Published on September 21, 2022–Updated on October 24, 2022
Dates
on the October 7, 2022
from 10:30am to 12:00pm
Location
Nice - Campus Valrose, Laboratoire J-A Dieudonné
Program
10:30 - 11:00
Rémi Felin (UCA, I3S)
Chair of Andrea Tettamanzi
Optimizing the Computation of a Possibilistic Heuristic to Test OWL 2 SubClassOf Axioms Against RDF Data
The growth of the Semantic Web requires various tools to manage data, make them available to all and use them for a wide range of applications. In particular, tools dedicated to ontology management are a keystone for semantic Web applications. We consider a possibilistic framework and an evolutionary approach for ontology enrichment with OWL 2 axioms. The assessment of OWL 2 axioms against an RDF knowledge graph requires a high computational cost, especially in terms of computation time, which may limit the applicability of the framework. Our contribution consists in (i) a multi-threading system to parallelize axiom assessment, (ii) a heuristic to avoid redundant computation and (iii) an optimization relying on an extension of the SPARQL 1.1 Federated Query standard. The results of a comparative evaluation show that our proposal significantly outperforms the original algorithm, enabling a significant reduction in computation time (CPU).
11:00 - 11:30
Huiyu Li (Inria, Epione)
Chair of Hervé Delingette
Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?
In privacy-preserving machine learning, it is common that the owner of the learned model does not have any physical access to the data. Instead, only a secured remote access to a data lake is granted to the model owner without any ability to retrieve the data from the data lake. Yet, the model owner may want to export the trained model periodically from the remote repository and a question arises whether this may cause is a risk of data leakage. In this paper, we introduce the concept of data stealing attack during the export of neural networks. It consists in hiding some information in the exported network that allows the reconstruction outside the data lake of images initially stored in that data lake. More precisely, we show that it is possible to train a network that can perform lossy image compression and at the same time solve some utility tasks such as image segmentation. The attack then proceeds by exporting the compression decoder network together with some image codes that leads to the image reconstruction outside the data lake. We explore the feasibility of such attacks on databases of CT and MR images, showing that it is possible to obtain perceptually meaningful reconstructions of the target dataset, and that the stolen dataset can be used in turns to solve a broad range of tasks. Comprehensive experiments and analyses show that data stealing attacks should be considered as a threat for sensitive imaging data sources.
When browsing Université Côte d'Azur website and Université Côte d'Azur components websites by profile ("I am" menu), informations may be saved in a "Cookie" file installed by Université Côte d'Azur on your computer, tablet or mobile phone. This Cookie file contains informations, such as a unique identifier, the name of the portal, and the chosen profile. This Cookie file is read by its transmitter. During its 12-month validity period, it allows to recognize your terminal and to propose the chosen profile as your default home page.
You have accepted the deposit of profile information cookies in your navigator.
You have declined the deposit of profile information cookies in your navigator.
"Do Not Track" is enabled in your browser. No profiles information will be collected.
Cookies de mesure d 'audiences
This website uses Google Analytics. By clicking on "I accept" or by navigatin on it, you authorize us to deposit a cookie for audience measurements purposes.
You have accepted the deposit of audience measurement cookies in your navigator.
You have declined the deposit of audience measurement cookies in your navigator.
"Do Not Track" is enabled in your browser. No navigation statistics will be collected.