The Stackelberg equilibrium for one-sided zero-sum partially observable stochastic games | 0 | 0.34 | 2022 |
Appangio: Revealing Contextual Information Of Android App Behaviors By Api-Level Audit Logs | 0 | 0.34 | 2021 |
Speech Sanitizer: Speech Content Desensitization and Voice Anonymization | 1 | 0.36 | 2021 |
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery | 0 | 0.34 | 2021 |
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations | 0 | 0.34 | 2021 |
Prv 2 chain: Storage of Tree-structured Provenance Records in Blockchain with Linkage Privacy | 0 | 0.34 | 2021 |
A mining pool solution for novel proof-of-neural-architecture consensus | 0 | 0.34 | 2021 |
Provably Secure Contact Tracing with Conditional Private Set Intersection | 0 | 0.34 | 2021 |
CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs | 0 | 0.34 | 2021 |
Scalable Privacy-Preserving Participant Selection for Mobile Crowdsensing Systems: Participant Grouping and Secure Group Bidding | 5 | 0.39 | 2020 |
DLchain - Blockchain with Deep Learning as Proof-of-Useful-Work. | 0 | 0.34 | 2020 |
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM | 0 | 0.34 | 2020 |
Computing-in-Memory for Performance and Energy-Efficient Homomorphic Encryption | 1 | 0.34 | 2020 |
Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption. | 0 | 0.34 | 2020 |
PatronuS: A System for Privacy-Preserving Cloud Video Surveillance | 0 | 0.34 | 2020 |
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers | 1 | 0.37 | 2019 |
Non-Interactive Mpc With Trusted Hardware Secure Against Residual Function Attacks | 0 | 0.34 | 2019 |
Exploiting Computation Power of Blockchain for Biomedical Image Segmentation. | 2 | 0.37 | 2019 |
Energy-recycling Blockchain with Proof-of-Deep-Learning | 1 | 0.35 | 2019 |
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model | 8 | 0.49 | 2019 |
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-identified? | 0 | 0.34 | 2019 |
MIS2: Misinformation and Misbehavior Mining on the Web. | 0 | 0.34 | 2018 |
CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats. | 3 | 0.40 | 2018 |
Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs. | 0 | 0.34 | 2018 |
Crowdlearning: Crowded Deep Learning with Data Privacy | 2 | 0.38 | 2018 |
Hidebehind: Enjoy Voice Input with Voiceprint Unclonability and Anonymity. | 3 | 0.41 | 2018 |
Martian: Message Broadcast via LED Lights to Heterogeneous Smartphones. | 1 | 0.38 | 2017 |
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. | 4 | 0.51 | 2017 |
Social Network De-anonymization: More Adversarial Knowledge, More Users Re-Identified? | 0 | 0.34 | 2017 |
VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices. | 0 | 0.34 | 2017 |
Detecting Driver's Smartphone Usage via Nonintrusively Sensing Driving Dynamics. | 6 | 0.44 | 2017 |
Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs. | 9 | 0.47 | 2017 |
Graph-Based Privacy-Preserving Data Publication | 6 | 0.43 | 2016 |
User-Demand-Oriented Privacy-Preservation in Video Delivering | 0 | 0.34 | 2016 |
Real-time update with joint optimization of route selection and update scheduling for SDNs | 3 | 0.40 | 2016 |
Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'. | 1 | 0.35 | 2016 |
Ensuring Semantic Validity in Privacy-Preserving Aggregate Statistics | 0 | 0.34 | 2016 |
Privacy Inference on Knowledge Graphs: Hardness and Approximation | 0 | 0.34 | 2016 |
Real-Time Charging Station Recommendation System for Electric-Vehicle Taxis | 15 | 0.86 | 2016 |
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption | 41 | 1.50 | 2015 |
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel | 22 | 1.18 | 2015 |
Enabling Privacy-Preserving Auctions In Big Data | 1 | 0.36 | 2015 |
Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks | 21 | 0.72 | 2015 |
A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm | 2 | 0.37 | 2015 |
POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices | 22 | 0.73 | 2015 |
Predicting the influencers on wireless subscriber churn | 1 | 0.35 | 2014 |
Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs | 1 | 0.35 | 2014 |
It starts with iGaze: visual attention driven networking with smart glasses | 33 | 1.33 | 2014 |
Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection. | 2 | 0.39 | 2014 |
Achieving differential privacy of data disclosure in the smart grid | 36 | 1.16 | 2014 |