M2M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch (English)
- New search for: Houssiau, Florimond
- New search for: Schellekens, Vincent
- New search for: Chatalic, Antoine
- New search for: Annamraju, Shreyas Kumar
- New search for: Montjoye, Yves-Alexandre de
- New search for: Houssiau, Florimond
- New search for: Schellekens, Vincent
- New search for: Chatalic, Antoine
- New search for: Annamraju, Shreyas Kumar
- New search for: Montjoye, Yves-Alexandre de
In:
Security and trust management
; 117-135
;
2023
-
ISBN:
- Conference paper / Print
-
Title:M2M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch
-
Contributors:Houssiau, Florimond ( author ) / Schellekens, Vincent ( author ) / Chatalic, Antoine ( author ) / Annamraju, Shreyas Kumar ( author ) / Montjoye, Yves-Alexandre de ( author )
-
Conference:International Workshop on Security and Trust Management ; 18. ; 2022 ; Kopenhagen; Online
-
Published in:Security and trust management ; 117-135
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2023
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
SIMple ID: QR Codes for Authentication Using Basic Mobile Phones in Developing CountriesHicks, Chris / Mavroudis, Vasilios / Crowcroft, Jon et al. | 2023
- 24
-
A Hierarchical Watermarking Scheme for PRFs from Standard Lattice AssumptionsZhao, Yanmin / Wang, Yang / Yiu, Siu Ming / Liu, Yu / Wang, Meigin et al. | 2023
- 52
-
Evaluating the Future Device Security Risk Indicator for Hundreds of IoT DevicesOser, Pascal / Engelmann, Felix / Lüders, Stefan / Kargl, Frank et al. | 2023
- 71
-
Server-Supported Decryption for Mobile DevicesKirss, Johanna Maria / Laud, Peeter / Snetkov, Nikita / Vakarjuk, Jelizaveta et al. | 2023
- 85
-
Software Vulnerability Detection via Multimodal Deep LearningZhou, Xin / Verma, Rakesh M. et al. | 2023
- 104
-
Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Mapsladarola, Giacomo / Mercaldo, Francesco / Martinelli, Fabio / Santone, Antonella et al. | 2023
- 117
-
M2M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private SketchHoussiau, Florimond / Schellekens, Vincent / Chatalic, Antoine / Annamraju, Shreyas Kumar / Montjoye, Yves-Alexandre de et al. | 2023
- 136
-
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java LanguageBuccioli, Luca / Cristalli, Stefano / Vignati, Edoardo / Nava, Lorenzo / Badagliacca, Daniele / Bruschi, Danilo / Lu, Long / Lanzi, Andrea et al. | 2023
- 156
-
FlowADGAN: Adversarial Learning for Deep Anomaly Network Inrusion DetectionWang, Pan / Li, Zeyi / Zhou, Xiaokang / Su, Chunhua / Wang, Weizheng et al. | 2023
- 177
-
The Relevance of Consent in the Digital Age: A Consideration of Its Origins and Its Fit for Digital ApplicationBotes, Marietjie et al. | 2023
- 189
-
HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial NetworksYu, Fangyi / Martin, Miguel Vargas et al. | 2023