Items where Subject is "Research Fields > Privacy SFB"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | C | D | E | F | G | H | L | M | N | O | S
Number of items at this level: 42.

B

Backes, Michael and Berrang, Pascal and Bieg, Matthias and Elis, Roland and Herrmann, Carl and Humbert, Mathias and Lehmann, Irina
(2017) Identifying Personal DNA Methylation Profiles by Genotype Inference.
In: Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Berrang, Pascal and Goga, Oana and Gummadi, Krishna P. and Manoharan, Praveen
(2016) On Profile Linkability despite Anonymity in Social Media Systems.
In: Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES).
Conference: None | Not Set

Backes, Michael and Berrang, Pascal and Hecksteden, Anne and Humbert, Mathias and Keller, Andreas and Meyer, Tim
(2016) Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Manoharan, Praveen
(2016) Membership Privacy in MicroRNA-based Studies.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Berrang, Pascal and Humbert, Mathias and Shen, Xiaoyu and Wolf, Verena
(2016) Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
In: Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16).
Conference: None | Not Set

Backes, Michael and Gomez-Rodriguez, Manuel and Manoharan, Praveen and Surma, Bartlomiej
(2017) Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
In: Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF '17).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
Proceedings of the 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC 2019).
(In Press)

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS - European Symposium On Research In Computer Security

Biega, Asia J. and Ghazimatin, Azin and Ferhatosmanoglu, Hakan and Gummadi, Krishna P. and Weikum, Gerhard
(2017) Learning to Un-Rank: Quantifying Search Exposure for Users in Online Communities.
In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, CIKM 2017, Singapore, November 06 - 10, 2017.
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Biega, Joanna Asia and Roy, Rishiraj Saha and Weikum, Gerhard
(2017) Privacy through Solidarity: A User-Utility-Preserving Framework to Counter Profiling.
In: Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, Shinjuku, Tokyo, Japan, August 7-11, 2017.
Conference: SIGIR - ACM International Conference on Research and Development in Information Retrieval

Brakerski, Zvika and Brzuska, Christina and Fleischhacker, Nils
(2016) On Statistically Secure Obfuscation with Approximate Correctness.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2015) Affine Refinement Types for Secure Distributed Programming.
ACM Transactions on Programming Languages and Systems, 37 (4). 11:1-11:66.

C

Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015) Type-Based Verification of Electronic Voting Protocols.
In: Proceedings of the 4th International Conference on Principles of Security and Trust (POST).
Conference: None | Not Set

D

Dax, Alexander and Tangermann, Sven and Künnemann, Robert and Backes, Michael
(2019) How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11.
In: Computer Security Foundations Symposium, Hobuken, NJ.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016) Two Message Oblivious Evaluation of Cryptographic Functionalities.
In: Proceedings of the 36th International Cryptology Conference (CRYPTO '16).
Conference: CRYPTO - Advances in Cryptology

E

Eslami, Sedigheh and Biega, Asia J. and Roy, Rishiraj Saha and Weikum, Gerhard
(2017) Privacy of Hidden Profiles: Utility-Preserving Profile Removal in Online Forums.
In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, CIKM 2017, Singapore, November 06 - 10, 2017.
Conference: CIKM - ACM International Conference on Information and Knowledge Management

F

Faymonville, Peter and Finkbeiner, Bernd and Schirmer, Sebastian and Torfah, Hazem
(2016) A Stream-Based Specification Language for Network Monitoring.
In: Proceedings of the 16th International Conference on Runtime Verification (RV'2016).
Conference: None | Not Set

Finkbeiner, Bernd and Hahn, Christopher
(2016) Deciding Hyperproperties.
In: 27th International Conference on Concurrency Theory, CONCUR 2016, August 23-26, 2016, Québec City, Canada.
Conference: CONCUR - International Conference on Concurrency Theory

Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin
(2017) EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties.
In: Computer Aided Verification - 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part II.
Conference: CAV - Computer Aided Verification

Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2017) Monitoring Hyperproperties.
In: Runtime Verification - 17th International Conference, RV 2017, Seattle, WA, USA, September 13-16, 2017, Proceedings.
Conference: CAV - Computer Aided Verification

G

Grishchenko, Ilya and Maffei, Matteo and Calzavara, Stefano
(2016) HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving.
In: Proceedings of the 1st IEEE European Symposium on Security and Privacy (Euro S&P '16).
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

H

He, Yang and Chiu, Wei-Chen and Keuper, Margret and Fritz, Mario
(2017) STD2P: RGBD Semantic Segmentation Using Spatio-Temporal Data-Driven Pooling.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

L

Li, Wenbin and Fritz, Mario
(2016) Recognition of Ongoing Complex Activities by Sequence Prediction over a Hierarchical Label Space.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV - IEEE Workshop on Applications of Computer Vision

M

Ma, Liqian and Sun, Qianru and Georgoulis, Stamatios and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Disentangled Person Image Generation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Maffei, Matteo
(2016) Security & Privacy Column.
SIGLOG News.

Maffei, Matteo and Grimm, Niklas and Focardi, Riccardo and Calzavara, Stefano
(2016) Micro-Policies for Web Session Security.
In: Proceedings of the 29th Computer Security Foundations Symposium 2016 (CSF '16).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo
(2017) SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
In: Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17).
Conference: NDSS - Network and Distributed System Security Symposium

Marnau, Ninja and Berrang, Pascal and Humbert, Mathias
(2018) Anonymisierungsverfahren für genetische Daten.
Datenschutz und Datensicherheit (DuD), 2/2018. pp. 83-88.

N

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019) Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
In: Proceedings of the IEEE Symposium on Security & Privacy, May 2019, May 2019, San Francisco, CA, USA.
Conference: S&P - IEEE Symposium on Security and Privacy

O

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2017) Whitening Black-Box Neural Networks.
Technical Report. arXiv.

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2016) Faceless Person Recognition: Privacy Implications in Social Media.
In: Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III.
Conference: ECCV - European Conference on Computer Vision

Oh, Seong Joon and Benenson, Rodrigo and Khoreva, Anna and Akata, Zeynep and Fritz, Mario and Schiele, Bernt
(2017) Exploiting saliency for object segmentation from image level labels.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Oh, Seong Joon and Fritz, Mario and Schiele, Bernt
(2017) Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective.
Technical Report. UNSPECIFIED.

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2017) Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images.
Technical Report. UNSPECIFIED.

S

Sattar, Hosnieh and Bulling, Andreas and Fritz, Mario
(2017) Predicting the Category and Attributes of Visual Search Targets Using Deep Gaze Pooling.
In: Mutual Benefits of Cognitive and Computer Vision Workshop at International Conference on Computer Vision (ICCV-W).
Conference: None | Not Set

Schneider, Jonas and Fleischhacker, Nils and Schröder, Dominique and Backes, Michael
(2016) Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS - ACM Conference on Computer and Communications Security

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2018) Adversarial Scene Editing: Automatic Object Removal from Weak Supervision.
In: Conference on Neural Information Processing Systems.
Conference: NIPS - Advances in Neural Information Processing Systems

Shetty, Rakshith and Rohrbach, Marcus and Hendricks, Lisa Anne and Fritz, Mario and Schiele, Bernt
(2017) Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training.
Technical Report. UNSPECIFIED.

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2017) A4NT : Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.
Technical Report. arXiv.

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2018) Natural and Effective Obfuscation by Head Inpainting.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Sun, Qianru and Ma, Liqian and Oh, Seong Joon and Gool, Luc Van and Schiele, Bernt and Fritz, Mario
(2017) Natural and Effective Obfuscation by Head Inpainting.
Technical Report. arXiv.

Sun, Qianru and Schiele, Bernt and Fritz, Mario
(2017) A Domain Based Approach to Social Relation Recognition.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

This list was generated on Tue Jul 23 00:02:22 2019 CEST.