Gábor György Gulyás

Orcid: 0000-0003-0877-0088

According to our database1, Gábor György Gulyás authored at least 13 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Comparative Study on the Privacy Risks of Face Recognition Libraries.
Acta Cybern., 2021

2019
Hiding information against structural re-identification.
Int. J. Inf. Sec., 2019

2018
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

2016
Near-Optimal Fingerprinting with Constraints.
Proc. Priv. Enhancing Technol., 2016

An Efficient and Robust Social Network De-anonymization Attack.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

2015
Protecting Privacy Against Structural De-anonymization Attacks in Social Networks
PhD thesis, 2015

Using Identity Separation Against De-anonymization of Social Networks.
Trans. Data Priv., 2015

2014
Measuring importance of seeding for structural de-anonymization attacks in social networks.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

2013
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation.
Proceedings of the Communications and Multimedia Security, 2013

2012
Measuring Local Topological Anonymity in Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

2011
User Tracking on the Web via Cross-Browser Fingerprinting.
Proceedings of the Information Security Technology for Applications, 2011

2010
BlogCrypt: Private Content Publishing on the Web.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

2009
Modeling Role-Based Privacy in Social Networking Services.
Proceedings of the Third International Conference on Emerging Security Information, 2009


  Loading...