no code implementations • 8 Dec 2023 • Florine W. Dekker, Zekeriya Erkin, Mauro Conti
Specifically, we show that reconstruction requires a number of adversaries linear in the length of the network's shortest cycle.
1 code implementation • 24 May 2023 • Daniël Vos, Jelle Vos, Tianyu Li, Zekeriya Erkin, Sicco Verwer
By leveraging the better privacy-utility trade-off of PrivaTree we are able to train decision trees with significantly better robustness against backdoor attacks compared to regular decision trees and with meaningful theoretical guarantees.
no code implementations • 25 Mar 2018 • Daniël Vos, Leon Overweel, Wouter Raateland, Jelle Vos, Matthijs Bijman, Max Pigmans, Zekeriya Erkin
In our system, economic operators make claims to the network about goods they insert into or remove from containers, and encrypt these claims so that they can only be read by the destination country's customs agency.
Cryptography and Security