Rafael Dowsley

ORCID: 0000-0002-7588-2410
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Complexity and Algorithms in Graphs
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Wireless Communication Security Techniques
  • Coding theory and cryptography
  • Internet Traffic Analysis and Secure E-voting
  • Chaos-based Image/Signal Encryption
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions
  • Security in Wireless Sensor Networks
  • Stochastic Gradient Optimization Techniques
  • Advanced Steganography and Watermarking Techniques
  • Adversarial Robustness in Machine Learning
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Hate Speech and Cyberbullying Detection
  • EEG and Brain-Computer Interfaces
  • Quantum Computing Algorithms and Architecture
  • graph theory and CDMA systems
  • Spam and Phishing Detection
  • semigroups and automata theory
  • Security and Verification in Computing
  • Data Management and Algorithms
  • Smart Grid Security and Resilience

Monash University
2020-2024

IT University of Copenhagen
2023

University of Washington Tacoma
2020-2023

Tokyo Institute of Technology
2023

University of Arizona
2022

Ghent University
2022

Bar-Ilan University
2018-2020

Ghent University Hospital
2020

Aarhus University
2015-2019

University of Washington
2019

Many data-driven personalized services require that private data of users is scored against a trained machine learning model. In this paper we propose novel protocol for privacy-preserving classification decision trees, popular model in these scenarios. Our solutions composed out building blocks, namely secure comparison protocol, obliviously selecting inputs, and multiplication. By combining some the blocks our tree also improve previously proposed support vector machines logistic...

10.1109/tdsc.2017.2679189 article EN IEEE Transactions on Dependable and Secure Computing 2017-03-07

According to the security breach level index, millions of records are stolen worldwide on every single day. Personal health most targeted internet, and they considered sensitive, valuable. Security privacy important parameters cryptography encryption. They reduce availability data patients healthcare appropriate personnel ultimately lead a barrier in transfer into digital system. Using permission blockchain share can issues. literature, systems rely centralized system, which is more prone...

10.3390/electronics10162034 article EN Electronics 2021-08-23

This work proposes a protocol for performing linear regression over dataset that is distributed multiple parties. The parties will jointly compute model without actually sharing their own private datasets. We provide security definitions, protocol, and proofs. Our solution information-theoretically secure based on the assumption Trusted Initializer pre-distributes random, correlated data to during setup phase. actual computation happens later on, an online phase, does not involve trusted...

10.1145/2808769.2808774 article EN 2015-10-06

Abstract Background In biomedical applications, valuable data is often split between owners who cannot openly share the because of privacy regulations and concerns. Training machine learning models on joint without violating a major technology challenge that can be addressed by combining techniques from cryptography. When collaboratively training with cryptographic technique named secure multi-party computation, price paid for keeping private an increase in computational cost runtime. A...

10.1186/s12920-020-00869-9 article EN cc-by BMC Medical Genomics 2021-01-20

Clients of storage-as-a-service systems such as Amazon's S3 want to be sure that the files they have entrusted cloud are available now and will in future.

10.1145/2046660.2046677 article EN 2011-10-21

Machine learning (ML) is revolutionizing research and industry. Many ML applications rely on the use of large amounts personal data for training inference. Among most intimate exploited sources electroencephalogram (EEG) data, a kind that so rich with information application developers can easily gain knowledge beyond professed scope from unprotected EEG signals, including passwords, ATM PINs, other data. The challenge we address how to engage in meaningful while protecting privacy users....

10.1109/tnsre.2019.2926965 article EN IEEE Transactions on Neural Systems and Rehabilitation Engineering 2019-07-07

We propose a privacy-preserving Naive Bayes classifier and apply it to the problem of private text classification. In this setting, party (Alice) holds message, while another (Bob) classifier. At end protocol, Alice will only learn result applied her input Bob learns nothing. Our solution is based on Secure Multiparty Computation (SMC). Rust implementation provides fast secure for classification unstructured text. Applying our case spam detection (the generic, can be used in any other...

10.1109/tifs.2022.3144007 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

Cryptocurrencies are widely used, yet current methods for analyzing transactions heavily rely on opaque, black-box models. These lack interpretability and adaptability, failing to effectively capture behavioral patterns. Many researchers, including us, believe that Large Language Models (LLMs) could bridge this gap due their robust reasoning abilities complex tasks. In paper, we test hypothesis by applying LLMs real-world cryptocurrency transaction graphs, specifically within the Bitcoin...

10.48550/arxiv.2501.18158 preprint EN arXiv (Cornell University) 2025-01-30

Machine Learning (ML) techniques now impact a wide variety of domains. Highly regulated industries such as healthcare and finance have stringent compliance data governance policies around sharing. Advances in secure multiparty computation (SMC) for privacy-preserving machine learning (PPML) can help transform these by allowing ML computations over encrypted with personally identifiable information (PII). Yet very little SMC-based PPML has been put into practice so far. In this paper we...

10.1109/bigdata.2018.8622627 article EN 2021 IEEE International Conference on Big Data (Big Data) 2018-12-01

The McEliece public-key encryption scheme has become an interesting alternative to cryptosystems based on number-theoretical problems. Different from RSA and ElGamal, PKC is not known be broken by a quantum computer. Moreover, even though relatively big key size, decryption operations are rather efficient. In spite of all the recent results in coding-theory-based cryptosystems, date, there no constructions secure against chosen ciphertext attacks standard model-the de facto security notion...

10.1109/tit.2012.2203582 article EN IEEE Transactions on Information Theory 2012-06-07

Existing work on privacy-preserving machine learning with Secure Multiparty Computation (MPC) is almost exclusively focused model training and inference trained models, thereby overlooking the important data pre-processing stage. In this work, we propose first MPC based protocol for private feature selection filter method, which independent of training, can be used in combination any to rank features. We an efficient scoring Gini impurity end. To demonstrate feasibility our approach...

10.48550/arxiv.2102.03517 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Abstract Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving training of decision trees over distributed data assume that the features are categorical. In real-life applications, often numerical. The standard “in clear” algorithm to grow on with continuous values requires sorting examples each feature in quest an optimal cut-point range node. Sorting is expensive operation MPC, hence finding secure avoid such step a relevant problem machine learning. this...

10.2478/popets-2022-0042 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2022-03-03
Coming Soon ...