Privacy Protection Method

Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA

Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16
Privacy Protection Method
Attack Method
Mathematical Analysis

Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30
Sensor Information Management
Privacy Protection Method
User Behavior Analysis

Plausible Deniability for Privacy-Preserving Data Synthesis

Authors: Vincent Bindschaedler, Reza Shokri, Carl A. Gunter | Published: 2017-08-26
Privacy Protection Method
Model Performance Evaluation
Generative Model

Knock Knock, Who’s There? Membership Inference on Aggregate Location Data

Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro | Published: 2017-08-21 | Updated: 2017-11-29
Privacy Protection Method
Privacy Loss Analysis
User Behavior Analysis

Secure Search on the Cloud via Coresets and Sketches

Authors: Adi Akavia, Dan Feldman, Hayim Shaul | Published: 2017-08-19
Privacy Protection Method
Secure Arithmetic Computation
Mathematical Analysis