s-kyo / research_diary

周报

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Contents

Week 2, Jun 17

Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel

PDA: Semantically Secure Time-Series Data Analytics with Dynamic Subgroups

Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks

Week3, Jun 24

The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli, CCS 2017, star

walk2friends: Inferring Social Links from Mobility Profiles , CCS 2017

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy, CCS 2017

Week4, Jul 1

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives, CCS 2017

Fast Private Set Intersection from Homomorphic Encryption, CCS 2017

Week5,Jul 8

Leakage-Abuse Attacks against Order-Revealing Encryption, SP2017

A Framework for Universally Composable Diffie-Hellman Key Exchange, SP2017

Week 6, Jul 15

Comparing the Usability of Cryptographic APIs, SP2017

Membership Inference Attacks Against Machine Learning Models, SP2017

Deep Learning with Differential Privacy, CCS2016

Differential Privacy as a Mutual Information Constraint, CCS2016

Week7, Jul 22

VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration, CCS17

DolphinAttack: Inaudible Voice Commands, CCS17

Locally Differentially Private Protocols for Frequency Estimation, USENIX17

Poster: Locally Differentially Private Frequent Itemset Mining, SP17

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy, CCS16

Week8, Jul 29

Practical Secure Aggregation for Privacy-Preserving Machine Learning, CCS17

Is Interaction Necessary for Distributed Private Learning?, SP17

Fast Homomorphic Evaluation of Deep Discretized Neural Networks, CRYPTO18

SecureML: A System for Scalable Privacy-Preserving Machine Learning, SP17

Week9, Aug 5

Practical Multi-party Private Set Intersection from Symmetric-Key Techniques*, CCS17

Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates, CCS17

Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms, CCS17

Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption, CRYPTO17

Week10, Aug 12

Distance-Bounding Protocols: Veri fication without Time and Location*

Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication

Multi-touch Authentication Using Hand Geometry and Behavioral Information

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements

Week11, Aug 19

ACES: Automatic Compartments for Embedded Systems

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems

SmartAuth: User-Centered Authorization for the Internet of Things

Week12, Aug 26

Global-Scale Secure Multiparty Computation

IoT Goes Nuclear: Creating a ZigBee Chain Reaction

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors

Week 13, Sep 2

Week 14, Sep 9

Week13, Sep 16


Books


Notes:

Public Key Cryptosystem

Skip Gram Model

About

周报