On the Semantics of Differential Privacy and Its Responsible Use

Differential Privacy (DP) is one of the most widely adopted formal model of privacy protection but its semantics, especially in the presence of correlated data and in the adversarial interactive setting, is still not broadly understood among data science practitioners. In this paper, we first look at how DP originated from research on database-reconstruction attacks … More On the Semantics of Differential Privacy and Its Responsible Use

Secure and Ephemeral AI Workloads in Data Mesh Environments

A colleague and I have just released on arXiv a paper titled “Enabling Secure and Ephemeral AI Workloads in Data Mesh Environments”. The key innovation is in pushing the now well-established idea of minimal immutable data structures up and down the software infrastructure stack a bit further than what others have done, resulting in a … More Secure and Ephemeral AI Workloads in Data Mesh Environments

Approximating Solomonoff Induction

As is well-known by now, the universal AI agent AIXI is made up of two key components: Solomonoff Induction for universal sequential prediction, and expectimax search for planning. There are several proposed and reasonably effective approximations of the Solomonoff Induction component using the factored, binarised Context Tree Weighting algorithm [WST95, VNHUS09] and its generalisation to … More Approximating Solomonoff Induction

Natural Exponential Functions in Inequalities

Have you ever wondered why the natural exponential function shows up so frequently in mathematical inequalities? Here’s a graph of the natural exponential function. The constant e has a special place in mathematics, which is beautifully chronicled in Eli Maor’s book [M94]. The definition of e that is most useful and intuitive for our purpose … More Natural Exponential Functions in Inequalities

Dealing with Linkage Attacks using Differential Privacy

A key claim of differential privacy in [DR14] is that it provides “automatic neutralization of linkage attacks, including all those attempted with all past, present, and future datasets and other forms and sources of auxiliary information”. This is an important and often repeated claim — see e.g. [N17, Section E] and [PR23] — but the … More Dealing with Linkage Attacks using Differential Privacy

Privacy Technologies for Financial Intelligence

It took a little while to write, but hopefully the following survey paper by Yang Li, Thilina Ranbaduge and yours truly can help demystify financial intelligence and privacy technologies for practitioners and technologists alike. The focus is on anti-money laundering and counter-terrorism financing, but the opportunity set is much broader. https://arxiv.org/abs/2408.09935 Here’s the abstract of … More Privacy Technologies for Financial Intelligence

How To Deal with Database Reconstruction Attacks

I have been thinking about data security issues, in particular database-reconstruction attacks. To quote Wikipedia, a reconstruction attack is any method for partially reconstructing a private database from public aggregate information. The question I am specifically interested in is this: Can an attacker with general interactive query access to a dataset recover a piece of … More How To Deal with Database Reconstruction Attacks

Influence Flower

Regular users of arXiv.org may have noticed that on every paper’s page, under the Related Papers tab, one can now find the paper’s Influence Flower, which is a nice way to visualise citation influences among academic entities, including papers, authors, institutions, and research topics. The following, for example, are the author-centric and venue-centric influence flowers … More Influence Flower

Dynamic Knowledge Injection for AIXI Agents

My phd student just got a new paper accepted at the upcoming AAAI Conference on Artificial Intelligence. Here’s the abstract of the paper: Prior approximations of AIXI, a Bayesian optimality notion for general reinforcement learning, can only approximate AIXI’s Bayesian environment model using an a-priori defined set of models. This is a fundamental source of … More Dynamic Knowledge Injection for AIXI Agents

FinTracer and Friends

About 5 years ago, Tania Churchill and I assembled a team of researchers and engineers across AUSTRAC and ANU to work on privacy technologies for detecting criminal activities across the financial system, funded by the Fintel Alliance Expansion budget measure, the Investigative Analytics NPP (led by CSIRO’s Data61), and an ANU Translational Fellowship. The overall … More FinTracer and Friends