Publications by authors named "Domingo Ferrer"

Federated Learning (FL) allows multiple data owners to build high-quality deep learning models collaboratively, by sharing only model updates and keeping data on their premises. Even though FL offers privacy-by-design, it is vulnerable to membership inference attacks (MIA), where an adversary tries to determine whether a sample was included in the training data. Existing defenses against MIA cannot offer meaningful privacy protection without significantly hampering the model's utility and causing a non-negligible training overhead.

View Article and Find Full Text PDF
Article Synopsis
  • Federated learning (FL) allows peers to collaboratively develop machine learning models while keeping their data private, but this autonomy can lead to malicious activities like label-flipping (LF) attacks, which are targeted attempts to disrupt model training by altering data labels.
  • The LF attack is difficult to detect and has detrimental effects on the model's performance, and existing defensive methods have limitations based on data distribution or struggle with complex models.
  • The paper introduces LFighter, a new defense mechanism that identifies and mitigates LF attacks by analyzing parameter gradients from local updates, demonstrating superior effectiveness in accuracy and stability compared to current defenses, supported by empirical results across various datasets.
View Article and Find Full Text PDF
Article Synopsis
  • Federated learning (FL) is a decentralized machine learning approach that enhances privacy by allowing clients to train models on their own data without sharing it, but it faces risks such as malicious clients submitting harmful updates (poisoning).
  • Poisoning detection methods can inadvertently discriminate against minority groups by misclassifying their legitimate data as malicious, which can lead to unfair models that fail to represent diverse knowledge in the training data.
  • This research aims to balance the need for poisoning detection with the inclusion of diverse client data, demonstrating that their proposed method results in more accurate models compared to existing techniques, particularly in scenarios where data is not uniform across clients.
View Article and Find Full Text PDF

In federated learning (FL), a set of participants share updates computed on their local data with an aggregator server that combines updates into a global model. However, reconciling accuracy with privacy and security is a challenge to FL. On the one hand, good updates sent by honest participants may reveal their private local information, whereas poisoned updates sent by malicious participants may compromise the model's availability and/or integrity.

View Article and Find Full Text PDF

The rapid dynamics of COVID-19 calls for quick and effective tracking of virus transmission chains and early detection of outbreaks, especially in the "phase 2" of the pandemic, when lockdown and other restriction measures are progressively withdrawn, in order to avoid or minimize contagion resurgence. For this purpose, contact-tracing apps are being proposed for large scale adoption by many countries. A centralized approach, where data sensed by the app are all sent to a nation-wide server, raises concerns about citizens' privacy and needlessly strong digital surveillance, thus alerting us to the need to minimize personal data collection and avoiding location tracking.

View Article and Find Full Text PDF

Motivation: Detailed patient data are crucial for medical research. Yet, these healthcare data can only be released for secondary use if they have undergone anonymization.

Results: We present and describe µ-ANT, a practical and easily configurable anonymization tool for (healthcare) data.

View Article and Find Full Text PDF
Article Synopsis
  • - Recent technological advances, especially in information and communications technologies (ICTs), have transformed society by making these tools accessible to a diverse population, leading to new information-based assets.
  • - This accessibility, however, has introduced challenges such as cyber threats from activists, criminals, and state actors, underscoring the importance of cybersecurity, which aims to protect these information assets.
  • - The text examines the relationship between values like security, privacy, fairness, and autonomy in cybersecurity, proposing a value graph to explore how to balance these values effectively while minimizing conflicts.
View Article and Find Full Text PDF

Objective: Few recent studies have researched into the size and trends of the impact of tobacco use on productivity losses. The objective of this work was to describe the percentage of episodes and non work-related sick leave days with a duration over 5 days due to tobacco use in Catalonia in the period 2007-2016 in relation to the total sick-leave episodes and sick leave days in patients aged 35-64.

Methods: Descriptive study of 3,627,107 episodes and 237,219,230 days in sick-leave by any cause, except those work-related, in workers aged 35-64.

View Article and Find Full Text PDF

Before releasing databases which contain sensitive information about individuals, data publishers must apply Statistical Disclosure Limitation (SDL) methods to them, in order to avoid disclosure of sensitive information on any identifiable data subject. SDL methods often consist of masking or synthesizing the original data records in such a way as to minimize the risk of disclosure of the sensitive information while providing data users with accurate information about the population of interest. In this paper we propose a new scheme for disclosure limitation, based on the idea of of data.

View Article and Find Full Text PDF

De Montjoye et al. (Reports, 30 January 2015, p. 536) claimed that most individuals can be reidentified from a deidentified transaction database and that anonymization mechanisms are not effective against reidentification.

View Article and Find Full Text PDF

Cloud computing is emerging as the next-generation IT architecture. However, cloud computing also raises security and privacy concerns since the users have no physical control over the outsourced data. This paper focuses on fairly retrieving encrypted private medical records outsourced to remote untrusted cloud servers in the case of medical accidents and disputes.

View Article and Find Full Text PDF

Hydrotreatment catalytic operations are commonly performed industrially by layered molybdenum sulfide promoted by cobalt or nickel in order to remove heteroelements (S, N, O) from fossil fuels and biofuels. Indeed, these heteroelements are responsible of the emission of pollutants when these fuels are used in vehicles. In this respect, previous studies made by our research group have shown that the active phase under steady state conditions is partially carbided while strong bending effects of MoS2 slabs were also observed.

View Article and Find Full Text PDF

Atomically smooth hexagonal boron nitride (h-BN) layers have very useful properties and thus potential applications for protective coatings, deep ultraviolet (DUV) emitters, and as a dielectric for nanoelectronics devices. In this paper, we report on the growth of h-BN by a low-pressure chemical vapor deposition (LPCVD) process using diborane and ammonia as the gas precursors. The use of LPCVD allows synthesis of h-BN with a controlled number of layers defined by the growth conditions, temperature, time, and gas partial pressure.

View Article and Find Full Text PDF

We demonstrate the synthesis of large-area graphene on Co, a complementary metal-oxide-semiconductor (CMOS)-compatible metal, using acetylene (C(2)H(2)) as a precursor in a chemical vapor deposition (CVD)-based method. Cobalt films were deposited on SiO(2)/Si, and the influence of Co film thickness on monolayer graphene growth was studied, based on the solubility of C in Co. The surface area coverage of monolayer graphene was observed to increase with decreasing Co film thickness.

View Article and Find Full Text PDF

The grafting of polybutylene oxide onto purified and functionalized carbon nanofibers is reported. Grafting was possible after the insertion of 2-(formyloxy)ethyl 2-bromo-2-methylpropanoate onto the carbon nanofibers. The polymerization of tetrahydrofuran was mediated by copper(I) bromide and 1,1,4,7-pentamethyl diethylenetriamine.

View Article and Find Full Text PDF

Silver nanocrystals (Ag NCs) hold promising antibiotic and antiviral properties in biological systems. The biodistribution of silver nanostructures injected into animals in vivo is currently unknown, remaining as a fundamental issue for potential therapeutic applications. Here, we injected Ag NCs capped with bovine serum albumin (BSA) in live rats to elucidate their fate in several organs including liver, heart and brain.

View Article and Find Full Text PDF

The challenges in forming stable drug suspensions in hydrofluoroalkane (HFA) propellants have limited drug dosages and efficiency of drug delivery with pressurized metered dose inhalers (pMDI). Herein, stable suspensions of weakly flocculated particles, in the shape of thin plates or needles, of a poorly water-soluble drug, itraconazole (Itz), are efficiently delivered by pMDI at high doses, up to 2.4 mg/actuation.

View Article and Find Full Text PDF

Wireless Sensor Networks (WSN) are formed by nodes with limited computational and power resources. WSNs are finding an increasing number of applications, both civilian and military, most of which require security for the sensed data being collected by the base station from remote sensor nodes. In addition, when many sensor nodes transmit to the base station, the implosion problem arises.

View Article and Find Full Text PDF

Silver nanoparticles were synthesized using the inert gas aggregation technique. We found the optimal experimental conditions to synthesize nanoparticles at different sizes: 1.3 ± 0.

View Article and Find Full Text PDF