Search Results

You are looking at 1 - 8 of 8 items for :

  • Computer Sciences, other x
Clear All
Open access

Gábor György Gulyás, Gergely Acs and Claude Castelluccia

: Persistent tracking mechanisms in the wild. In ACM CCS, pages 674-689, 2014. [4] J. P. Achara, G. Acs, and C. Castelluccia. On the unicity of smartphone applications. In Proceedings of WPES, pages 27-36. ACM, 2015. [5] Article 29 Data Protection Working Party. Opinion 05/2014 on anonymization techniques, April 2014. [6] K. Boda, A. M. Földes, G. G. Gulyás, and S. Imre. User tracking on the web via cross-browser fingerprinting. In P. Laud, editor, Information Security Technology for Applications, volume 7161 of LNCS, pages 31

Open access

Apostolos Pyrgelis, Carmela Troncoso and Emiliano De Cristofaro

References [1] Waze. https://www.waze.com , 2016. [2] G. Acs and C. Castelluccia. A case study: privacy preserving release of spatio-temporal density in paris. In KDD , 2014. [3] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In CCS , 2013. [4] S. Bocconi, A. Bozzon, A. Psyllidis, C. Titos Bolivar, and G.-J. Houben. Social glass: A platform for urban analytics and decision-making through heterogeneous social data. In WWW , 2015. [5

Open access

Niklas Buescher, Spyros Boukoros, Stefan Bauregger and Stefan Katzenbeisser

, A. Brito, and H. Almeida, “A technique to provide differential privacy for appliance usage in smart metering,” Information Sciences , vol. 370, pp. 355–367, 2016. [22] M. Backes and S. Meiser, “Differentially private smart metering with battery recharging,” in Data Privacy Management and Autonomous Spontaneous Security , pp. 194–212, Springer, 2014. [23] Z. Zhang, Z. Qin, L. Zhu, J. Weng, and K. Ren, “Costfriendly differential privacy for smart meters: exploiting the dual roles of the noise,” IEEE Transactions on Smart Grid , 2016. [24] G. Ács

Open access

Thee Chanyaswad, Changchang Liu and Prateek Mittal

References [1] Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. Deep learning with differential privacy. In CCS , pages 308–318. ACM, 2016. [2] Gergely Acs, Claude Castelluccia, and Rui Chen. Differentially private histogram publishing through lossy compression. In ICDM , pages 1–10. IEEE, 2012. [3] Gergely Acs, Luca Melis, Claude Castelluccia, and Emil-iano De Cristofaro. Differentially private mixture of generative neural networks. arXiv preprint arXiv:1709.04514 , 2017. [4] Michael

Open access

Alexandra-Mihaela Olteanu, Mathias Humbert, Kévin Huguenin and Jean-Pierre Hubaux

. Pervasive and Mobile Computing (PMC) , Nov. 2015. [12] A. Chaabane, G. Acs, and M. Kaafar. You are what you like# information leakage through users’ interests. In NDSS , 2012. [13] J. Chen, J. W. Ping, Y. C. Xu, and B. C. Tan. Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management , 62(3):311–324, 2015. [14] H. Cho and A. Filippova. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proc. of CSCW . ACM, 2016. [15] D. Crandall, L. Backstrom, D

Open access

Kassem Fawaz, Kyu-Han Kim and Kang G. Shin

trajectories,” in Proceedings of the The Ninth International Conference on Mobile Data Management, ser. MDM ’08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 65-72. [Online]. Available: http://dx.doi.org/10.1109/MDM.2008.29 [23] R. Chen, G. Acs, and C. Castelluccia, “Differentially private sequential data publication via variable-length n-grams,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS ’12. New York, NY, USA: ACM, 2012, pp. 638-649. [Online]. Available: http://doi.acm.org/10

Open access

Beth A. Plale, Eleanor Dickson, Inna Kouper, Samitha Harshani Liyanage, Yu Ma, Robert H. McDonald, John A. Walsh and Sachith Withana

. The latest round of awardees in the HTRC Advanced Collaborative Support program (HTRC ACS Awards, 2017 ) provides an illustrative snapshot of the sorts of research questions being explored through HathiTrust collections in the capsule environment. Seven individual analysts or analyst teams are exploring topics such as community reading programs, the history of book design, U.S. women’s movements, history of the U.S. novel, literary novelty, the Iowa Writers’ Workshop, and enhancement of metadata for the Oxford English Dictionary (HTRC ACS Awards, 2017). The Iowa

Open access

Liang Hong, Mengqi Luo, Ruixue Wang, Peixin Lu, Wei Lu and Long Lu

find the association rules between diseases. Driven by this, Kuo et al. (2007) proposed a novel framework of data mining that clusters the data first and then follows with association rule mining. The first stage uses the ant system-based clustering algorithm (ASCA) and ant k-means (AK) to cluster the database, while the ant colony system (ACS)-based association rule mining algorithm is applied to mine the association rule for each cluster. Experimentation on the data sets provided by the National Health Insurance Plan of Taiwan demonstrates that the proposed