default search action
PAC 2017: Washington, DC, USA
- IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, August 1-4, 2017. IEEE 2017, ISBN 978-1-5386-1027-5
- Z. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel:
Patient-Driven Privacy Control through Generalized Distillation. 1-12 - Krishnaram Kenthapadi, Ahsan Chudhary, Stuart Ambler:
LinkedIn Salary: A System for Secure Collection and Presentation of Structured Compensation Insights to Job Seekers. 13-24 - Brinda Hampiholi, Gergely Alpár:
Privacy-Preserving Webshopping with Attributes. 25-36 - Rade Stanojevic, Mohamed Nabeel, Ting Yu:
Distributed Cardinality Estimation of Set Operations with Differential Privacy. 37-48 - Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. 49-59 - Depeng Xu, Shuhan Yuan, Xintao Wu:
Differential Privacy Preserving Causal Graph Discovery. 60-71 - Richeng Jin, Xiaofan He, Huaiyu Dai, Rudra Dutta, Peng Ning:
Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach. 72-83 - Hoda Mehrpouyan, Ion Madrazo Azpiazu, Maria Soledad Pera:
Measuring Personality for Automatic Elicitation of Privacy Preferences. 84-95 - Jiafan Wang, Sherman S. M. Chow:
Secure Strategyproof Ascending-Price Spectrum Auction. 96-106 - Russell A. Fink, David R. Zaret, Rachel B. Stonehirsch, Robert M. Seng, Samantha M. Tyson:
Streaming, Plaintext Private Information Retrieval Using Regular Expressions on Arbitrary Length Search Strings. 107-118 - Chengjun Cai, Xingliang Yuan, Cong Wang:
Hardening Distributed and Encrypted Keyword Search via Blockchain. 119-128 - Kaibin Huang, Mark Manulis, Liqun Chen:
Password Authenticated Keyword Search. 129-140 - John P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, Matthew Wright:
LiLAC: Lightweight Low-Latency Anonymous Chat. 141-151 - Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang, Wei Cheng:
Privilege Leakage and Information Stealing through the Android Task Mechanism. 152-163 - Guanhua Yan, Junchen Lu, Zhan Shu, Yunus Kucuk:
ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability. 164-175 - Wei Li, Tianyi Song, Yingshu Li, Liran Ma, Jiguo Yu, Xiuzhen Cheng:
A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications. 176-177 - Rezvan Joshaghani, Hoda Mehrpouyan:
A Model-Checking Approach for Enforcing Purpose-Based Privacy Policies. 178-179 - Yunpeng Gao, Tong Yan, Nan Zhang:
A Privacy-Preserving Framework for Rank Inference. 180-181 - Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Assessing Quality of Contribution in Information Sharing for Threat Intelligence. 182-183 - Srinidhi Katla, Depeng Xu, Yongkai Wu, Qiuping Pan, Xintao Wu:
DPWeka: Achieving Differential Privacy in WEKA. 184-185 - Tianhang Zheng, Zhi Sun, Kui Ren:
Data Independent Identification for Privacy Preservation. 186-187 - Zhongjie Ba, Sixu Piao, Kui Ren:
Defending against Speaker Fingerprinting Based Device Tracking for Smartphones. 188-189 - Haihua Gong, Kai Xing, Wenwen Du:
Distinguishing between a Driver and Passenger via a Silent Smartphone. 190-191 - Joongheon Kim, Yeong Jong Mo, Woojoo Lee, DaeHun Nyang:
Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications. 192-193 - Baohua Huang, Qi Lyu, Xiaolu Cheng, Wei Cheng:
PaJDBC: A Transparent Privacy-Aware Database Accessing Middleware for Java. 194-195 - Bo Mei, Yinhao Xiao, Xiuzhen Cheng, Hong Li, Yunchuan Sun:
Personal Information Inference in Social Networks. 196-197 - Ruinian Li, Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Shengling Wang, Rongfang Bie:
Poster: Perturbation Based Private Profile Matching in Social Networks. 198-199 - Ziye Geng, Yunhua He, Tong Niu, Hong Li, Limin Sun, Wei Cheng, Xu Li:
Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs. 200-201 - Lin Zhang, Hong Li, Limin Sun, Zhiqiang Shi, Yunhua He:
Poster: Towards Fully Distributed User Authentication with Blockchain. 202-203 - Zihao Shan, Kui Ren, Zhan Qin:
Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction. 204-205 - Yousra Javed, Mohamed Shehab:
Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications. 206-207 - Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang:
Understanding the Privacy Implications of DNSSEC Look-Aside Validation. 208-209 - Chong Guan, Yue Li, Kun Sun:
Your Neighbors are Listening: Evaluating PostMessage Use in OAuth. 210-211
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.