue Detection. In: Proceedings - 2024 27th Euromicro Conference on Digital System Design, DSD 2024: . Paper presented at 27th Euromicro Conference on Digital System Design, DSD 2024. Paris, France. 28 August 2024 through 30 August 2024 (pp. 427-434). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>PRIV-DRIVE: Privacy-Ensured Federated Learning using Homomorphic Encryption for Driver Fatigue Detection
Show others...
2024 (English)In: Proceedings - 2024 27th Euromicro Conference on Digital System Design, DSD 2024, Institute of Electrical and Electronics Engineers Inc. , 2024, p. 427-434Conference paper, Published paper (Refereed)
Abstract [en]

Context: Detecting fatigue in drivers has become increasingly important for safe driving, especially with the use of more smart devices and Internet-connected vehicles. While sharing data between vehicles can enhance fatigue detection systems, privacy concerns pose significant barriers to this sharing process. We propose a Federated Learning (FL) approach for monitoring fatigue-driven behavior to address these challenges. However, there is a concern that the drivers’ private information might be leaked in the FL system. In this paper, we introduce PRIV-DRIVE, a novel approach for privacy-enhanced fatigue detection applications. Our method integrates Paillier homo-morphic encryption (PHE) with a top-k parameter selection technique, bolstering privacy and confidentiality in federated fatigue detection systems. This approach reduces communication and computation overhead while ensuring model accuracy. To the best of our knowledge, this is the first paper to implement PHE in FL setups for fatigue detection applications. We ran several experiments and evaluated the PRIV-DRIVE method. The results show substantial efficiency gains with different HE key sizes, reducing computation time by up to 96% and communication traffic by up to 95%. Importantly, these improvements have minimal impact on accuracy, effectively meeting the requirements of fatigue detection applications. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2024
Keywords
Detection system; Driver fatigue; Fatigue detection; Ho-momorphic encryptions; Homomorphic-encryptions; Morphic; Privacy preserving; Privacy-preserving mechanism; Safe driving; Smart devices; Differential privacy
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ri:diva-76404 (URN)10.1109/DSD64264.2024.00063 (DOI)2-s2.0-85211895235 (Scopus ID)
Conference
27th Euromicro Conference on Digital System Design, DSD 2024. Paris, France. 28 August 2024 through 30 August 2024
Note

This work was supported by EU ECSEL project DAIS that has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No.101007273.

Available from: 2025-01-29 Created: 2025-01-29 Last updated: 2025-01-29Bibliographically approved
Rocco, S. D., Edwards, P. B., Eklund, D., Gäfvert, O. & Hauenstein, J. D. (2023). Computing Geometric Feature Sizes for Algebraic Manifolds. SIAM Journal on Applied Algebra and Geometry, 7(4), 716-741
Open this publication in new window or tab >>Computing Geometric Feature Sizes for Algebraic Manifolds
Show others...
2023 (English)In: SIAM Journal on Applied Algebra and Geometry, ISSN 2470-6566, Vol. 7, no 4, p. 716-741Article in journal (Refereed) Published
Abstract [en]

We introduce numerical algebraic geometry methods for computing lower bounds on the reach, local feature size, and weak feature size of the real part of an equidimensional and smooth algebraic variety using the variety’s defining polynomials as input. For the weak feature size, we also show that nonquadratic complete intersections generically have finitely many geometric bottlenecks, and we describe how to compute the weak feature size directly rather than a lower bound in this case. In all other cases, we describe additional computations that can be used to determine feature size values rather than lower bounds. 

Place, publisher, year, edition, pages
Society for Industrial and Applied Mathematics Publications, 2023
Keywords
Algebra; Numerical methods; Bottleneck; Feature sizes; Geometric feature; Local feature size; Low bound; Numerical algebraic geometry; Reach; Real part; Topological data analysis; Weak feature size; Geometry
National Category
Computational Mathematics
Identifiers
urn:nbn:se:ri:diva-68798 (URN)10.1137/22M1522656 (DOI)2-s2.0-85178903606 (Scopus ID)
Funder
Swedish Research Council, NT:2018-03688
Note

Funding: The fifth author was supported in part by NSF grant CCF-181274. The fourth author was supported in part by EPSRC EP/R018472/1 and Bristol Myers Squibb. The first author was partially supported by the VR grant NT:2018-03688.

Available from: 2024-01-09 Created: 2024-01-09 Last updated: 2024-01-15Bibliographically approved
Wang, H., Eklund, D., Oprea, A. & Raza, S. (2023). FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning. ACM Trans. Internet Things, 4(3)
Open this publication in new window or tab >>FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning
2023 (English)In: ACM Trans. Internet Things, ISSN 2691-1914, Vol. 4, no 3Article in journal (Refereed) Published
Abstract [en]

Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks. With the proliferation of massive but heterogeneous IoT devices, it is getting challenging to detect vulnerable devices connected to networks. Current machine learning-based techniques for fingerprinting and identifying devices necessitate a significant amount of data gathered from IoT networks that must be transmitted to a central cloud. Nevertheless, private IoT data cannot be shared with the central cloud in numerous sensitive scenarios. Federated learning (FL) has been regarded as a promising paradigm for decentralized learning and has been applied in many different use cases. It enables machine learning models to be trained in a privacy-preserving way. In this article, we propose a privacy-preserved IoT device fingerprinting and identification mechanisms using FL; we call it FL4IoT. FL4IoT is a two-phased system combining unsupervised-learning-based device fingerprinting and supervised-learning-based device identification. FL4IoT shows its practicality in different performance metrics in a federated and centralized setup. For instance, in the best cases, empirical results show that FL4IoT achieves ∌99% accuracy and F1-Score in identifying IoT devices using a federated setup without exposing any private data to a centralized cloud entity. In addition, FL4IoT can detect spoofed devices with over 99% accuracy.

Place, publisher, year, edition, pages
Association for Computing Machinery, 2023
Keywords
identification, Internet of things, fingerprinting, machine learning, federated learning
National Category
Communication Systems
Identifiers
urn:nbn:se:ri:diva-65760 (URN)10.1145/3603257 (DOI)
Available from: 2023-08-14 Created: 2023-08-14 Last updated: 2023-11-06Bibliographically approved
Mohammadi, M., Allocca, R., Eklund, D., Shrestha, R. & Sinaei, S. (2023). Privacy-preserving Federated Learning System for Fatigue Detection. Paper presented at 3rd IEEE International Conference on Cyber Security and Resilience, CSR 2023Hybrid, Venice31 July 2023 through 2 August 2023. Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023, 624-629
Open this publication in new window or tab >>Privacy-preserving Federated Learning System for Fatigue Detection
Show others...
2023 (English)In: Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023, p. 624-629Article in journal (Refereed) Published
Abstract [en]

Context:. Drowsiness affects the driver’s cognitive abilities, which are all important for safe driving. Fatigue detection is a critical technique to avoid traffic accidents. Data sharing among vehicles can be used to optimize fatigue detection models and ensure driving safety. However, data privacy issues hinder the sharing process. To tackle these challenges, we propose a Federated Learning (FL) approach for fatigue-driving behavior monitoring. However, in the FL system, the privacy information of the drivers might be leaked. In this paper, we propose to combine the concept of differential privacy (DP) with Federated Learning for the fatigue detection application, in which artificial noise is added to parameters at the drivers’ side before aggregating. This approach will ensure the privacy of drivers’ data and the convergence of the federated learning algorithms. In this paper, the privacy level in the system is determined in order to achieve a balance between the noise scale and the model’s accuracy. In addition, we have evaluated our models resistance against a model inversion attack. The effectiveness of the attack is measured by the Mean Squared Error (MSE) between the reconstructed data point and the training data. The proposed approach, compared to the non-DP case, has a 6% accuracy loss while decreasing the effectiveness of the attacks by increasing the MSE from 5.0 to 7.0, so a balance between accuracy and noise scale is achieved.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2023
Keywords
Learning algorithms; Mean square error; Privacy-preserving techniques; Cognitive ability; Critical technique; Differ-ential privacy; Differential privacies; Fatigue detection; Federated learning; Federated learning system; Mean squared error; Privacy preserving; Safe driving; Learning systems
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-67444 (URN)10.1109/CSR57506.2023.10224953 (DOI)2-s2.0-85171804331 (Scopus ID)
Conference
3rd IEEE International Conference on Cyber Security and Resilience, CSR 2023Hybrid, Venice31 July 2023 through 2 August 2023
Note

This work was partially supported by EU ECSEL projectDAIS that has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No.101007273. 

Available from: 2023-10-02 Created: 2023-10-02 Last updated: 2023-12-27Bibliographically approved
Wang, H., Muñoz-González, L., Hameed, M. Z., Eklund, D. & Raza, S. (2023). SparSFA: Towards robust and communication-efficient peer-to-peer federated learning. Computers & security (Print), 129, Article ID 103182.
Open this publication in new window or tab >>SparSFA: Towards robust and communication-efficient peer-to-peer federated learning
Show others...
2023 (English)In: Computers & security (Print), ISSN 0167-4048, E-ISSN 1872-6208, Vol. 129, article id 103182Article in journal (Refereed) Published
Abstract [en]

Federated Learning (FL) has emerged as a powerful paradigm to train collaborative machine learning (ML) models, preserving the privacy of the participants’ datasets. However, standard FL approaches present some limitations that can hinder their applicability in some applications. Thus, the need of a server or aggregator to orchestrate the learning process may not be possible in scenarios with limited connectivity, as in some IoT applications, and offer less flexibility to personalize the ML models for the different participants. To sidestep these limitations, peer-to-peer FL (P2PFL) provides more flexibility, allowing participants to train their own models in collaboration with their neighbors. However, given the huge number of parameters of typical Deep Neural Network architectures, the communication burden can also be very high. On the other side, it has been shown that standard aggregation schemes for FL are very brittle against data and model poisoning attacks. In this paper, we propose SparSFA, an algorithm for P2PFL capable of reducing the communication costs. We show that our method outperforms competing sparsification methods in P2P scenarios, speeding the convergence and enhancing the stability during training. SparSFA also includes a mechanism to mitigate poisoning attacks for each participant in any random network topology. Our empirical evaluation on real datasets for intrusion detection in IoT, considering both balanced and imbalanced-dataset scenarios, shows that SparSFA is robust to different indiscriminate poisoning attacks launched by one or multiple adversaries, outperforming other robust aggregation methods whilst reducing the communication costs through sparsification. 

Place, publisher, year, edition, pages
Elsevier Ltd, 2023
Keywords
Adversarial machine learning, Communication efficiency, IDS, IoT, Peer-to-peer federated learning, Poisoning attack, Cost reduction, Deep neural networks, Internet of things, Learning systems, Network architecture, Network security, Network topology, Communication cost, Machine learning models, Machine-learning, Peer to peer, Poisoning attacks, Intrusion detection
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-64312 (URN)10.1016/j.cose.2023.103182 (DOI)2-s2.0-85151480655 (Scopus ID)
Note

Correspondence Address: Wang, H.; RISE Research Institutes of SwedenSweden; email: han.wang@ri.se; Funding details: 830927; Funding details: 101020259; Funding text 1: This research is funded by the EU H2020 projects ARCADIAN-IoT (Grant ID. 101020259) and CONCORDIA (Grant ID: 830927).; Funding text 2: This research is funded by the EU H2020 projects ARCADIAN-IoT (Grant ID. 101020259) and CONCORDIA (Grant ID: 830927).

Available from: 2023-04-25 Created: 2023-04-25 Last updated: 2023-11-06Bibliographically approved
Eklund, D. (2023). The numerical algebraic geometry of bottlenecks. Advances in Applied Mathematics, 142, Article ID 102416.
Open this publication in new window or tab >>The numerical algebraic geometry of bottlenecks
2023 (English)In: Advances in Applied Mathematics, ISSN 0196-8858, E-ISSN 1090-2074, Vol. 142, article id 102416Article in journal (Refereed) Published
Abstract [en]

This is a computational study of bottlenecks on algebraic varieties. The bottlenecks of a smooth variety X⊆Cn are the lines in Cn which are normal to X at two distinct points. The main result is a numerical homotopy that can be used to approximate all isolated bottlenecks. This homotopy has the optimal number of paths under certain genericity assumptions. In the process we prove bounds on the number of bottlenecks in terms of the Euclidean distance degree. Applications include the optimization problem of computing the distance between two real varieties. Also, computing bottlenecks may be seen as part of the problem of computing the reach of a smooth real variety and efficient methods to compute the reach are still to be developed. Relations to triangulation of real varieties and meshing algorithms used in computer graphics are discussed in the paper. The resulting algorithms have been implemented with Bertini [4] and Macaulay2 [17]. 

Place, publisher, year, edition, pages
Academic Press Inc., 2023
Keywords
Numerical algebraic geometry, Reach of manifolds, Systems of polynomials, Triangulation of manifolds, Algebra, Computer graphics, Geometry, Algebraic varieties, Computational studies, Distinct points, Genericity, Homotopies, Optimal number, Reach of manifold, System of polynomial, Triangulation of manifold, Triangulation
National Category
Geometry
Identifiers
urn:nbn:se:ri:diva-60080 (URN)10.1016/j.aam.2022.102416 (DOI)2-s2.0-85136595548 (Scopus ID)
Available from: 2022-09-09 Created: 2022-09-09 Last updated: 2022-09-09Bibliographically approved
Bates, D., Eklund, D., Hauenstein, J. & Peterson, C. (2022). Excess Intersections and Numerical Irreducible Decompositions. In: : . Paper presented at International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC).
Open this publication in new window or tab >>Excess Intersections and Numerical Irreducible Decompositions
2022 (English)Conference paper, Published paper (Refereed)
National Category
Computational Mathematics
Identifiers
urn:nbn:se:ri:diva-58541 (URN)
Conference
International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
Available from: 2022-02-16 Created: 2022-02-16 Last updated: 2023-03-23Bibliographically approved
Wang, H., Muñoz-González, L., Eklund, D. & Raza, S. (2021). Non-IID Data Re-Balancing at IoT Edge with Peer-to-Peer Federated Learning for Anomaly Detection. In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks: . Paper presented at WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks.28 June 2021- 2 July 2021 (pp. 153-163). Association for Computing Machinery
Open this publication in new window or tab >>Non-IID Data Re-Balancing at IoT Edge with Peer-to-Peer Federated Learning for Anomaly Detection
2021 (English)In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery , 2021, p. 153-163Conference paper, Published paper (Refereed)
Abstract [en]

The increase of the computational power in edge devices has enabled the penetration of distributed machine learning technologies such as federated learning, which allows to build collaborative models performing the training locally in the edge devices, improving the efficiency and the privacy for training of machine learning models, as the data remains in the edge devices. However, in some IoT networks the connectivity between devices and system components can be limited, which prevents the use of federated learning, as it requires a central node to orchestrate the training of the model. To sidestep this, peer-to-peer learning appears as a promising solution, as it does not require such an orchestrator. On the other side, the security challenges in IoT deployments have fostered the use of machine learning for attack and anomaly detection. In these problems, under supervised learning approaches, the training datasets are typically imbalanced, i.e. the number of anomalies is very small compared to the number of benign data points, which requires the use of re-balancing techniques to improve the algorithms’ performance. In this paper, we propose a novel peer-to-peer algorithm,P2PK-SMOTE, to train supervised anomaly detection machine learning models in non-IID scenarios, including mechanisms to locally re-balance the training datasets via synthetic generation of data points from the minority class. To improve the performance in non-IID scenarios, we also include a mechanism for sharing a small fraction of synthetic data from the minority class across devices, aiming to reduce the risk of data de-identification. Our experimental evaluation in real datasets for IoT anomaly detection across a different set of scenarios validates the benefits of our proposed approach.

Place, publisher, year, edition, pages
Association for Computing Machinery, 2021
Keywords
federated learning, anomaly detection, non-IID data, imbalanced data
National Category
Computer Sciences
Identifiers
urn:nbn:se:ri:diva-55437 (URN)10.1145/3448300.3467827 (DOI)978-1-4503-8349-3 (ISBN)
Conference
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks.28 June 2021- 2 July 2021
Available from: 2021-07-08 Created: 2021-07-08 Last updated: 2023-11-06Bibliographically approved
Rocco, S. D., Eklund, D. & Weinstein, M. (2020). The Bottleneck Degree of Algebraic Varieties. SIAM Journal on Applied Algebra and Geometry, 4(1), 227-253
Open this publication in new window or tab >>The Bottleneck Degree of Algebraic Varieties
2020 (English)In: SIAM Journal on Applied Algebra and Geometry, Vol. 4, no 1, p. 227-253Article in journal (Refereed) Published
Place, publisher, year, edition, pages
Society for Industrial & Applied Mathematics (SIAM), 2020
National Category
Mathematics Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-58543 (URN)10.1137/19m1265776 (DOI)
Available from: 2022-02-16 Created: 2022-02-16 Last updated: 2023-03-23Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-1954-760x

Search in DiVA

Show all publications