Search for persons
X
?
Proceedings of the Conference on Health, Inference, and Learning ,
1
Privacy-preserving and bandwidth-efficient federated learni..:
, In:
?
2021 IEEE European Symposium on Security and Privacy (EuroS&P) ,
2
Compression Boosts Differentially Private Federated Learnin:
, In:
?
Privacy Technologies and Policy; Lecture Notes in Computer Science ,
3
Position Paper: Analyzing the Impacts of Facial Recognition:
, In:
?
Proceedings of the 2018 Workshop on Privacy in the Electronic Society ,
4
To Extend or not to Extend : On the Uniqueness of Browse..:
, In:
?
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society ,
5
On the Unicity of Smartphone Applications:
, In:
?
Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining ,
6
A case study : privacy preserving release of spatio-temp..:
, In:
?
Proceedings of the 2012 ACM conference on Computer and communications security ,
7
Differentially private sequential data publication via vari..:
, In:
?
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society ,
8
Protecting against physical resource monitoring:
, In:
?
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement ,
9
Geolocalization of proxied services and its application to ..:
, In:
?
Proceedings of the 16th ACM conference on Computer and communications security ,
10
Proximity-based access control for implantable medical devi..:
, In:
?
Proceedings of the first ACM workshop on Secure execution of untrusted code ,
11
Defending embedded systems against control flow attacks:
, In:
?
2009 3rd International Conference on New Technologies, Mobility and Security ,
12
An Adaptive Quantization Algorithm for Secret Key Generatio..:
, In:
?
Proceedings of the 16th ACM conference on Computer and communications security ,
13
On the difficulty of software-based attestation of embedded..:
, In:
?
Proceedings of the 15th ACM conference on Computer and communications security ,
14
Code injection attacks on harvard-architecture devices:
, In:
?
2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007 ,
15