Gergely Ács

Orcid: 0000-0003-4437-0110

According to our database1, Gergely Ács authored at least 37 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy pitfalls of releasing in-vehicle network data.
Veh. Commun., February, 2023

Client-specific Property Inference against Secure Aggregation in Federated Learning.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023


2022
Collaborative Drug Discovery: Inference-level Data Protection Perspective.
Trans. Data Priv., 2022

In Search of Lost Utility: Private Location Data.
Proc. Priv. Enhancing Technol., 2022

Industry-Scale Orchestrated Federated Learning for Drug Discovery.
CoRR, 2022

SIMBIoTA-ML: Light-weight, Machine Learning-based Malware Detection for Embedded IoT Devices.
Proceedings of the 7th International Conference on Internet of Things, 2022

2021
Measuring Contributions in Privacy-Preserving Federated Learning.
ERCIM News, 2021

Constrained differentially private federated learning for low-bandwidth devices.
Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, 2021

Compression Boosts Differentially Private Federated Learning.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Privacy-preserving and bandwidth-efficient federated learning: an application to in-hospital mortality prediction.
Proceedings of the ACM CHIL '21: ACM Conference on Health, 2021

2020
Federated Learning in Adversarial Settings.
CoRR, 2020

Privacy-preserving release of mobility data: a clean-slate approach.
CoRR, 2020

2019
Differentially Private Mixture of Generative Neural Networks.
IEEE Trans. Knowl. Data Eng., 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Secur. Comput., 2019

Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Automatic Driver Identification from In-Vehicle Network Logs.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Privacy-Preserving Release of Spatio-Temporal Density.
Proceedings of the Handbook of Mobile Data Privacy., 2018

2016
Near-Optimal Fingerprinting with Constraints.
Proc. Priv. Enhancing Technol., 2016

2015
On the Unicity of Smartphone Applications.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Probabilistic km-anonymity efficient anonymization of large set-valued datasets.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Retargeting Without Tracking.
CoRR, 2014

A case study: privacy preserving release of spatio-temporal density in paris.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

2013
Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

2012
DREAM: DiffeRentially privatE smArt Metering
CoRR, 2012

You are what you like! Information leakage through users' Interests.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Differentially Private Histogram Publishing through Lossy Compression.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Differentially private sequential data publication via variable-length n-grams.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Protecting against physical resource monitoring.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

I Have a DREAM! (DiffeRentially privatE smArt Metering).
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Misbehaving router detection in link-state routing for wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

2009
Biztonságos útvonalválasztás többugrásos vezetéknélküli hálózatokban.
PhD thesis, 2009

2007
The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

2006
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Modelling adversaries and security objectives for routing protocols in wireless sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

2005
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005


  Loading...