Acs, Gergely
104  results:
Search for persons X
?
2

Client-specific Property Inference against Secure Aggregati..:

, In: Proceedings of the 22nd Workshop on Privacy in the Electronic Society,
 
?
3

In Search of Lost Utility: Private Location Data:

Lestyán, Szilvia ; Ács, Gergely ; Biczók, Gergely
Proceedings on Privacy Enhancing Technologies.  2022 (2022)  3 - p. 354-372 , 2022
 
?
5

Privacy-preserving and bandwidth-efficient federated learni..:

, In: Proceedings of the Conference on Health, Inference, and Learning,
 
?
6

Compression Boosts Differentially Private Federated Learnin:

, In: 2021 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
7

Differentially Private Mixture of Generative Neural Network:

Acs, Gergely ; Melis, Luca ; Castelluccia, Claude.
IEEE Transactions on Knowledge and Data Engineering.  31 (2019)  6 - p. 1109-1121 , 2019
 
?
8

Privacy-Aware Caching in Information-Centric Networking:

Acs, Gergely ; Conti, Mauro ; Gasti, Paolo...
IEEE Transactions on Dependable and Secure Computing.  16 (2019)  2 - p. 313-328 , 2019
 
?
9

Near-Optimal Fingerprinting with Constraints:

Gulyás, Gábor György ; Acs, Gergely ; Castelluccia, Claude
Proceedings on Privacy Enhancing Technologies.  2016 (2016)  4 - p. 470-487 , 2016
 
?
10

On the Unicity of Smartphone Applications:

, In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society,
 
?
11

A case study : privacy preserving release of spatio-temp..:

, In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining,
Acs, Gergely ; Castelluccia, Claude - p. 1679-1688 , 2014
 
?
13

Differentially private sequential data publication via vari..:

, In: Proceedings of the 2012 ACM conference on Computer and communications security,
Chen, Rui ; Acs, Gergely ; Castelluccia, Claude - p. 638-649 , 2012
 
?
14

Protecting against physical resource monitoring:

, In: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society,
 
?
15

Modelling adversaries and security objectives for routing p..:

, In: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks,
 
1-15