Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Non-cooperative Genomic Privacy., , , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 407-426. Springer, (2015)A Survey on Interdependent Privacy., , and . ACM Comput. Surv., 52 (6): 122:1-122:40 (2020)Membership Inference Against DNA Methylation Databases., , , , , , and . EuroS&P, page 509-520. IEEE, (2020)Learning From the Past to Improve the Future., , , and . Bus. Inf. Syst. Eng., 64 (5): 597-614 (2022)When Machine Unlearning Jeopardizes Privacy., , , , , and . CCS, page 896-911. ACM, (2021)Quantifying Privacy Risks of Prompts in Visual Prompt Learning., , , , , , and . CoRR, (2023)MBeacon: Privacy-Preserving Beacons for DNA Methylation Data., , , , , , and . NDSS, The Internet Society, (2019)Towards Plausible Graph Anonymization., , , , , and . NDSS, The Internet Society, (2020)Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission., , , and . USENIX Security Symposium, page 1813-1830. USENIX Association, (2022)When Machine Unlearning Jeopardizes Privacy., , , , , and . CoRR, (2020)