Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (25. : 2020 : Online) Computer Security – ESORICS 2020 ; Part 1
1. Verfasser: Halimi, Anisa (VerfasserIn)
Weitere Verfasser: Ayday, Erman (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Bulwark: Holistic and Verified Security Monitoring of Web Protocols 2020 Veronese, Lorenzo
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing 2020 Agrawal, Shweta
Designing Reverse Firewalls for the Real World 2020 Bossuat, Angele
Dynamic and Secure Memory Transformation in Userspace 2020 Lyerly, Robert
Zipper Stack: Shadow Stacks Without Shadow 2020 Li, Jinfeng
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference 2020 Shen, Liyan
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation . Camtepe 2020 Sultan, Nazatul Haque
Secure Cloud Auditing with Efficient Ownership Transfer 2020 Shen, Jun
Encrypt-to-Self: Securely Outsourcing Storage 2020 Pijnenburg, Jeroen
GDPR - Challenges for Reconciling Legal Rules with Technical Reality 2020 Kutylowski, Mirosiaw
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment 2020 Ning, Jianting
Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds 2020 You, Weijing
Anonymity Preserving Byzantine Vector Consensus 2020 Cachin, Christian
Understanding the Security Risks of Docker Hub 2020 Liu, Peiyu
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems 2020 Zhang, Yihe
Polisma - A Framework for Learning Attribute-Based Access Control Policies 2020 Jabal, Amani Abu
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage 2020 Cardaioli, Matteo
Distributed Detection of APTs: Consensus vs. Clustering 2020 Rubio, Juan E.
Follow the Blue Bird: A Study on Threat Data Published on Twitter 2020 Alves, Fernando
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon 2020 Conti, Mauro
Alle Artikel auflisten