Julien Freudiger

According to our database1, Julien Freudiger authored at least 25 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Federated Evaluation and Tuning for On-Device Personalization: System Design & Applications.
CoRR, 2021

2018
Protection Against Reconstruction and Its Applications in Private Federated Learning.
CoRR, 2018

2015
How talkative is your mobile device?: an experimental study of Wi-Fi probe requests.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Privacy, efficiency & fault tolerance in aggregate computations on massive star networks.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Controlled Data Sharing for Collaborative Predictive Blacklisting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
What's the Gist? Privacy-Preserving Aggregation of User Profiles.
IACR Cryptol. ePrint Arch., 2014

Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

2013
Non-Cooperative Location Privacy.
IEEE Trans. Dependable Secur. Comput., 2013

Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks.
Mob. Networks Appl., 2013

Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication.
CoRR, 2013

2011
When Whereabouts is No Longer Thereabouts - Location Privacy in Wireless Networks.
PhD thesis, 2011

Privacy-triggered communications in pervasive social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

The Inconvenient Truth about Web Certificates.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Evaluating the Privacy Risk of Location-Based Services.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Unraveling an old cloak: k-anonymity for location privacy.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Integrity of the Web Content: The Case of Online Advertising.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

On the Age of Pseudonyms in Mobile Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Tracking Games in Mobile Networks.
Proceedings of the Decision and Game Theory for Security, 2010

SensorTune: a mobile auditory interface for DIY wireless sensor networks.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
A distortion-based metric for location privacy.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Self-organized Anonymous Authentication in Mobile Ad Hoc Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

On the Optimal Placement of Mix Zones.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

On non-cooperative location privacy: a game-theoretic analysis.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Secure vehicular communication systems: design and architecture.
IEEE Commun. Mag., 2008

On Wireless Social Community Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008


  Loading...