kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (10 of 14) Show all publications
Bahri, L., Carminati, B. & Ferrari, E. (2025). Privacy-Aware Access Control in Decentralized Online Social Networks. In: Encyclopedia of Cryptography, Security and Privacy, Third Edition: (pp. 1924-1927). Springer Nature
Open this publication in new window or tab >>Privacy-Aware Access Control in Decentralized Online Social Networks
2025 (English)In: Encyclopedia of Cryptography, Security and Privacy, Third Edition, Springer Nature , 2025, p. 1924-1927Chapter in book (Other academic)
Place, publisher, year, edition, pages
Springer Nature, 2025
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-362681 (URN)10.1007/978-3-030-71522-9_1599 (DOI)2-s2.0-105002549167 (Scopus ID)
Note

 Part of ISBN 9783030715229, 9783030715205

QC 20250425

Available from: 2025-04-23 Created: 2025-04-23 Last updated: 2025-04-25Bibliographically approved
Carminati, B. & Bahri, L. (2023). Cyber Pandemics. IEEE Internet Computing, 27(2), 5-6
Open this publication in new window or tab >>Cyber Pandemics
2023 (English)In: IEEE Internet Computing, ISSN 1089-7801, E-ISSN 1941-0131, IEEE Internet Computing, ISSN 1089-7801, Vol. 27, no 2, p. 5-6Article, review/survey (Refereed) Published
Abstract [en]

The focus of this special issue is on studying the consequences of pandemics and cyber pandemics on privacy and trust both in the digital and the real worlds. In the aftermath of the recent COVID-19 pandemic that has shaken several aspects of our lives for almost two years of time, preliminary research indicates that the technological capabilities and the data that have been deployed and exploited to contain the spread of the disease may have affected people's privacy, sense of security, as well as their trust in their governing institutions. The enclosed articles explore both the effectiveness and the impacts of some of the deployed technologies in the handling of the COVID-19 pandemic on people's privacy as well as on their security and related risks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-332971 (URN)10.1109/MIC.2023.3237239 (DOI)001061302900001 ()2-s2.0-85151323242 (Scopus ID)
Note

QC 20230724

Available from: 2023-07-24 Created: 2023-07-24 Last updated: 2023-10-09Bibliographically approved
Pozzoli, S., Soliman, A., Bahri, L., Branca, R. M., Girdzijauskas, S. & Brambilla, M. (2020). Domain expertise–agnostic feature selection for the analysis of breast cancer data. Artificial Intelligence in Medicine, 108, Article ID 101928.
Open this publication in new window or tab >>Domain expertise–agnostic feature selection for the analysis of breast cancer data
Show others...
2020 (English)In: Artificial Intelligence in Medicine, ISSN 0933-3657, E-ISSN 1873-2860, Vol. 108, article id 101928Article in journal (Refereed) Published
Abstract [en]

Progress in proteomics has enabled biologists to accurately measure the amount of protein in a tumor. This work is based on a breast cancer data set, result of the proteomics analysis of a cohort of tumors carried out at Karolinska Institutet. While evidence suggests that an anomaly in the protein content is related to the cancerous nature of tumors, the proteins that could be markers of cancer types and subtypes and the underlying interactions are not completely known. This work sheds light on the potential of the application of unsupervised learning in the analysis of the aforementioned data sets, namely in the detection of distinctive proteins for the identification of the cancer subtypes, in the absence of domain expertise. In the analyzed data set, the number of samples, or tumors, is significantly lower than the number of features, or proteins; consequently, the input data can be thought of as high-dimensional data. The use of high-dimensional data has already become widespread, and a great deal of effort has been put into high-dimensional data analysis by means of feature selection, but it is still largely based on prior specialist knowledge, which in this case is not complete. There is a growing need for unsupervised feature selection, which raises the issue of how to generate promising subsets of features among all the possible combinations, as well as how to evaluate the quality of these subsets in the absence of specialist knowledge. We hereby propose a new wrapper method for the generation and evaluation of subsets of features via spectral clustering and modularity, respectively. We conduct experiments to test the effectiveness of the new method in the analysis of the breast cancer data, in a domain expertise–agnostic context. Furthermore, we show that we can successfully augment our method by incorporating an external source of data on known protein complexes. Our approach reveals a large number of subsets of features that are better at clustering the samples than the state-of-the-art classification in terms of modularity and shows a potential to be useful for future proteomics research.

Place, publisher, year, edition, pages
Elsevier BV, 2020
Keywords
Breast cancer, Clustering, Clustering performance evaluation, Dimensionality reduction, Feature selection, Proteomics, Unsupervised learning
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kth:diva-282662 (URN)10.1016/j.artmed.2020.101928 (DOI)000574951400008 ()32972658 (PubMedID)2-s2.0-85088878526 (Scopus ID)
Note

QC 20201102

Available from: 2020-09-30 Created: 2020-09-30 Last updated: 2024-03-18Bibliographically approved
Bahri, L. & Girdzijauskas, S. (2019). Blockchain technology: Practical P2P computing (Tutorial). In: Proceedings - 2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems, FAS*W 2019: . Paper presented at June 2019, Article number 8791982, Pages 249-2504th IEEE International Workshops on Foundations and Applications of Self* Systems, FAS*W 2019; Umea; Sweden; 16 June 2019 through 20 June 2019 (pp. 249-250). Institute of Electrical and Electronics Engineers (IEEE), Article ID 8791982.
Open this publication in new window or tab >>Blockchain technology: Practical P2P computing (Tutorial)
2019 (English)In: Proceedings - 2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems, FAS*W 2019, Institute of Electrical and Electronics Engineers (IEEE), 2019, p. 249-250, article id 8791982Conference paper, Published paper (Refereed)
Abstract [en]

Blockchain technology comes with the promise to revolutionize the way current IT systems are organized as well as to revise how trust is perceived in the wider society. In spite of the wide attention that cyrpto-currencies (such as Bitcoin) have attracted, Blockchain technology is more likely to make an impact beyond ongoing speculations on cyrpto-currencies. Decentralized identity management, transparent supply-chain systems, and IoT governance and security are only few examples of research challenges for which this technology may hold substantial potential. Blockchain technology has emerged at the intersection of two well established research areas: peer-to-peer (P2P) computing and cryptography. In this tutorial, we provide a general overview of the main components behind this technology, we present the difference between the types of Blockchain available today, and we make a high level discussion on its potentials and limitations as well as possible research challenges.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2019
Keywords
Blockchain, Consensus in Blockchain, DLT, PoW
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kth:diva-262644 (URN)10.1109/FAS-W.2019.00066 (DOI)000518905900052 ()2-s2.0-85071419745 (Scopus ID)
Conference
June 2019, Article number 8791982, Pages 249-2504th IEEE International Workshops on Foundations and Applications of Self* Systems, FAS*W 2019; Umea; Sweden; 16 June 2019 through 20 June 2019
Note

QC 20191017

Part of ISBN 9781728124063

Available from: 2019-10-17 Created: 2019-10-17 Last updated: 2024-10-15Bibliographically approved
Bahri, L. & Girdzijauskas, S. (2019). Trust mends blockchains: Living up to expectations. In: Proceedings - International Conference on Distributed Computing Systems: . Paper presented at 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, July 7-10, 2019 (pp. 1358-1368).
Open this publication in new window or tab >>Trust mends blockchains: Living up to expectations
2019 (English)In: Proceedings - International Conference on Distributed Computing Systems, 2019, p. 1358-1368Conference paper, Published paper (Refereed)
Abstract [en]

At the heart of Blockchains is the trustless leader election mechanism for achieving consensus among pseudo-anonymous peers, without the need of oversight from any third party or authority whatsoever. So far, two main mechanisms are being discussed: proof-of-work (PoW) and proof-of-stake (PoS). PoW relies on demonstration of computational power, and comes with the markup of huge energy wastage in return of the stake in cyrpto-currency. PoS tries to address this by relying on owned stake (i.e., amount of crypto-currency) in the system. In both cases, Blockchains are limited to systems with financial basis. This forces non-crypto-currency Blockchain applications to resort to "permissioned" setting only, effectively centralizing the system. However, non-crypto-currency permisionless blockhains could enable secure and self-governed peer-to-peer structures for numerous emerging application domains, such as education and health, where some trust exists among peers. This creates a new possibility for valuing trust among peers and capitalizing it as the basis (stake) for reaching consensus. In this paper we show that there is a viable way for permisionless non-financial Blockhains to operate in completely decentralized environments and achieve leader election through proof-of-trust (PoT). In our PoT construction, peer trust is extracted from a trust network that emerges in a decentralized manner and is used as a waiver for the effort to be spent for PoW, thus dramatically reducing total energy expenditure of the system. Furthermore, our PoT construction is resilient to the risk of small cartels monopolizing the network (as it happens with the mining-pool phenomena in PoW) and is not vulnerable to sybils. We evluate security guarantees, and perform experimental evaluation of our construction, demonstrating up to 10-fold energy savings compared to PoW without trading off any of the decentralization characteristics, with further guarantees against risks of monopolization.

National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-268251 (URN)10.1109/ICDCS.2019.00136 (DOI)000565234200127 ()2-s2.0-85074832724 (Scopus ID)
Conference
39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, July 7-10, 2019
Note

QC 20200331

Available from: 2020-03-31 Created: 2020-03-31 Last updated: 2022-06-26Bibliographically approved
Bahri, L. & Girdzijauskas, S. (2019). Trust Mends Blockchains: Living up to Expectations. In: IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, July 7-10 2019: . Paper presented at IEEE 39th International Conference on Distributed Computing Systems - ICDCS 2019.
Open this publication in new window or tab >>Trust Mends Blockchains: Living up to Expectations
2019 (English)In: IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, July 7-10 2019, 2019Conference paper, Published paper (Refereed)
Abstract [en]

At the heart of Blockchains is the trustless leader election mechanism for achieving consensus among pseudoanonymous peers, without the need of oversight from any third party or authority whatsoever. So far, two main mechanisms are being discussed: proof-of-work (PoW) and proof-of-stake (PoS). PoW relies on demonstration of computational power, and comes with the markup of huge energy wastage in return of the stake in cyrpto-currency. PoS tries to address this by relying on owned stake (i.e., amount of crypto-currency) in the system. In both cases, Blockchains are limited to systems with financial basis. This forces non-crypto-currency Blockchain applications to resort to “permissioned” setting only, effectively centralizing the system. However, non-crypto-currency permisionless blockhains could enable secure and self-governed peer-to-peer structures for numerous emerging application domains, such as education and health, where some trust exists among peers. This creates a new possibility for valuing trust among peers and capitalizing it as the basis (stake) for reaching consensus. In this paper we show that there is a viable way for permisionless non-financial Blockhains to operate in completely decentralized environments and achieve leader election through proof-of-trust (PoT). In our PoT construction, peer trust is extracted from a trust network that emerges in a decentralized manner and is used as a waiver for the effort to be spent for PoW, thus dramatically reducing total energy expenditure of the system. Furthermore, our PoT construction is resilient to the risk of small cartels monopolizing the network (as it happens with the mining-pool phenomena in PoW) and is not vulnerable to sybils. We evluate security guarantees, and perform experimental evaluation of our construction, demonstrating up to 10-fold energy savings compared to PoW without trading off any of the decentralization characteristics, with further guarantees against risks of monopolization.

Keywords
Proof-of-Trust Blockchain, Blockchain, PoW, PoT
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-251639 (URN)
Conference
IEEE 39th International Conference on Distributed Computing Systems - ICDCS 2019
Note

QC 20190521

Available from: 2019-05-16 Created: 2019-05-16 Last updated: 2022-06-26Bibliographically approved
Tran, N. H., Phung, C. V., Nguyen, B. Q. & Bahri, L. (2018). An effective privacy-preserving data coding in peer-to-peer network. International Journal of Computer Networks & Communications, 10(3), 55-74
Open this publication in new window or tab >>An effective privacy-preserving data coding in peer-to-peer network
2018 (English)In: International Journal of Computer Networks & Communications, ISSN 0975-2293, E-ISSN 0974-9322, Vol. 10, no 3, p. 55-74Article in journal (Refereed) Published
Abstract [en]

Coding Opportunistically (COPE) is a simple but very effective data coding mechanism in the wireless network. However, COPE leaves risks for attackers easily getting the private information saved in the packets, when they move through the network to their destination nodes. Hence, a lightweight cryptographic approach, namely SCOPE, was proposed to consolidate COPE against the honest-but-curious and malicious attacks. Honest-but-curious attack serves adversaries who accurately obey the protocol but try to learn as much private information as possible for their curiosity. Additionally, this kind of attack is not destructive consequently. However, it may leave the backdoor for the more dangerous attacks carrying catastrophes to the system. Malicious attack tries to learn not only the private information but also modifies the packet on harmful purposes. To cope with this issue, in this work, a lightweight cryptographic approach improves COPE, namely SCOPE, that is defensive to the both attacks. The private information in the COPE packet are encrypted by Elliptic Curve Cryptography (ECC), and an additional information is inserted into SCOPE packets served for the authentication process using the lightweight hash Elliptic Curve Digital Signature Algorithm (ECDSA). We then prove our new protocol is still guaranteed to be a secure method of data coding, and to be light to effectively operate in the peer-to-peer wireless network.

Place, publisher, year, edition, pages
Academy and Industry Research Collaboration Center (AIRCC), 2018
Keywords
Elliptic Curve Cryptography (ECC), Elliptic Curve Digital Signature Algorithm (ECDSA), Homomorphic encryption, Honest-But-Curious Attack, Malicious attac, Network coding, Peer-to-Peer
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-247404 (URN)10.5121/IJCNC.2018.10305 (DOI)2-s2.0-85062328652 (Scopus ID)
Note

QC20190502

Available from: 2019-05-03 Created: 2019-05-03 Last updated: 2023-12-21Bibliographically approved
Kefato, Z. T., Sheikh, N., Bahri, L., Soliman, A., Montresor, A. & Girdzijauskas, S. (2018). CAS2VEC: Network-Agnostic Cascade Prediction in Online Social Networks. In: : . Paper presented at 2018 FIFTH INTERNATIONAL CONFERENCE ON SOCIAL NETWORKS ANALYSIS, MANAGEMENT AND SECURITY (SNAMS) (pp. 72-79). IEEE
Open this publication in new window or tab >>CAS2VEC: Network-Agnostic Cascade Prediction in Online Social Networks
Show others...
2018 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Effectively predicting whether a given post or tweet is going to become viral in online social networks is of paramount importance for several applications, such as trend and break-out forecasting. While several attempts towards this end exist, most of the current approaches rely on features extracted from the underlying network structure over which the content spreads. Recent studies have shown, however, that prediction can be effectively performed with very little structural information about the network, or even with no structural information at all. In this study we propose a novel network-agnostic approach called CAS2VEC, that models information cascades as time series and discretizes them using time slices. For the actual prediction task we have adopted a technique from the natural language processing community. The particular choice of the technique is mainly inspired by an empirical observation on the strong similarity between the distribution of discretized values occurrence in cascades and words occurrence in natural language documents. Thus, thanks to such a technique for sentence classification using convolutional neural networks, CAS2VEC can predict whether a cascade is going to become viral or not. We have performed extensive experiments on two widely used real-world datasets for cascade prediction, that demonstrate the effectiveness of our algorithm against strong baselines.

Place, publisher, year, edition, pages
IEEE, 2018
National Category
Software Engineering
Identifiers
urn:nbn:se:kth:diva-252430 (URN)10.1109/SNAMS.2018.8554730 (DOI)000466979100012 ()2-s2.0-85060045802 (Scopus ID)
Conference
2018 FIFTH INTERNATIONAL CONFERENCE ON SOCIAL NETWORKS ANALYSIS, MANAGEMENT AND SECURITY (SNAMS)
Note

QC 20190715

Available from: 2019-07-15 Created: 2019-07-15 Last updated: 2022-06-26Bibliographically approved
Kefato, Z., Sheikh, N., Bahri, L., Soliman, A., Girdzijauskas, S. & Montresor, A. (2018). CaTS: Network-Agnostic Virality Prediction Model to Aid Rumour Detection. In: : . Paper presented at International Workshop on Rumours and Deception in Social Media (RDSM 2018).
Open this publication in new window or tab >>CaTS: Network-Agnostic Virality Prediction Model to Aid Rumour Detection
Show others...
2018 (English)Conference paper, Published paper (Refereed)
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-239543 (URN)
Conference
International Workshop on Rumours and Deception in Social Media (RDSM 2018)
Note

QC 20181130

Available from: 2018-11-26 Created: 2018-11-26 Last updated: 2022-06-26Bibliographically approved
Bahri, L., Carminati, B. & Ferrari, E. (2018). Decentralized privacy preserving services for Online Social Networks. Online Social Networks and Media, 6, 18-25
Open this publication in new window or tab >>Decentralized privacy preserving services for Online Social Networks
2018 (English)In: Online Social Networks and Media, ISSN 2468-6964, Vol. 6, p. 18-25Article in journal (Refereed) Published
Abstract [en]

Current popular and widely adopted Online Social Networks (OSNs) all follow a logically centered architecture, by which one single entity owns unprecedented collections of personal data in terms of amount, variety, geographical span, and richness in detail. This is clearly constituting one of the major threats to users privacy and to their right to be-left-alone. Decentralization has then been considered as the panacea to privacy issues, especially in the realms of OSNs. However, with a more thoughtful consideration of the issue, it could be argued that decentralization, if not designed and implemented carefully and properly, can have more serious implications on users privacy rather than bringing radical solutions. Moreover, research on Decentralized Online Social Networks (DOSNs) has shown that there are more challenges to their realization that need proper attention and more innovative technical solutions. In this paper, we discuss the issues related to privacy preservation between centralization and decentralization, and we provide a review of available research work on decentralized privacy preserving services for social networks. 

Place, publisher, year, edition, pages
Elsevier BV, 2018
Keywords
Decentralized Online Social Networks, Online Social Networks, Privacy preservation, Privacy services, Privacy by design, Centralization and decentralizations, On-line social networks, Online social networks (OSNs), Privacy issue, Privacy preserving, Technical solutions, Social networking (online)
National Category
Other Legal Research Criminology Media and Communications
Identifiers
urn:nbn:se:kth:diva-314300 (URN)10.1016/j.osnem.2018.02.001 (DOI)2-s2.0-85055318907 (Scopus ID)
Note

QC 20220620

Available from: 2022-06-20 Created: 2022-06-20 Last updated: 2025-02-20Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-7520-9664

Search in DiVA

Show all publications