DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses
|
|
RPM: Robust Anonymity at Scale
|
|
iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications
|
|
RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks
|
|
Evaluating practical QUIC website fingerprinting defenses for the masses
|
|
Data-Explainable Website Fingerprinting with Network Simulation
|
|
On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models
|
|
Differentially Private Simple Genetic Algorithms
|
|
Towards Sentence Level Inference Attack Against Pre-trained Language Models
|
|
Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom
|
|
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning
|
|
Private Collection Matching Protocols
|
|
Secure and Accurate Summation of Many Floating-Point Numbers
|
|
VESPo: Verified Evaluation of Secret Polynomials, with application to dynamic proofs of retrievability
|
|
Strengthening Privacy-Preserving Record Linkage using Diffusion
|
|
SoK: Membership Inference is Harder Than we Previously Thought
|
|
Exploring the Privacy Risks of Adversarial VR Game Design
|
|
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures
|
|
Attribute-based Single Sign-On. Secure, Private, and Efficient
|
|
Understanding Person Identification Through Gait
|
|
Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees
|
|
Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR
|
|
GDPRxiv: Establishing the State of the Art in GDPR Enforcement
|
|
Lox: Protecting the Social Graph in Bridge Distribution
|
|
Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance
|
|
Designing a Location Trace Anonymization Contest
|
|
Robust Fingerprint of Privacy-Preserving Location Trajectories
|
|
Privacy-Aware Adversarial Network in Human Mobility Prediction
|
|
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok
|
|
On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents
|
|
Private Sampling with Identifiable Cheaters
|
|
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC
|
|
Ruffle: Rapid 3-Party Shuffle Protocols
|
|
Verifiable Distributed Aggregation Functions
|
|
Story Beyond the Eye: Glyph Positions Break PDF Text Redaction
|
|
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks
|
|
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System
|
|
StyleID: Identity Disentanglement for Anonymizing Faces
|
|
Two-Cloud Private Read Alignment to a Public Reference Genome
|
|
Compact and Divisible E-Cash with Threshold Issuance
|
|
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data
|
|
Private Graph Extraction via Feature Explanations
|
|
Usability and Enforceability of Global Privacy Control
|
|
Blocking JavaScript without Breaking the Web: An Empirical Investigation
|
|
On the Robustness of Topics API to a Re-Identification Attack
|
|
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME
|
|
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries
|
|
Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions
|
|
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval
|
|
DPrio: Efficient Differential Privacy with High Utility for Prio
|
|
A Unified Framework for Quantifying Privacy Risk in Synthetic Data
|
|
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
|
|
"Revoked just now!"Users' Behaviors Toward Fitness-Data Sharing with Third-Party Applications
|
|