Items where Year is 2021

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items: 155.

A

Abdalla, Michel and Barbosa, Manuel and Katz, Jonathan and Loss, Julian and Xu, Jiayu
(2021) Algebraic Adversaries in the Universal Composability Framework.
In: 27th Annual International Conference on the Theory and Application of Cryptology and Information Security.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Abdelnabi, Sahar and Fritz, Mario
(2021) Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding.
In: 42nd IEEE Symposium on Security and Privacy (S&P'21), May 24-28, Virtual.
Conference: SP IEEE Symposium on Security and Privacy

Abdelnabi, Sahar and Fritz, Mario
(2021) "What's in the box?!": Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models.
In: Moving Target Defense Workshop in conjuncture with CCS.
Conference: UNSPECIFIED

Alamati, Navid and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Pu, Sihang
(2021) Laconic Private Set Intersection and Applications.
In: TCC 2021: Theory of Cryptography.
Conference: TCC Theory of Cryptography Conference

Albert, Elvira and Hähnle, Reiner and Merayo, Alicia and Steinhöfel, Dominic
(2021) Certified Abstract Cost Analysis.
In: 24th International Conference on Fundamental Approaches to Software Engineering, Virtual.
Conference: FASE Fundamental Approaches to Software Engineering

Alsoliman, Anas and Rigoni, Giulio and Levorato, Marco and Pinotti, Cristina and Tippenhauer, Nils Ole and Conti, Mauro
(2021) COTS Drone Detection Using Video Streaming Characteristics.
In: International Conference on Distributed Computing and Networking.
Conference: ICDCN International Conference on Distributed Computing and Networking

B

Baelde, David and Delaune, Stephanie and Jacomme, Charlie and Koutsos, Adrien and Moreau, Solene
(2021) An Interactive Prover for Protocol Verification in the Computational Model.
In: 42nd IEEE Symposium on Security and Privacy (S&P'21), May 24-28, Virtual.
Conference: SP IEEE Symposium on Security and Privacy

Baier, Christel and Coenen, Norine and Finkbeiner, Bernd and Funke, Florian and Jantsch, Simon and Siber, Julian
(2021) Causality-Based Game Solving.
In: 33rd International Conference, CAV 2021, July 20–23, 2021, Virtual Event.
Conference: CAV Computer Aided Verification

Barbieri, Giovanni and Conti, Mauro and Tippenhauer, Nils Ole and Turrin, Federico
(2021) Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
In: 30th International Conference on Computer Communications and Networks, ICCCN 2021, Athens, Greece, July 19-22, 2021.
Conference: UNSPECIFIED

Barbosa, Manuel and Barthe, Gilles and Bhargavan, Karthik and Blanchet, Bruno and Cremers, Cas and Liao, Kevin and Parno, Brian
(2021) SoK: Computer-Aided Cryptography.
In: S&P 2021.
Conference: SP IEEE Symposium on Security and Privacy
(In Press)

Bauer, Markus and Rossow, Christian
(2021) Cali: Compiler Assisted Library Isolation.
In: AsiaCCS 2021, 7-11 Jun 2021, Hong Kong, Hong Kong.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security
(In Press)

Bauer, Markus and Rossow, Christian
(2021) NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking.
In: 6th IEEE European Symposium on Security and Privacy, September 7-11, 2021, Vienna, Austria.
Conference: EuroS&P IEEE European Symposium on Security and Privacy
(In Press)

Baumann, Christoph and Dam, Mads and Guanciale, Roberto and Nemati, Hamed
(2021) On Compositional Information Flow Aware Refinement.
In: 34th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Baumeister, Jan and Coenen, Norine and Bonakdarpour, Borzoo and Finkbeiner, Bernd and Sánchez, César
(2021) A Temporal Logic for Asynchronous Hyperproperties.
In: CAV 2021, July 20–23, 2021, Virtual Event.
Conference: CAV Computer Aided Verification

Bensmail, Julien and Fioravantes, Foivos and Mc Inerney, Fionn and Nisse, Nicolas
(2021) The Largest Connected Subgraph Game.
In: WG 2021.
Conference: WG International Workshop on Graph-Theoretic Concepts in Computer Science

Beutner, Raven and Finkbeiner, Bernd
(2021) A Temporal Logic for Strategic Hyperproperties.
In: 32nd International Conference on Concurrency Theory, CONCUR 2021.
Conference: CONCUR International Conference on Concurrency Theory

Beutner, Raven and Ong, Luke
(2021) On Probabilistic Termination of Functional Programs with Continuous Distributions.
In: 42nd International Conference on Programming Language Design and Implementation.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Bhattacharyya, Apratim and Reino, Daniel Olmeda and Fritz, Mario and Schiele, Bernt
(2021) Euro-PVI: Pedestrian Vehicle Interactions in Dense Urban Centers.
In: 34th IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Bhattacharyya, Arnab and Bonnet, Édouard and Egri, László and Ghoshal, Suprovat and C. S., Karthik and Lin, Bingkai and Manurangsi, Pasin and Marx, Dániel
(2021) Parameterized Intractability of Even Set and Shortest Vector Problem.
Journal of the ACM, 68 (3). pp. 1-40. ISSN 0004-5411

Biewer, Sebastian and Finkbeiner, Bernd and Hermanns, Holger and Köhl, Maximilian A. and Schnitzer, Yannik and Schwenger, Maximilian
(2021) RTLola on Board: Testing Real Driving Emissions on your Phone.
In: 27th International Conference on Tools and Algorithms for the Construction and Analysis of Systems 2021.
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Blum, Erica and Katz, Jonathan and Loss, Julian
(2021) Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions.
In: 27th Annual International Conference on the Theory and Application of Cryptology and Information Security.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Branco, Pedro and Döttling, Nico and Pu, Sihang
(2021) Multiparty Cardinality Testing for Threshold Private Intersection.
In: PKC 2021: Public-Key Cryptography.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

Brendel, Jacqueline and Cremers, Cas and Jackson, Dennis and Zhao, Mang
(2021) The Provable Security of Ed25519: Theory and Practice.
In: S&P 2021.
Conference: SP IEEE Symposium on Security and Privacy
(In Press)

Brengel, Michael and Rossow, Christian
(2021) YarIx: Scalable YARA-based Malware Intelligence.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Budhathoki, Kailash and Boley, Mario and Vreeken, Jilles
(2021) Discovering reliable causal rules.
In: SIAM International Conference on Data Mining.
Conference: SDM SIAM International Conference on Data Mining

Buiras, Pablo and Nemati, Hamed and Lindner, Andreas and Guanciale, Roberto
(2021) Validation of Side-Channel Models via Observation Refinement.
In: MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, Virtual Event, Greece, October 18-22, 2021.
Conference: MICRO International Symposium on Microarchitecture

Böhle, Moritz and Fritz, Mario and Schiele, Bernt
(2021) Convolutional Dynamic Alignment Networks for Interpretable Classifications.
In: 34th IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

C

Calzavara, Stefano and Urban, Tobias and Tatang, Dennis and Steffens, Marius and Stock, Ben
(2021) Reining in the Web's Inconsistencies with Site Policy.
In: Network and Distributed Systems Security (NDSS) Symposium 2021.
Conference: NDSS Network and Distributed System Security Symposium

Canella, Claudio and Werner, Mario and Gruss, Daniel and Schwarz, Michael
(2021) Automating Seccomp Filter Generation for Linux Applications.
In: CCSW.
Conference: CCSW ACM Cloud Computing Security Workshop

Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul
(2021) Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.
In: 11th International Conference on Security, Privacy and Applied Cryptographic Engineering.
Conference: SPACE International Conference on Security, Privacy and Applied Cryptographic Engineering

Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul
(2021) tHyENA: Making HyENA Even Smaller.
In: 22nd International Conference on Cryptology in India.
Conference: INDOCRYPT International Conference on Cryptology in India

Chakraborti, Avik and Datta, Nilanjan and Jha, Ashwin and Mancillas-Lopez, Cuauhtemoc and Nandi, Mridul and Sasaki, Yu
(2021) Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.
In: 22nd International Conference on Cryptology in India.
Conference: INDOCRYPT International Conference on Cryptology in India

Chakraborty, Bishwajit and Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2021) On Length Independent Security Bounds for the PMAC Family.
IACR Transactions on Symmetric Cryptology, 2021 (2). pp. 423-445.

Chardouvelis, Orestis and Döttling, Nico and Malavolta, Giulio
(2021) Rate-1 Quantum Fully Homomorphic Encryption.
In: TCC 2021: Theory of Cryptography.
Conference: TCC Theory of Cryptography Conference

Chattopadhyay, Soumya and Jha, Ashwin and Nandi, Mridul
(2021) Fine-tuning the ISO/IEC Standard Lightmac.
In: ASIACRYPT 2021.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(Submitted)

Chen, Min and Zhang, Zhikun and Wang, Tianhao and Backes, Michael and Humbert, Mathias and Zhang, Yang
(2021) When Machine Unlearning Jeopardizes Privacy.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Chen, Xiaoyi and Salem, Ahmed and Chen, Dingfan and Backes, Michael and Ma, Shiqing and Shen, Qingni and Wu, Zhonghai and Zhang, Yang
(2021) BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
In: ACSAC 2021.
Conference: ACSAC Annual Computer Security Applications Conference

Coenen, Norine and Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana and Schillo, Yannick
(2021) Runtime Enforcement of Hyperproperties.
In: ATVA 2021.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Cogliati, Benoît-Michel and Ethan, Jordan and Lallemand, Virginie and Lee, Byeonghak and Lee, Jooyoung and Minier, Marine
(2021) CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation.
IACR Transactions on Symmetric Cryptology, 2021 (4). ISSN 2519-173X

Cohen-Addad, Vincent and De Verdière, Éric Colin and Marx, Dániel and De Mesmay, Arnaud
(2021) Almost Tight Lower Bounds for Hard Cutting Problems in Embedded Graphs.
Journal of the ACM, 68 (4). pp. 1-26. ISSN 0004-5411

Cohen-Addad, Vincent and Klein, Philip N. and Marx, Dániel and Wheeler, Archer and Wolfram, Christopher
(2021) On the Computational Tractability of a Geographic Clustering Problem Arising in Redistricting.
In: 2nd Symposium on Foundations of Responsible Computing, FORC 2021, June 9-11, 2021, Virtual Conference.
Conference: UNSPECIFIED

Coupette, Corinna and Vreeken, Jilles
(2021) Graph Similarity Description: How Are These Graphs Similar?
In: KDD [ACM International Conference on Knowledge Discovery and Data Mining].
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Cremers, Cas and Düzlü, Samed and Fiedler, Rune and Fischlin, Marc and Janson, Christian
(2021) BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
In: 42nd IEEE Symposium on Security and Privacy (S&P'21).
Conference: SP IEEE Symposium on Security and Privacy
(In Press)

Cremers, Cas and Hale, Britta and Kohbrok, Konrad
(2021) The Complexities of Healing in Secure Group Messaging: Why {Cross-Group} Effects Matter.
In: 30th USENIX Security Symposium (USENIX Security 21).
Conference: USENIX-Security Usenix Security Symposium

D

Dauer, Johann C. and Finkbeiner, Bernd and Schirmer, Sebastian
(2021) Monitoring with Verified Guarantees.
In: Runtime Verification - 21st International Conference, RV 2021, Virtual Event, October 11-14, 2021, Proceedings.
Conference: RV International Conference on Runtime Verification (was workshop pre 2010)

Dawoud, Abdallah and Bugiel, Sven
(2021) Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework.
In: Network and Distributed Systems Security (NDSS) Symposium 2021, 21.02.2021, San Diego, California, USA.
Conference: NDSS Network and Distributed System Security Symposium

Dax, Alexander and Künnemann, Robert
(2021) On the Soundness of Infrastructure Adversaries.
In: 34th IEEE Computer Security Foundations Symposium, 21-25 June 2021, Virtual Conference.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Dimitrova, Rayna
(2021) Reactive Synthesis Beyond Realizability (Invited Tutorial).
UNSPECIFIED, Conference Series: Formal Methods in Computer-Aided Design
.

Distler, Verena and Fassl, Matthias and Habib, Hana and Krombholz, Katharina and Lenzini, Gabriele and Lallemand, Carine and Cranor, Lorrie Faith and Koenig, Vincent
(2021) A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Transactions on Computer-Human Interaction, 28 (6). pp. 1-50. ISSN 1073-0516

Du, Linkang and Zhang, Zhikun and Bai, Shaojie and Liu, Changchang and Ji, Shouling and Cheng, Peng and Chen, Jiming
(2021) AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy.
In: CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Dutta, Arghya and Vreeken, Jilles and Ghiringhelli, Luca M and Bereau, Tristan
(2021) Data-driven equation for drug-membrane permeability across drugs and membranes.
The Journal of Chemical Physics.

Döttling, Nico and Garg, Sanjam
(2021) Identity-based Encryption from the Diffie-Hellman Assumption.
Journal of the ACM. ISSN 0004-5411

Döttling, Nico and Hartmann, Dominik and Hofheinz, Dennis and Kiltz, Eike and Schäge, Sven and Ursu, Bogdan
(2021) On the Impossibility of Purely Algebraic Signatures.
In: TCC 2021.
Conference: TCC Theory of Cryptography Conference

Döttling, Nico and Nishimaki, Ryo
(2021) Universal Proxy Re-Encryption.
In: PKC 2021: Public-Key Cryptography.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography

E

El-Korashy, Akram and Tsampas, Stelios and Patrignani, Marco and Devriese, Dominique and Garg, Deepak and Piessens, Frank
(2021) CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle.
In: 34th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Elbitar, Yusra and Schilling, Michael and Nguyen, Trung Tin and Backes, Michael and Bugiel, Sven
(2021) Explanation Beats Context: The Effect of Timing & Rationales on Users’ Runtime Permission Decisions.
In: USENIX Security '21.
Conference: USENIX-Security Usenix Security Symposium

Eriksson, Benjamin and Pellegrino, Giancarlo and Sabelfeld, Andrei
(2021) Black Widow: Blackbox Data-driven Web Scanning.
In: IEEE Symposium on Security and Privacy, Proceedings of SSP 2021.
Conference: SP IEEE Symposium on Security and Privacy

F

Fabian, Xaver and Chan, Koby and Patrignani, Marco
(2021) Formal Verification of Spectres Combination.
In: PLAS 2021, 7 Dec 2021, Online.
Conference: PLAS Workshop on Programming Languages and Analysis for Security

Fass, Aurore and Somé, Dolière Francis and Backes, Michael and Stock, Ben
(2021) DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021) Exploring User-Centered Security Design for Usable Authentication Ceremonies.
In: CHI 2021, May 8-13, 2021, Online Virtual Conference (originally Yokohama, Japan).
Conference: CHI International Conference on Human Factors in Computing Systems

Fassl, Matthias and Gröber, Lea and Krombholz, Katharina
(2021) Stop the Consent Theater.
In: alt.chi 2021, May 8-13, 2021, Yokohama, Japan.
Conference: CHI International Conference on Human Factors in Computing Systems

Fassl, Matthias and Neumayr, Michaela and Schedler, Oliver and Krombholz, Katharina
(2021) Transferring Update Behavior from Smartphones to Smart Consumer Devices.
In: The 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, 2021-10, Virtual Workshop.
Conference: ESORICS European Symposium On Research In Computer Security
(Submitted)

Finkbeiner, Bernd
(2021) Model Checking Algorithms for Hyperproperties (Invited Paper).
In: Verification, Model Checking, and Abstract Interpretation - 22nd International Conference, VMCAI 2021, Copenhagen, Denmark, January 17-19, 2021, Proceedings.
Conference: VMCAI Verification, Model Checking and Abstract Interpretation

Finkbeiner, Bernd and Geier, Gideon and Passing, Noemi
(2021) Specification Decomposition for Reactive Synthesis.
In: 13th NASA Formal Methods Symposium, NFM 2021.
Conference: NFM NASA Formal Methods Symposium
(In Press)

Finkbeiner, Bernd and Keller, Andreas and Schmidt, Jessica and Schwenger, Maximilian
(2021) Robust Monitoring for Medical Cyber-Physical Systems.
In: 11th Workshop on Medical Cyber Physical Systems and Internet of Medical Things.
Conference: MCPS Medical Cyber Physical Systems and Internet of Medical Things Workshop

Finkbeiner, Bernd and Klein, Felix and Metzger, Niklas
(2021) Live Synthesis.
In: 19th International Symposium on Automated Technology for Verification and Analysis (ATVA 2021), 18 - 22 October 2021, Golden Coast, Australia.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Passing, Noemi
(2021) Compositional Synthesis of Modular Systems.
In: 19th International Symposium on Automated Technology for Verification and Analysis (ATVA 2021).
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis
(In Press)

Finkbeiner, Bernd and Schmitt, Frederik
(2021) Künstliche Intelligenz in der Softwareentwicklung: Über die Schulter geschaut.
iX Magazin für professionelle Informationstechnik (8). pp. 40-43. ISSN 0935-9680

Fischer, Jonas and Olah, Anna and Vreeken, Jilles
(2021) What’s in the Box? Exploring the Inner Life of Neural Networks with Robust Rules.
In: International Conference on Machine Learning.
Conference: ICML International Conference on Machine Learning

Fischer, Jonas and Vreeken, Jilles
(2021) Differentiable Pattern Set Mining.
In: KDD [ACM International Conference on Knowledge Discovery and Data Mining].
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Focke, Jacob and Goldberg, Leslie Ann and Roth, Marc and Živný, Stanislav
(2021) Counting Homomorphisms to K4-minor-free Graphs, modulo 2.
SIAM Journal on Discrete Mathematics, 35 (4). pp. 2749-2814. ISSN 0895-4801

G

Gieseking, Manuel and Hecking-Harbusch, Jesko and Yanich, Ann
(2021) A Web Interface for Petri Nets with Transits and Petri Games.
In: TACAS: Tools and Algorithms for the Construction and Analysis of Systems.
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Gopinath, Rahul and Nemati, Hamed and Zeller, Andreas
(2021) Input Algebras.
In: International Conference on Software Engineering (ICSE).
Conference: ICSE International Conference on Software Engineering

Grosse, Kathrin and Backes, Michael
(2021) Do winning tickets exist before DNN training?
In: SDM21.
Conference: SDM SIAM International Conference on Data Mining

Gröber, Lea and Fassl, Matthias and Gupta, Abhilash and Krombholz, Katharina
(2021) Investigating Car Drivers’ Information Demand after Safety and Security Critical Incidents.
In: CHI 2021.
Conference: CHI International Conference on Human Factors in Computing Systems

Gueron, Shay and Jha, Ashwin and Nandi, Mridul
(2021) Revisiting the Security of COMET Authenticated Encryption Scheme.
In: 22nd International Conference on Cryptology in India.
Conference: INDOCRYPT International Conference on Cryptology in India

H

Hahn, Christopher and Schmitt, Frederik and Kreber, Jens U. and Rabe, Markus Norman and Finkbeiner, Bernd
(2021) Teaching Temporal Logics to Neural Networks.
In: The Ninth International Conference on Learning Representations.
Conference: ICLR International Conference on Learning Representations

Hajipour, Hossein and Bhattacharyya, Apratim and Staicu, Cristian-Alexandru and Fritz, Mario
(2021) SampleFix: Learning to Generate Functionally Diverse Fixes.
In: International Workshop on Machine Learning in Software Engineering in conjuncture with ECML PKDD.
Conference: UNSPECIFIED

Hajipour, Hossein and Bhattacharyya, Apratim and Staicu, Cristian-Alexandru and Fritz, Mario
(2021) SampleFix: Learning to Generate Functionally Diverse Fixes.
In: 1st International Workshop on Machine Learning in Software Engineering, 17 Sep 2021.
Conference: UNSPECIFIED
(Submitted)

Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2021) IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
In: International Workshop on Machine Learning in Software Engineering in conjunction with ECML PKDD.
Conference: UNSPECIFIED

Hanzlik, Lucjan and Slamanig, Daniel
(2021) With a Little Help from My Friends: Constructing Practical Anonymous Credentials.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Hanzlik, Lucjan and Zhang, Yang and Grosse, Kathrin and Salem, Ahmed and Augustin, Maximilian and Backes, Michael and Fritz, Mario
(2021) MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
In: 2021 IEEE CVPR Workshop on Fair, Data Efficient and Trusted Computer Vision.
Conference: ECCV European Conference on Computer Vision

He, Xinlei and Jia, Jinyuan and Gong, Neil Zhenqiang and Backes, Michael and Zhang, Yang
(2021) Stealing Links from Graph Neural Networks.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

He, Xinlei and Zhang, Yang
(2021) Quantifying and Mitigating Privacy Risks of Contrastive Learning.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

He, Yang and Yu, Ning and Keuper, Margret and Fritz, Mario
(2021) Beyond the Spectrum: Detecting Deepfakes via Re-Synthesis.
In: 30th International Joint Conference on Artificial Intelligence (IJCAI).
Conference: IJCAI International Joint Conference on Artificial Intelligence

Horak, Tom and Coenen, Norine and Metzger, Niklas and Hahn, Christopher and Flemisch, Tamara and Méndez, Julián and Dimov, Dennis and Finkbeiner, Bernd and Dachselt, Raimund
(2021) Visual Analysis of Hyperproperties for Understanding Model Checking Results.
In: IEEE VIS 2021.
Conference: IEEE VIS IEEE Visualization

Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha
(2021) They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.
In: 42nd IEEE Symposium on Security and Privacy, IEEE S&P 2021., May 24-27, 2021.
Conference: SP IEEE Symposium on Security and Privacy

Huaman, Nicolas and von Skarczinski, Bennet and Wermke, Dominik and Stransky, Christian and Acar, Yasemin and Dreißigacker, Arne and Fahl, Sascha
(2021) A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises.
In: In 30th USENIX Security Symposium, USENIX Security '21, August 11-13, 2021, Vancouver, B.C., Canada.
Conference: USENIX-Security Usenix Security Symposium

Huang, Jie and Backes, Michael and Bugiel, Sven
(2021) A11y and Privacy don’t have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
In: 30th USENIX Security Symposium (USENIX Security 21).
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Häring, Maximilian and Gerlitz, Eva and Tiefenau, Christian and Smith, Matthew and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin
(2021) Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany.
In: Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021., August 8-10, 2021.
Conference: SOUPS Symposium On Usable Privacy and Security

J

Jaber, Nouraldin and Wagner, Christopher and Jacobs, Swen and Kulkarni, Milind and Samanta, Roopsha
(2021) QuickSilver: Modeling and Parameterized Verification for Distributed Agreement-Based Systems.
In: OOPSLA 2021.
Conference: OOPSLA ACM Conference on Object Oriented Programming Systems Languages and Applications
(In Press)

Jacobs, Swen and Sakr, Mouhammad
(2021) AIGEN: Random Generation of Symbolic Transition Systems.
In: 33rd International Conference on Computer-Aided Verification.
Conference: CAV Computer Aided Verification
(In Press)

K

Kalofolias, Janis and Welke, Pascal and Vreeken, Jilles
(2021) SUSAN: The Structural Similarity Random Walk Kernel.
In: Proceedings of the 2021 SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Katz, Jonathan and Loss, Julian and Rosenberg, Michael
(2021) Boosting the Security of Blind Signature Schemes.
In: 27th Annual International Conference on the Theory and Application of Cryptology and Information Security.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2021) Future Moment Assessment for Action Query.
In: IEEE Winter Conference on Applications of Computer Vision (WACV ’21).
Conference: WACV IEEE Workshop on Applications of Computer Vision

Khodayari, Soheil and Pellegrino, Giancarlo
(2021) JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals.
In: 30th USENIX Security Symposium (USENIX Security'21).
Conference: USENIX-Security Usenix Security Symposium

Krupp, Johannes and Rossow, Christian
(2021) BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks.
In: 6th IEEE European Symposium on Security and Privacy, September 7-11, 2021, Vienna, Austria.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Kuznetsov, Konstantin and Fu, Chen and Gao, Song and Jansen, David N. and Zhang, Lijun and Zeller, Andreas
(2021) Frontmatter: Mining Android User Interfaces at Scale.
In: ESEC/FSE 2021, August 23–28, 2021, Athens, Greece.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Künnemann, Robert and Garg, Deepak and Backes, Michael
(2021) Accountability in the Decentralised-Adversary Setting.
In: CSF 2021.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

L

Lampel, Johannes and Just, Sascha and Apel, Sven and Zeller, Andreas
(2021) When Life Gives You Oranges: Detecting and Diagnosing Intermittent Job Failures at Mozilla.
In: ESEC/FSE 2021.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Li, Zheng and Zhang, Yang
(2021) Membership Leakage in Label-Only Exposures.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Likaj, Xhelal and Khodayari, Soheil and Pellegrino, Giancarlo
(2021) Where We Stand (or Fall): An Analysis of CSRF Defenses in Web Frameworks.
In: 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID ’21).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Lipp, Moritz and Kogler, Andreas and Oswald, David and Schwarz, Michael and Easdon, Catherine and Canella, Claudio and Gruss, Daniel
(2021) PLATYPUS: Software-based Power Side-Channel Attacks on x86.
In: 2021 IEEE Symposium on Security and Privacy (SP).
Conference: SP IEEE Symposium on Security and Privacy

Liu, Yehao and Pagliardini, Matteo and Chavdarova, Tatjana and Stich, Sebastian U.
(2021) The Peril of Popular Deep Learning Uncertainty Estimation Methods.
In: Bayesian Deep Learning Workshop at NeurIPS 2021, 14.12.2021, online.
Conference: BDL Bayesian Deep Learning Workshop

Lorenz, Tobias and Ruoss, Anian and Balunović, Mislav and Singh, Gagandeep and Vechev, Martin
(2021) Robustness Certification for Point Cloud Models.
In: IEEE International Conference on Computer Vision (ICCV), 2021, Virtual.
Conference: ICCV IEEE International Conference on Computer Vision
(In Press)

Losch, Max and Fritz, Mario and Schiele, Bernt
(2021) Semantic Bottlenecks: Quantifying and Improving Inspectability of Deep Representations.
International Journal of Computer Vision (IJCV). ISSN 1573-1405

M

Marx, Alexander and Gretton, Arthur and Mooij, Joris
(2021) A Weaker Faithfulness Assumption based on Triple Interactions.
In: Uncertainty in Artificial Intelligence.
Conference: UAI Conference in Uncertainty in Artificial Intelligence

Marx, Alexander and Yang, Lincen and van Leeuwen, Matthijs
(2021) Estimating Conditional Mutual Information for Discrete-Continuous Mixtures using Multi-Dimensional Adaptive Histograms.
In: SDM.
Conference: SDM SIAM International Conference on Data Mining

Marx, Dániel
(2021) Modern Lower Bound Techniques in Database Theory and Constraint Satisfaction.
In: 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database System.
Conference: PODS ACM SIGMOD-SIGACT-SIGART Conference on Principles of Database Systems

Marx, Dániel and Sankar, Govind S. and Schepper, Philipp
(2021) Degrees and Gaps: Tight Complexity Results of General Factor Problems Parameterized by Treewidth and Cutwidth.
In: ICALP 2021.
Conference: ICALP International Colloquium on Automata Languages and Programming

Meiser, Gordon and Laperdrix, Pierre and Stock, Ben
(2021) Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication.
In: AsiaCCS 2021.
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Mian, Osman and Marx, Alexander and Vreeken, Jilles
(2021) Discovering Fully Oriented Causal Networks.
In: AAAI Conference on Artificial Intelligence.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Moog, Marvin and Demmel, Markus and Backes, Michael and Fass, Aurore
(2021) Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021).
Conference: DSN IEEE/IFIP International Conference on Dependable Systems and Networks

Morio, Kevin and Künnemann, Robert
(2021) Verifying Accountability for Unbounded Sets of Participants.
In: 2021 IEEE 34th Computer Security Foundations Symposium (CSF), Jun 21 2021 to Jun 25 2021, Online.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

N

Neuen, Daniel
(2021) Isomorphism Testing Parameterized by Genus and Beyond.
In: European Symposium on Algorithms.
Conference: ESA European Symposium on Algorithms

Nguyen, Trung Tin and Backes, Michael and Marnau, Ninja and Stock, Ben
(2021) Share First, Ask Later (or Never?) - Studying Violations of GDPR's Explicit Consent in Android Apps.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Nguyen, Trung Tin and Nguyen, Duc Cuong and Schilling, Michael and Wang, Gang and Backes, Michael
(2021) Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
In: 2021 ACM Asia Conference on Computer and Communications Security (ASIA CCS ’21).
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security
(Submitted)

O

Oestreich, Marie and Chen, Dingfan and Schultze, Joachim L. and Fritz, Mario and Becker, Matthias
(2021) Privacy considerations for sharing genomics data.
EXCLI Journal Eperimental and Clinical Sciences, 20. pp. 1243-1260. ISSN 1611-2156

Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2021) Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
In: 30th USENIX Security Symposium (USENIX Security 21).
Conference: USENIX-Security Usenix Security Symposium
(In Press)

P

Patrignani, Marco and Guarnieri, Marco
(2021) Exorcising Spectres with secure compilers.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Patrignani, Marco and Martin, Eric Mark and Devriese, Dominique
(2021) On the Semantic Expressiveness of Recursive Types.
In: POPL 2021.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Petzka, Henning and Kamp, Michael and Adilova, Linara and Sminchisescu, Cristian and Boley, Mario
(2021) Relative Flatness and Generalization.
In: NeurIPS.
Conference: NeurIPS Conference on Neural Information Processing Systems

Pfeffer, Katharina and Mai, Alexandra and Dabrowski, Adrian and Gusenbauer, Matthias and Schindler, Philipp and Weippl, Edgar and Franz, Michael and Krombholz, Katharina
(2021) On the Usability of Authenticity Checks for Hardware Security Tokens.
In: Usenix Security 2021.
Conference: USENIX-Security Usenix Security Symposium

Ponticello, Alexander and Fassl, Matthias and Krombholz, Katharina
(2021) Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.
In: Seventeenth Symposium on Usable Privacy and Security, August 8-10, 2021, Virtual Conference.
Conference: SOUPS Symposium On Usable Privacy and Security

R

Rahimian, Shadi and Orekondy, Tribhuvanesh and Fritz, Mario
(2021) Differential Privacy Defenses and Sampling Attacks for Membership Inference.
In: 14th ACM Workshop on Artificial Intelligence and Security, co-located with the 28th ACM Conference on Computer and Communications Security.
Conference: AISec ACM Workshop on Artificial Intelligence and Security

Roth, Sebastian and Gröber, Lea and Backes, Michael and Krombholz, Katharina and Stock, Ben
(2021) 12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP.
In: ACM CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Rottenstreich, Ori and Kulik, Ariel and Joshi, Ananya and Rexford, Jennifer and Rétvári, Gábor and Menache, Daniel S
(2021) Data Plane Cooperative Caching with Dependencies.
IEEE Transactions on Network and Service Management.

S

Scaletta, Marco and Hähnle, Reiner and Steinhöfel, Dominic and Bubel, Richard
(2021) Delta-based Verification of Software Product Families.
In: 20th International Conference on Generative Programming: Concepts & Experiences, Chicago, USA (Hybrid).
Conference: GPCE International Conference on Generative Programming and Component Engineering

Schmidt, Florian and Marx, Alexander and Baumgarten, Nina and Hebel, Marie and Wegner, Martin and Kaulich, Manuel and Leisegang, Matthias S and Brandes, Ralf P and Göke, Jonathan and Vreeken, Jilles and Schulz, Marcel H
(2021) Integrative analysis of epigenetics data identifies gene-specific regulatory elements.
Nucleic acids research.

Schmitt, Frederik and Hahn, Christopher and Kreber, Jens U. and Rabe, Markus N. and Finkbeiner, Bernd
(2021) Deep Learning for Temporal Logics.
Unpublished
.
(Unpublished)

Schmitt, Frederik and Hahn, Christopher and Rabe, Markus N. and Finkbeiner, Bernd
(2021) Neural Circuit Synthesis from Specification Patterns.
In: Thirty-fifth Conference on Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Schwarzl, Martin and Canella, Claudio and Gruss, Daniel and Schwarz, Michael
(2021) Specfuscator: Evaluating Branch Removal as a Spectre Mitigation.
In: Financial Cryptography and Data Security 2021.
Conference: FC Financial Cryptography and Data Security Conference

Schwarzl, Martin and Schuster, Thomas and Schwarz, Michael and Gruss, Daniel
(2021) Speculative Dereferencing of Registers: Reviving Foreshadow.
In: Financial Cryptography and Data Security 2021.
Conference: FC Financial Cryptography and Data Security Conference

Soremekun, Ezekiel and Kirschner, Lukas and Böhme, Marcel and Zeller, Andreas
(2021) Locating Faults with Program Slicing: An Empirical Analysis.
Empirical Software Engineering, 26.

Steffens, Marius and Musch, Marius and Johns, Martin and Stock, Ben
(2021) Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI.
In: Network and Distributed Systems Security (NDSS) Symposium 2021.
Conference: NDSS Network and Distributed System Security Symposium

Stransky, Christian and Wermke, Dominik and Schrader, Johanna and Huaman, Nicolas and Acar, Yasemin and Fehlhaber, Anna Lena and Wei, Miranda and Ur, Blase and Fahl, Sascha
(2021) On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
In: Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021., August 8-10, 2021.
Conference: SOUPS Symposium On Usable Privacy and Security

T

Tahmasbi, Fatemeh and Schild, Leonard and Ling, Chen and Blackburn, Jeremy and Stringhini, Gianluca and Zhang, Yang and Zannettou, Savvas
(2021) “Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
In: The Web Conference.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Tippenhauer, Nils Ole and Chen, Binbin and Mashima, Daisuke and Nicol, David M.
(2021) vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
In: Workshop on CPS&IoT Security and Privacy (CPSIoTSec).
Conference: UNSPECIFIED

Torralba, Àlvaro and Speicher, Patrick and Künnemann, Robert and Hoffmann, Jörg and Steinmetz, Marcel
(2021) Faster Stackelberg Planning via Symbolic Search and Information Sharing.
In: 35th AAAI Conference on Artificial Intelligence, February 2-9, 2021, virtual conference.
Conference: AAAI National Conference of the American Association for Artificial Intelligence

V

Vasilakis, Nikos and Staicu, Cristian-Alexandru and Ntousakis, Grigoris and Kallas, Konstantinos and Karel, Ben and DeHon, André and Pradel, Michael
(2021) Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction.
In: 28th ACM Conference on Computer and Communications Security (CCS 2021).
Conference: CCS ACM Conference on Computer and Communications Security

Vassena, Marco and Disselkoen, Craig and Cauligi, Sunjay and Gleissenthall, Klaus and Kici, Rami Gökhan and Jhala, Ranjit and Stefan, Deian and Tullsen, Dean
(2021) Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade.
In: 48th ACM SIGPLAN Symposium on Principles of Programming Languages.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Virtema, Jonni and Hofmann, Jana and Finkbeiner, Bernd and Kontinen, Juha and Yang, Fan
(2021) Linear-Time Temporal Logic with Team Semantics: Expressivity and Complexity.
In: 41st IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science.
Conference: FST&TCS Foundations of Software Technology and Theoretical Computer Science

van der Toorn, Olivier and Krupp, Johannes and Jonker, Mattijs and van Rijswijk-Deij, Roland and Rossow, Christian and Sperotto, Anna
(2021) ANYway: Measuring the Amplification DDoS Potential of Domains.
In: 17th International Conference on Network and Service Management.
Conference: CNSM International Conference on Network and Service Management (amalgamation of DSOM and related workshops from 2010)

W

Wang, Hui-Po and Orekondy, Tribhuvanesh and Fritz, Mario
(2021) InfoScrub: Towards Attribute Privacy by Targeted Obfuscation.
In: 2021 IEEE CVPR Workshop on Fair, Data Efficient and Trusted Computer Vision.
Conference: ECCV European Conference on Computer Vision

Wang, Hui-Po and Yu, Ning and Fritz, Mario
(2021) Hijack-GAN: Unintended-Use of Pretrained, Black-Box GANs.
In: 34th IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Wang, Jiawei and Li, Li and Zeller, Andreas
(2021) Restoring Execution Environments of Jupyter Notebooks.
In: ICSE 2021, May 2021, Virtual.
Conference: ICSE International Conference on Software Engineering

Wang, Tianhao and Chen, Joann Qiongna and Zhang, Zhikun and Su, Dong and Cheng, Yueqiang and Li, Zhou and Li, Ninghui and Jha, Somesh
(2021) Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
In: CCS 2021.
Conference: CCS ACM Conference on Computer and Communications Security

Warnat-Herresthal, Stefanie and Schultze, Hartmut and Shastry, Krishnaprasad Lingadahalli and Manamohan, Sathyanarayanan and Mukherjee, Saikat and Garg, Vishesh and Sarveswara, Ravi and Händler, Kristian and Pickkers, Peter and Aziz, N. Ahmad and Ktena, Sofia and Tran, Florian and Bitzer, Michael and Ossowski, Stephan and Casadei, Nicolas and Herr, Christian and Petersheim, Daniel and Behrends, Uta and Kern, Fabian and Fehlmann, Tobias and Schommers, Philipp and Lehmann, Clara and Augustin, Max and Rybniker, Jan and Altmüller, Janine and Mishra, Neha and Bernardes, Joana P. and Krämer, Benjamin and Bonaguro, Lorenzo and Schulte-Schrepping, Jonas and De Domenico, Elena and Siever, Christian and Kraut, Michael and Desai, Milind and Monnet, Bruno and Saridaki, Maria and Siegel, Charles Martin and Drews, Anna and Nuesch-Germano, Melanie and Theis, Heidi and Heyckendorf, Jan and Schreiber, Stefan and Kim-Hellmuth, Sarah and Nattermann, Jacob and Skowasch, Dirk and Kurth, Ingo and Keller, Andreas and Bals, Robert and Nürnberg, Peter and Rieß, Olaf and Rosenstiel, Philip and Netea, Mihai G. and Theis, Fabian and Mukherjee, Sach and Backes, Michael and Aschenbrenner, Anna C. and Ulas, Thomas and Breteler, Monique M. B. and Giamarellos-Bourboulis, Evangelos J. and Kox, Matthijs and Becker, Matthias and Cheran, Sorin and Woodacre, Michael S. and Goh, Eng Lim and Schultze, Joachim L.
(2021) Swarm Learning for decentralized and confidential clinical machine learning.
Nature.

Weber, Daniel and Ibrahim, Ahmad and Nemati, Hamed and Schwarz, Michael and Rossow, Christian
(2021) Osiris: Automated Discovery of Microarchitectural Side Channels.
In: 30th USENIX Security Symposium (USENIX Security '21), 11-13 August, 2021.
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Wiegand, Boris and Klakow, Dietrich and Vreeken, Jilles
(2021) Mining Easily Understandable Models from Complex Event Logs.
In: Proceedings of the 2021 SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Wu, Jianliang and Wu, Ruoyu and Antonioli, Daniele and Payer, Mathias and Tippenhauer, Nils Ole and Xu, Dongyan and Tian, Dave (Jing) and Bianchi, Antonio
(2021) LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
In: Proceedings of the USENIX Security Symposium (USENIX Security).
Conference: USENIX-Security Usenix Security Symposium

Y

Yu, Ning and Liu, Guilin and Dundar, Aysegul and Tao, Andrew and Catanzaro, Bryan and Davis, Larry and Fritz, Mario
(2021) Dual Contrastive Loss and Attention for GANs.
In: IEEE International Conference on Computer Vision (ICCV) 2021, Virtual.
Conference: ICCV IEEE International Conference on Computer Vision

Yu, Ning and Skripniuk, Vladislav and Abdelnabi, Sahar and Fritz, Mario
(2021) Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
In: IEEE International Conference on Computer Vision (ICCV), 2021, Virtual.
Conference: ICCV IEEE International Conference on Computer Vision

Z

Zhang, Minxing and Ren, Zhaochun and Wang, Zihan and Ren, Pengjie and Chen, Zhumin and Hu, Pengfei and Zhang, Yang
(2021) Membership Inference Attacks Against Recommender Systems.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Zhang, Zhikun and Wang, Tianhao and Honorio, Jean and Li, Ninghui and Backes, Michael and He, Shibo and Chen, Jiming and Zhang, Yang
(2021) PrivSyn: Differentially Private Data Synthesis.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

This list was generated on Wed Oct 9 20:39:21 2024 CEST.