Skip to main content

Showing 1–9 of 9 results for author: Peisert, S

  1. arXiv:2403.02324  [pdf, other

    eess.SP cs.CR

    Differentially Private Communication of Measurement Anomalies in the Smart Grid

    Authors: Nikhil Ravi, Anna Scaglione, Sean Peisert, Parth Pradhan

    Abstract: In this paper, we present a framework based on differential privacy (DP) for querying electric power measurements to detect system anomalies or bad data. Our DP approach conceals consumption and system matrix data, while simultaneously enabling an untrusted third party to test hypotheses of anomalies, such as the presence of bad data, by releasing a randomized sufficient statistic for hypothesis-t… ▽ More

    Submitted 22 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: 13 pages, 5 figures

  2. arXiv:2306.05578  [pdf, other

    eess.SP cs.CR

    Differential Privacy for Class-based Data: A Practical Gaussian Mechanism

    Authors: Raksha Ramakrishna, Anna Scaglione, Tong Wu, Nikhil Ravi, Sean Peisert

    Abstract: In this paper, we present a notion of differential privacy (DP) for data that comes from different classes. Here, the class-membership is private information that needs to be protected. The proposed method is an output perturbation mechanism that adds noise to the release of query response such that the analyst is unable to infer the underlying class-label. The proposed DP method is capable of not… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: Under review in IEEE Transactions on Information Forensics & Security

  3. arXiv:2112.08487  [pdf, other

    cs.CR

    Differential Privacy in Aggregated Mobility Networks: Balancing Privacy and Utility

    Authors: Ammar Haydari, Chen-Nee Chuah, Michael Zhang, Jane Macfarlane, Sean Peisert

    Abstract: Location data is collected from users continuously to understand their mobility patterns. Releasing the user trajectories may compromise user privacy. Therefore, the general practice is to release aggregated location datasets. However, private information may still be inferred from an aggregated version of location trajectories. Differential privacy (DP) protects the query output against inference… ▽ More

    Submitted 14 January, 2024; v1 submitted 10 December, 2021; originally announced December 2021.

    Comments: 12 pages, 10 figures

  4. arXiv:2111.13786  [pdf, other

    cs.LG cs.AI

    Learning from learning machines: a new generation of AI technology to meet the needs of science

    Authors: Luca Pion-Tonachini, Kristofer Bouchard, Hector Garcia Martin, Sean Peisert, W. Bradley Holtz, Anil Aswani, Dipankar Dwivedi, Haruko Wainwright, Ghanshyam Pilania, Benjamin Nachman, Babetta L. Marrone, Nicola Falco, Prabhat, Daniel Arnold, Alejandro Wolf-Yadlin, Sarah Powers, Sharlee Climer, Quinn Jackson, Ty Carlson, Michael Sohn, Petrus Zwart, Neeraj Kumar, Amy Justice, Claire Tomlin, Daniel Jacobson , et al. (11 additional authors not shown)

    Abstract: We outline emerging opportunities and challenges to enhance the utility of AI for scientific discovery. The distinct goals of AI for industry versus the goals of AI for science create tension between identifying patterns in data versus discovering patterns in the world from data. If we address the fundamental challenges associated with "bridging the gap" between domain-driven scientific models and… ▽ More

    Submitted 26 November, 2021; originally announced November 2021.

  5. arXiv:2111.11661  [pdf, other

    cs.CR cs.DS eess.SY

    Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets

    Authors: Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon

    Abstract: The Differential Privacy (DP) literature often centers on meeting privacy constraints by introducing noise to the query, typically using a pre-specified parametric distribution model with one or two degrees of freedom. However, this emphasis tends to neglect the crucial considerations of response accuracy and utility, especially in the context of categorical or discrete numerical database queries,… ▽ More

    Submitted 8 April, 2024; v1 submitted 23 November, 2021; originally announced November 2021.

    Comments: Accepted for publication in the journal Cybersecurity (https://cybersecurity.springeropen.com/)

  6. arXiv:2111.07850  [pdf, other

    cs.CR eess.SP

    Colored Noise Mechanism for Differentially Private Clustering

    Authors: Nikhil Ravi, Anna Scaglione, Sean Peisert

    Abstract: The goal of this paper is to propose and analyze a differentially private randomized mechanism for the $K$-means query. The goal is to ensure that the information received about the cluster-centroids is differentially private. The method consists in adding Gaussian noise with an optimum covariance. The main result of the paper is the analytical solution for the optimum covariance as a function of… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

    Comments: 5 pages, 3 figures, preprint

  7. arXiv:2010.13216  [pdf, other

    cs.DC cs.AR cs.CR

    Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

    Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert

    Abstract: Scientific computing sometimes involves computation on sensitive data. Depending on the data and the execution environment, the HPC (high-performance computing) user or data provider may require confidentiality and/or integrity guarantees. To study the applicability of hardware-based trusted execution environments (TEEs) to enable secure scientific computing, we deeply analyze the performance impa… ▽ More

    Submitted 25 October, 2020; originally announced October 2020.

  8. arXiv:2005.03135  [pdf, other

    cs.CR cs.LG cs.PF

    Catch Me If You Can: Using Power Analysis to Identify HPC Activity

    Authors: Bogdan Copos, Sean Peisert

    Abstract: Monitoring users on large computing platforms such as high performance computing (HPC) and cloud computing systems is non-trivial. Utilities such as process viewers provide limited insight into what users are running, due to granularity limitation, and other sources of data, such as system call tracing, can impose significant operational overhead. However, despite technical and procedural measures… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

    ACM Class: D.4.6; K.6.5

  9. Trusted CI Experiences in Cybersecurity and Service to Open Science

    Authors: Andrew Adams, Kay Avila, Jim Basney, Dana Brunson, Robert Cowles, Jeannette Dopheide, Terry Fleury, Elisa Heymann, Florence Hudson, Craig Jackson, Ryan Kiser, Mark Krenz, Jim Marsteller, Barton P. Miller, Sean Peisert, Scott Russell, Susan Sons, Von Welch, John Zage

    Abstract: This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence. Trusted CI is an effort to address cybersecurity for the open science community through a single organization that provides leadership, training, consulting, and knowledge to that community. The articl… ▽ More

    Submitted 7 August, 2019; v1 submitted 10 April, 2019; originally announced April 2019.

    Comments: 8 pages, PEARC '19: Practice and Experience in Advanced Research Computing, July 28-August 1, 2019, Chicago, IL, USA