Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
PDA: Semantically Secure Time-Series Data Analytics with Dynamic Subgroups
Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli, CCS 2017, star
walk2friends: Inferring Social Links from Mobility Profiles , CCS 2017
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy, CCS 2017
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives, CCS 2017
Fast Private Set Intersection from Homomorphic Encryption, CCS 2017
Leakage-Abuse Attacks against Order-Revealing Encryption, SP2017
A Framework for Universally Composable Diffie-Hellman Key Exchange, SP2017
Comparing the Usability of Cryptographic APIs, SP2017
Membership Inference Attacks Against Machine Learning Models, SP2017
Deep Learning with Differential Privacy, CCS2016
Differential Privacy as a Mutual Information Constraint, CCS2016
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration, CCS17
DolphinAttack: Inaudible Voice Commands, CCS17
Locally Differentially Private Protocols for Frequency Estimation, USENIX17
Poster: Locally Differentially Private Frequent Itemset Mining, SP17
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy, CCS16
Practical Secure Aggregation for Privacy-Preserving Machine Learning, CCS17
Is Interaction Necessary for Distributed Private Learning?, SP17
Fast Homomorphic Evaluation of Deep Discretized Neural Networks, CRYPTO18
SecureML: A System for Scalable Privacy-Preserving Machine Learning, SP17
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques*, CCS17
Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates, CCS17
Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms, CCS17
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption, CRYPTO17
Distance-Bounding Protocols: Verification without Time and Location*
Multi-touch Authentication Using Hand Geometry and Behavioral Information
EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements
ACES: Automatic Compartments for Embedded Systems
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
SmartAuth: User-Centered Authorization for the Internet of Things
Global-Scale Secure Multiparty Computation
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors
Notes: