追蹤
Simon Oya
Simon Oya
在 ece.ubc.ca 的電子郵件地址已通過驗證 - 首頁
標題
引用次數
引用次數
年份
Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption
S Oya, F Kerschbaum
30th USENIX security symposium (USENIX Security 21), 127-142, 2021
1362021
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms
S Oya, C Troncoso, F Pérez-González
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1032017
Investigating membership inference attacks under data dependencies
T Humphries, S Oya, L Tulloch, M Rafuse, I Goldberg, U Hengartner, ...
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 473-488, 2023
81*2023
Obfuscated access and search patterns in searchable encryption
Z Shang, S Oya, A Peter, F Kerschbaum
arXiv preprint arXiv:2102.09651, 2021
592021
Is geo-indistinguishability what you are looking for?
S Oya, C Troncoso, F Pérez-González
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society …, 2017
562017
Do dummies pay off? limits of dummy traffic protection in anonymous communications
S Oya, C Troncoso, F Pérez-González
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
392014
{IHOP}: improved statistical query recovery against searchable symmetric encryption through quadratic optimization
S Oya, F Kerschbaum
31st USENIX Security Symposium (USENIX Security 22), 2407-2424, 2022
372022
Rethinking location privacy for unknown mobility behaviors
S Oya, C Troncoso, F Pérez-González
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 416-431, 2019
27*2019
Differentially private two-party set operations
B Kacsmar, B Khurram, N Lukas, A Norton, M Shafieinejad, Z Shang, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 390-404, 2020
242020
Practical over-threshold multi-party private set intersection
RA Mahdavi, T Humphries, B Kacsmar, S Krastnikov, N Lukas, ...
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
172020
A least squares approach to the static traffic analysis of high-latency anonymous communication systems
F Pérez-González, C Troncoso, S Oya
IEEE Transactions on Information Forensics and Security 9 (9), 1341-1355, 2014
162014
Meet the family of statistical disclosure attacks
S Oya, C Troncoso, F Pérez-González
2013 IEEE Global Conference on Signal and Information Processing, 233-236, 2013
152013
Generalization techniques empirically outperform differential privacy against membership inference
J Liu, S Oya, F Kerschbaum
arXiv preprint arXiv:2110.05524, 2021
112021
Fast and private inference of deep neural networks by co-designing activation functions
A Diaa, L Fenaux, T Humphries, M Dietz, F Ebrahimianghazani, ...
33rd USENIX Security Symposium (USENIX Security 24), 2191-2208, 2024
52024
Understanding the effects of real-world behavior in statistical disclosure attacks
S Oya, C Troncoso, F Pérez-González
2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014
42014
A statistical approach to the design of privacy-preserving services
SO Díez
Universidade de Vigo, 2019
32019
On the the design of optimal location privacy-preserving mechanisms
S Oya, C Troncoso, F Pérez-González
CoRR abs/1705.08779, 2017
32017
Do Dummies Pay Off
S Oya, C Troncoso, F Pérez-González
Limits of Dummy Traffic Protection in Anonymous Communications. Available …, 0
3
{PEPSI}: Practically Efficient Private Set Intersection in the Unbalanced Setting
RA Mahdavi, N Lukas, F Ebrahimianghazani, T Humphries, B Kacsmar, ...
33rd USENIX Security Symposium (USENIX Security 24), 6453-6470, 2024
22024
Design of pool mixes against profiling attacks in real conditions
S Oya, F Pérez-González, C Troncoso
IEEE/ACM Transactions on Networking 24 (6), 3662-3675, 2016
12016
系統目前無法執行作業,請稍後再試。
文章 1–20