Gergely Ács

According to our database1, Gergely Ács authored at least 28 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Differentially Private Mixture of Generative Neural Networks.
IEEE Trans. Knowl. Data Eng., 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Sec. Comput., 2019

Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification.
CoRR, 2019

Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Privacy-Preserving Release of Spatio-Temporal Density.
Proceedings of the Handbook of Mobile Data Privacy., 2018

2017
Differentially Private Mixture of Generative Neural Networks.
CoRR, 2017

Differentially Private Mixture of Generative Neural Networks.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

2016
Near-Optimal Fingerprinting with Constraints.
PoPETs, 2016

Near-Optimal Fingerprinting with Constraints.
CoRR, 2016

2015
On the Unicity of Smartphone Applications.
CoRR, 2015

On the Unicity of Smartphone Applications.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Probabilistic km-anonymity efficient anonymization of large set-valued datasets.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

2014
Retargeting Without Tracking.
CoRR, 2014

A case study: privacy preserving release of spatio-temporal density in paris.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

2013
Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

2012
DREAM: DiffeRentially privatE smArt Metering
CoRR, 2012

You are what you like! Information leakage through users' Interests.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Differentially Private Histogram Publishing through Lossy Compression.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Differentially private sequential data publication via variable-length n-grams.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Protecting against physical resource monitoring.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

I Have a DREAM! (DiffeRentially privatE smArt Metering).
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Misbehaving router detection in link-state routing for wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

2007
The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

2006
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Modelling adversaries and security objectives for routing protocols in wireless sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

2005
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

2004
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks.
IACR Cryptology ePrint Archive, 2004


  Loading...