Mathias Lécuyer
Columbia University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mathias Lécuyer.
acm special interest group on data communication | 2013
Kanak Biscuitwala; Willem Bult; Mathias Lécuyer; T.J. Purtell; Madeline K.B. Ross; Augustin Chaintreau; Chris Haseman; Monica S. Lam; Susan E. McGregor
Kanak Biscuitwala [email protected] Willem Bult [email protected] Mathias Lecuyer† [email protected] T.J. Purtell [email protected] Madeline K.B. Ross‡ [email protected] Augustin Chaintreau† [email protected] Chris Haseman§ [email protected] Monica S. Lam [email protected] Susan E. McGregor‡ [email protected] Computer Science Department, Stanford University †Computer Science Department, Columbia University ‡Graduate School of Journalism, Columbia University §Tumblr, Inc.
ieee symposium on security and privacy | 2018
Mathias Lécuyer; Riley Spahn; Roxana Geambasu; Tzu-Kuo Huang; Siddhartha Sen
Today’s companies collect immense amounts of personal data and enable wide access to it within the company. This exposes the data to external hackers and privacy-transgressing employees. This study shows that, for a wide and important class of workloads, only a fraction of the data is needed to approach state-of-the-art accuracy. We propose selective data systems that are designed to pinpoint the data that is valuable for a company’s current and evolving workloads. These systems limit data exposure by setting aside the data that is not truly valuable.
hot topics in networks | 2017
Mathias Lécuyer; Joshua Lockerman; Lamont Nelson; Siddhartha Sen; Amit Sharma; Aleksandrs Slivkins
We view randomization through the lens of statistical machine learning: as a powerful resource for offline optimization. Cloud systems make randomized decisions all the time (e.g., in load balancing), yet this randomness is rarely used for optimization after-the-fact. By casting system decisions in the framework of reinforcement learning, we show how to collect data from existing systems, without modifying them, to evaluate new policies, without deploying them. Our methodology, called harvesting randomness, has the potential to accurately estimate a policys performance without the risk or cost of deploying it on live traffic. We quantify this optimization power and apply it to a real machine health scenario in Azure Compute. We also apply it to two prototyped scenarios, for load balancing (Nginx) and caching (Redis), with much less success, and use them to identify the systems and machine learning challenges to achieving our goal. Our long-term agenda is to harvest the randomness in distributed systems to develop non-invasive and efficient techniques for optimizing them. Like CPU cycles and bandwidth, we view randomness as a valuable resource being wasted by the cloud, and we seek to remedy this.
measurement and modeling of computer systems | 2015
Guillaume Ducoffe; Mathias Lécuyer; Augustin Chaintreau; Roxana Geambasu
Big Data promises important societal progress but exacerbates the need for due process and accountability. Companies and institutions can now discriminate between users at an individual level using collected data or past behavior. Worse, today they can do so in near perfect opacity. The nascent field of web transparency aims to develop the tools and methods necessary to reveal how information is used, however today it lacks robust tools that let users and investigators identify targeting using multiple inputs. In this paper, we formalize for the first time the problem of detecting and identifying targeting on combinations of inputs and provide the first algorithm that is asymptotically exact. This algorithm is designed to serve as a theoretical foundational block to build future scalable and robust web transparency tools. It offers three key properties. First, our algorithm is service agnostic and applies to a variety of settings under a broad set of assumptions. Second, our algorithms analysis delineates a theoretical detection limit that characterizes which forms of targeting can be distinguished from noise and which cannot. Third, our algorithm establishes fundamental tradeoffs that lead the way to new metrics for the science of web transparency.
usenix security symposium | 2014
Mathias Lécuyer; Guillaume Ducoffe; Francis Lan; Andrei Papancea; Theofilos Petsios; Riley Spahn; Augustin Chaintreau; Roxana Geambasu
computer and communications security | 2015
Mathias Lécuyer; Riley Spahn; Yannis Spiliopolous; Augustin Chaintreau; Roxana Geambasu; Daniel J. Hsu
european conference on computer systems | 2015
Nicolas Viennot; Mathias Lécuyer; Jonathan Bell; Roxana Geambasu; Jason Nieh
arXiv: Machine Learning | 2018
Mathias Lécuyer; Vaggelis Atlidakis; Roxana Geambasu; Daniel J. Hsu; Suman Jana
arXiv: Machine Learning | 2018
Mathias Lécuyer; Vaggelis Atlidakis; Roxana Geambasu; Daniel J. Hsu; Suman Jana
ieee symposium on security and privacy | 2017
Mathias Lécuyer; Riley Spahn; Roxana Geambasu; Tzu-Kuo Huang; Siddhartha Sen