Castelluccia, Claude
22  results:
Search for persons X
?
1

Privacy-preserving and bandwidth-efficient federated learni..:

, In: Proceedings of the Conference on Health, Inference, and Learning,
 
?
2

Compression Boosts Differentially Private Federated Learnin:

, In: 2021 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
3

Position Paper: Analyzing the Impacts of Facial Recognition:

, In: Privacy Technologies and Policy; Lecture Notes in Computer Science,
 
?
4

To Extend or not to Extend : On the Uniqueness of Browse..:

, In: Proceedings of the 2018 Workshop on Privacy in the Electronic Society,
 
?
5

On the Unicity of Smartphone Applications:

, In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society,
 
?
6

A case study : privacy preserving release of spatio-temp..:

, In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining,
Acs, Gergely ; Castelluccia, Claude - p. 1679-1688 , 2014
 
?
7

Differentially private sequential data publication via vari..:

, In: Proceedings of the 2012 ACM conference on Computer and communications security,
Chen, Rui ; Acs, Gergely ; Castelluccia, Claude - p. 638-649 , 2012
 
?
8

Protecting against physical resource monitoring:

, In: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society,
 
?
9

Geolocalization of proxied services and its application to ..:

, In: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement,
 
?
10

Proximity-based access control for implantable medical devi..:

, In: Proceedings of the 16th ACM conference on Computer and communications security,
 
?
11

Defending embedded systems against control flow attacks:

, In: Proceedings of the first ACM workshop on Secure execution of untrusted code,
 
?
12

An Adaptive Quantization Algorithm for Secret Key Generatio..:

, In: 2009 3rd International Conference on New Technologies, Mobility and Security,
 
?
13

On the difficulty of software-based attestation of embedded..:

, In: Proceedings of the 16th ACM conference on Computer and communications security,
 
?
14

Code injection attacks on harvard-architecture devices:

, In: Proceedings of the 15th ACM conference on Computer and communications security,
 
?
15

RoK: A robust key pre-distribution protocol for multi-phase..:

, In: 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007,
 
1-15