Search

Your search keyword '"TRONCOSO, CARMELA"' showing total 404 results

Search Constraints

Start Over You searched for: Author "TRONCOSO, CARMELA" Remove constraint Author: "TRONCOSO, CARMELA"
404 results on '"TRONCOSO, CARMELA"'

Search Results

1. A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution

2. Attack-Aware Noise Calibration for Differential Privacy

3. Characterizing and Detecting Propaganda-Spreading Accounts on Telegram

4. SINBAD: Saliency-informed detection of breakage caused by ad blocking

5. Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks

6. On the Conflict of Robustness and Learning in Collaborative Machine Learning

7. The Fundamental Limits of Least-Privilege Learning

8. Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution

9. Transferable Adversarial Robustness for Categorical Data via Universal Robust Embeddings

10. Not Yet Another Digital ID: Privacy-preserving Humanitarian Aid Distribution

11. Can Decentralized Learning be more robust than Federated Learning?

12. Arbitrary Decisions are a Hidden Cost of Differentially Private Training

13. Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

14. Adversarial Robustness for Tabular Data through Cost and Utility Awareness

15. COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

16. Verifiable Encodings for Secure Homomorphic Analytics

17. Private Collection Matching Protocols

18. On the (In)security of Peer-to-Peer Decentralized Machine Learning

19. You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses

20. Bugs in our Pockets: The Risks of Client-Side Scanning

21. WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking

22. Preliminary Analysis of Potential Harms in the Luca Tracing System

23. Towards a common performance and effectiveness terminology for digital proximity tracing applications

24. Synthetic Data -- Anonymisation Groundhog Day

25. Bayes Security: A Not So Average Metric

26. Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign

27. DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists

28. Decentralized Privacy-Preserving Proximity Tracing

29. VoteAgain: A scalable coercion-resistant voting system

30. zksk: A Library for Composable Zero-Knowledge Proofs

31. Filter Design for Delay-Based Anonymous Communications

32. Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks

33. A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems

34. Meet the Family of Statistical Disclosure Attacks

35. Encrypted DNS --> Privacy? A Traffic Analysis Perspective

36. Disparate Vulnerability to Membership Inference Attacks

37. Measuring Membership Privacy on Aggregate Location Time-Series

38. On (The Lack Of) Location Privacy in Crowdsourcing Applications

39. Questioning the assumptions behind fairness solutions

40. Evading classifiers in discrete domains with provable optimality guarantees

41. Rethinking Location Privacy for Unknown Mobility Behaviors

42. Tandem: Securing Keys by Using a Central Server While Preserving Privacy

43. POTs: Protective Optimization Technologies

44. Under the Underground: Predicting Private Interactions in Underground Forums

45. TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

46. Feature importance scores and lossless feature pruning using Banzhaf power indices

47. Is Geo-Indistinguishability What You Are Looking for?

48. Knock Knock, Who's There? Membership Inference on Aggregate Location Data

49. ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging

50. Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms

Catalog

Books, media, physical & digital resources