zkLedger: privacy-preserving auditing for distributed ledgers Narula et al., NSDI'18 Somewhat similarly to Solidus that we looked at late last year, zkLedger (presumably this stands for zero-knowledge Ledger) provides transaction privacy for participants in a permissioned blockchain setting. zkLedger also has an extra trick up its sleeve: it provides rich and fully privacy-preserving auditing capabilities. … Continue reading zkLedger: privacy-preserving auditing for distributed ledgers
Month: May 2018
Towards a design philosophy for interoperable blockchain systems
Towards a design philosophy for interoperable blockchain systems Hardjono et al., arXiv 2018 Once upon a time there were networks and inter-networking, which let carefully managed groups of computers talk to each other. Then with a capital "I" came the Internet, with design principles that ultimately enabled devices all over the world to interoperate. Like … Continue reading Towards a design philosophy for interoperable blockchain systems
Measuring the tendency of CNNs to learn surface statistical regularities
Measuring the tendency of CNNs to learn surface statistical regularities Jo et al., arXiv'17 With thanks to Cris Conde for bringing this paper to my attention. We’ve looked at quite a few adversarial attacks on deep learning systems in previous editions of The Morning Paper. I find them fascinating for what they reveal about the … Continue reading Measuring the tendency of CNNs to learn surface statistical regularities
Large-scale analysis of style injection by relative path overwrite
Large-scale analysis of style injection by relative path overwrite Arshad et al., WWW'18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page). We’ve all been fairly well trained to have good … Continue reading Large-scale analysis of style injection by relative path overwrite
Unsupervised anomaly detection via variational auto-encoder for seasonal KPIs in web applications
Unsupervised anomaly detection via variational auto-encoder for seasonal KPIs in web applications Xu et al., WWW'18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page). Today’s paper examines the problem of … Continue reading Unsupervised anomaly detection via variational auto-encoder for seasonal KPIs in web applications
Algorithmic glass ceiling in social networks: the effects of social recommendations on network diversity
Algorithmic glass ceiling in social networks: the effects of social recommendations on network diversity Stoica et al., WWW'18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page). Social networks were meant … Continue reading Algorithmic glass ceiling in social networks: the effects of social recommendations on network diversity
Pixie: a system for recommending 3+ billion items to 200+ million users in real-time
Pixie: a system for recommending 3+ billion items to 200+ million users in real-time Eksombatchai et al., WWW'18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page). Pinterest is a visual … Continue reading Pixie: a system for recommending 3+ billion items to 200+ million users in real-time
SafeKeeper: protecting web passwords using trusted execution environments
SafeKeeper: protecting web passwords using trusted execution environments Krawiecka et al., WWW'18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page). Today’s paper is all about password management for password protected … Continue reading SafeKeeper: protecting web passwords using trusted execution environments
Semantics and complexity of GraphQL
Semantics and complexity of GraphQL Hartig & Pérez, WWW'18 (If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page). GraphQL has been gathering good momentum since Facebook open sourced it in 2015, … Continue reading Semantics and complexity of GraphQL
Re-coding Black Mirror, Part V
This is the final part of our tour through the papers from the Re-coding Black Mirror workshop exploring future technology scenarios and their social and ethical implications. Towards trust-based decentralized ad-hoc social networks Koidl MMM: May I mine your mind? Sempreboni and Viganò (If you don’t have ACM Digital Library access, all of the papers … Continue reading Re-coding Black Mirror, Part V