Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
Sameer Wagh*, Divya Gupta, and Nishanth Chandran SecureNN:3 ...
Keywords: Secure Multi-Party Computation, Privacy-preserving deep learning DOI 10.2478/popets-2019-0035 Received 2018-11-30; revised 2019-03-15; accepted 2019-03-16.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
PoPETs Proceedings — Var-CNN: A Data-Efficient Website Fingerprinting ...
Volume: 2019 Issue: 4 Pages: 292–310 DOI: https://doi.org/10.2478/popets-2019-0070 Download PDF Abstract: In recent years, there have been several works that use website fingerprinting techniques to enable a local adversary to determine which website a Tor user visits.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
SecureNN: 3-Party Secure Computation for Neural Network Training
Volume: 2019 Issue: 3 Pages: 26–49 DOI: Download PDF Abstract: Neural Networks (NN) provide a powerful method for machine learning training and inference. To effectively train, it is desirable for multiple parties to combine their data – however, doing so conflicts with data privacy.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
MAPS: Scaling Privacy Compliance Analysis to a Million Apps
Proceedings on Privacy Enhancing Technologies ; 2019 (3):66–86 an Zimmeck*, Peter Story*, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg,
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
p1-FP: Extraction, Classification, and Prediction of Website ...
p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning Authors: Se Eun Oh (University of Minnesota), Saikrishna Sunkam (University of Minnesota), Nicholas Hopper (University of Minnesota) Volume: 2019 Issue: 3 Pages: 191–209 DOI: https://doi.org/10.2478/popets-2019-0043 Download PDF
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
PoPETs Proceedings — Tracking Anonymized Bluetooth Devices
Authors: Johannes K Becker (Boston University), David Li (Boston University), David Starobinski (Boston University) Volume: 2019 Issue: 3 Pages: 50–65 DOI: https://doi.org/10.2478/popets-2019-0036 Download PDF Abstract: Bluetooth Low Energy (BLE) devices use public (non-encrypted) advertising channels to announce their presence to other devices.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
LOGAN: Membership Inference Attacks Against Generative Models
Keywords: machine learning; privacy; inference attacks DOI 10.2478/popets-2019-0008 Received 2018-05-31; revised 2018-09-15; accepted 2018-09-16.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
SoK: Modular and Efficient Private Decision Tree Evaluation
Proceedings on Privacy Enhancing Technologies ; 2019 (2):187–208 Ágnes Kiss*, Masoud Naderpour, Jian Liu, N. Asokan, and Thomas Schneider
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
MAPS: Scaling Privacy Compliance Analysis to a Million Apps
Volume: 2019 Issue: 3 Pages: 66–86 DOI: Download PDF Abstract: The app economy is largely reliant on data collection as its primary revenue model. To comply with legal requirements, app developers are often obligated to notify users of their privacy practices in privacy policies.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2019/popets-2019-0…
PoPETs Proceedings — Reducing Metadata Leakage from Encrypted Files and ...
Volume: 2019 Issue: 4 Pages: 6–33 DOI: Download PDF Abstract: Most encrypted data formats leak metadata via their plaintext headers, such as format version, encryption schemes used, number of recipients who can decrypt the data, and even the recipients’ identities.