- document
-
Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Datade Jong, J. (author), Kamphorst, B. (author), Kroes, S. (author)We present a differentially private extension of the block coordinate descent algorithm by means of objective perturbation. The algorithm iteratively performs linear regression in a federated setting on vertically partitioned data. In addition to a privacy guarantee, we derive a utility guarantee; a tolerance parameter indicates how much the...article 2022
- document
-
Rooij S.B. van, (author), Bouma, H. (author), van Mil, J.D. (author), ten Hove, R.J.M. (author)The increasing complexity of security challenges requires Law Enforcement Agencies (LEAs) to have improved analysis capabilities, e.g., with the use of Artificial Intelligence (AI). However, it is challenging to make large enough high-quality training and testing datasets available to the community that is developing AI tools to support LEAs in...conference paper 2022
- document
-
Spini, G. (author), Mancini, E. (author), Attema, T. (author), Abspoel, M. (author), de Gier, J. (author), Fehr, S. (author), Veugen, T. (author), van Heesch, M. (author), Worm, D. (author), de Luca, A. (author), Cramer, R. (author), Sloot, P.M.A. (author)BackgroundHIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments based on clinical trials and expert knowledge. The usability of some CDSSs for HIV treatment would be significantly improved by using the...article 2022
- document
- de Boer, M.H.T. (author), Vethman, S. (author), Bakker, R.M. (author), Adhikari, A. (author), Marcus, M.J.H. (author), de Greeff, J. (author), van der Waa1, J. (author), Schoonderwoerd, T.A.J. (author), Tolios, I. (author), van Zoelen, E.M. (author), Hillerström, F.H.J. (author), Kamphorst, B.J. (author) conference paper 2022
- document
- Kamphorst, B. (author), Rooijakkers, T. (author), Veugen, T. (author), Cellamare, M. (author), Knoors, D. (author) article 2022
- document
-
van Rooij, M. (author), van Rooij, S.B. (author), Bouma, H. (author), Pimentel, A. (author)Federated Learning allows multiple parties to train a model collaboratively while keeping data locally. Two main concerns when using Federated Learning are communication costs and privacy. A technique proposed to significantly reduce communication costs and increase privacy is Partial Weight Sharing (PWS). However, this method is insecure due to...conference paper 2022
- document
-
le Feber, M. (author), Jadoenathmisier, T. (author), Goede, H. (author), Kuijpers, E. (author), Pronk, A. (author)Will sensor-based exposure assessment be the future in workplace settings? Static instruments with embedded sensors are already applied to monitor levels of dangerous substances-in the context of acute health effects-at critical locations. However, with wearable, lightweight, miniaturized (low-cost) sensors developing quickly, much more is...article 2021
- document
-
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...conference paper 2021
- document
-
van Egmond, M.B. (author), Spini, G. (author), van der Galien, O. (author), IJpma, A. (author), Veugen, P.J.M. (author), Kaaij, W. (author), Sangers, A. (author), Rooijakkers, T. (author), Langenkamp, P. (author), Kamphorst, B. (author), van de L'Isle, N. (author), Kooij-Janic, M. (author)Background: Recent developments in machine learning have shown its potential impact for clinical use such as risk prediction, prognosis, and treatment selection. However, relevant data are often scattered across diferent stakehold ers and their use is regulated, e.g. by GDPR or HIPAA. As a concrete use-case, hospital Erasmus MC and health...article 2021
- document
-
van Haaften, W. (author), Sangers, A. (author), Engers, T. (author), Djafari, s. (author)Analysing combined data sets can result in signifi cant added value for many organisations, but the GDPR has put strict constraints on processing personal data. Anonymization by using Multi-Party Computation (MPC) however may off er organizations some relief of the perceived burden of GDPR under specifi c conditions. In this paper, we will...conference paper 2020
- document
-
Bachlechner, D. (author), van Leishout, M.J. (author), Timan, T. (author)Privacy has long been perceived as a hindrance to innovation. It has been considered to raise costs for data governance without providing real benefits. However, the attitude of various stakeholders towards the relationship between privacy and innovation has started to change. Privacy is increasingly embraced as an enabler of innovation, given...bookPart 2020
- document
-
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...conference paper 2020
- document
- van der Sanden, B. (author), Vasenev, A. (author) conference paper 2020
- document
-
Kraaij, W. (author), Verberne, S. (author), Koldijk, S. (author), de Korte, E. (author), van Dantzig, S. (author), Sappelli, M. (author), Shoaib, M. (author), Bosems, S. (author), Achterkamp, R. (author), Bonomi, A. (author), Schavemaker, J. (author), Hulsebosch, B. (author), Wabeke, T. (author), Vollenbroek-Hutten, M. (author), Neerincx, M. (author), Sinderen, M. (author)Recent advances in wearable sensor technology and smartphones enable simple and affordable collection of personal analytics. This paper reflects on the lessons learned in the SWELL project that addressed the design of user-centered ICT applications for self-management of vitality in the domain of knowledge workers. These workers often have a...article 2020
- document
-
Lefeber, M. (author)Sensoren genereren data en met digitale data kun je veel automatiseren. De mogelijkheden van data based kunstmatige intelligentie lijken oneindig. Maar kunnen sensoren oak bijdragen aan een gezonde en veilige werkplek? En hoe zit het met de ethiek en de privacy? Vakmedianetarticle 2020
- document
-
Riva, G.M. (author), Vasenev, A. (author), Zannone, N. (author)The processing of personal data is becoming a key business factor, especially for high-tech system industries such as automotive and healthcare service providers. To protect such data, the European Union (EU) has introduced the General Data Protection Regulation (GDPR), with the aim to standardize and strengthen data protection policies across...conference paper 2020
- document
-
Liu, L.C. (author), Sileno, G. (author), van Engers, T. (author)The combination of smart contracts with blockchain technology enables the authentication of the contract and limits the risks of non-compliance. In principle, smart contracts can be processed more efficiently compared to traditional paper-based contracts. However, current smart contracts have very limited capabilities with respect to normative...conference paper 2020
- document
- van Binsbergen, L.T. (author), Liu, L.C. (author), van Doesburg, R. (author), van Engers, T. (author) conference paper 2020
- document
-
mohajeri Parizi, M. (author), Sileno, G. (author), van Engers, T. (author)Computational agents based upon the belief-desire-intention (BDI) architecture generally use reactive rules to trigger the execution of plans. For various reasons, certain plans might be preferred over others at design time. Most BDI agents platforms use hard-coding these preferences in some form of the static ordering of the reactive rules, but...conference paper 2019
- document
-
Honig, J.J. (author), Everts, M.H. (author), Huisman, M. (author)Solidity smart contracts operate in a hostile environment, which introduces the need for the adequate application of testing techniques to ensure mitigation of the risk of a security incident. Mutation testing is one such technique. It allows for the evaluation of the efficiency of a test suite in detecting faults in a program, allowing...conference paper 2019