Melek Önen

Orcid: 0000-0003-0269-9495

Affiliations:
  • Eurecom, Sophia Antipolis, France


According to our database1, Melek Önen authored at least 96 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Information-Theoretic Approaches to Differential Privacy.
ACM Comput. Surv., March, 2024

PRIDA: PRIvacy-preserving Data Aggregation with multiple data customers.
IACR Cryptol. ePrint Arch., 2024

2023
Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation.
Proc. Priv. Enhancing Technol., October, 2023

SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning.
Proc. Priv. Enhancing Technol., January, 2023

Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†.
Secur. Priv., 2023

A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth.
IACR Cryptol. ePrint Arch., 2023

PARMESAN: Parallel ARithMEticS over ENcrypted data.
IACR Cryptol. ePrint Arch., 2023

Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication.
IACR Cryptol. ePrint Arch., 2023

Node Injection Link Stealing Attack.
CoRR, 2023

Fed-BioMed: Open, Transparent and Trusted Federated Learning for Real-world Healthcare Applications.
CoRR, 2023

Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

Grote: Group Testing for Privacy-Preserving Face Identification.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms.
J. Cybersecur. Priv., October, 2022

Parallel Operations over TFHE-Encrypted Multi-Digit Integers.
IACR Cryptol. ePrint Arch., 2022

Funshade: Functional Secret Sharing for Two-Party Secure Thresholded Distance Evaluation.
IACR Cryptol. ePrint Arch., 2022

Adversarial Classification under Gaussian Mechanism: Calibrating the Attack to Sensitivity.
CoRR, 2022

Membership Inference Attack Against Principal Component Analysis.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

Privacy Preserving Image Registration.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022

BlindSpot: Watermarking Through Fairness.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Banners: Binarized Neural Networks with Replicated Secret Sharing.
IACR Cryptol. ePrint Arch., 2021

Privacy-preserving Density-based Clustering.
IACR Cryptol. ePrint Arch., 2021

FADIA: fairness-driven collaborative remote attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Preventing Watermark Forging Attacks in a MLaaS Environment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Secure Aggregation Against Malicious Users.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

A Statistical Threshold for Adversarial Classification in Laplace Mechanisms.
Proceedings of the IEEE Information Theory Workshop, 2021

Privacy-Preserving Voice Anti-Spoofing Using Secure Multi-Party Computation.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Yes We can: Watermarking Machine Learning Models beyond Classification.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects.
SN Comput. Sci., 2020

QSOR: Quantum-safe Onion Routing.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network Predictions.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
UPRISE-IoT: User-Centric Privacy & Security in the IoT.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

PAPAYA: A Platform for Privacy Preserving Data Analytics.
ERCIM News, 2019

Privacy-preserving delegable authentication in the internet of things.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

SoK: Cryptography for Neural Networks.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
Device Identification and Personal Data Attestation in Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Secure and Scalable Multi-User Searchable Encryption.
IACR Cryptol. ePrint Arch., 2018

CHARIOT: Cloud-Assisted Access Control for the Internet of Things.
IACR Cryptol. ePrint Arch., 2018

Lightweight secure bootstrap and message attestation in the internet of things.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Emotion-Awareness for Intelligent Vehicle Assistants: A Research Agenda.
Proceedings of the 1st IEEE/ACM International Workshop on Software Engineering for AI in Autonomous Systems, 2018

Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

FHE-Compatible Batch Normalization for Privacy Preserving Deep Learning.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Breaking and Fixing the Security Proof of Garbled Bloom Filters.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Framework for Searchable Encryption with SQL Databases.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

POROS: Proof of Data Reliability for Outsourced Storage.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

2017
A Leakage-Abuse Attack Against Multi-User Searchable Encryption.
Proc. Priv. Enhancing Technol., 2017

Reconciling Security and Functional Requirements in Multi-tenant Clouds.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud.
ERCIM News, 2016

Message-Locked Proofs of Retrievability with Secure Deduplication.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Efficient Techniques for Publicly Verifiable Delegation of Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
PUDA - Privacy and Unforgeability for Data Aggregation.
IACR Cryptol. ePrint Arch., 2015

Online-Offline Homomorphic Signatures for Polynomial Functions.
IACR Cryptol. ePrint Arch., 2015

Multi-user Searchable Encryption in the Cloud.
Proceedings of the Information Security - 18th International Conference, 2015

PerfectDedup: Secure Data Deduplication.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Publicly verifiable conjunctive keyword search in outsourced databases.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Block-level De-duplication with Encrypted Data.
Open J. Cloud Comput., 2014

Privacy preserving delegated word search in the cloud.
IACR Cryptol. ePrint Arch., 2014

Opportunistic networks.
Comput. Commun., 2014

A P2P based usage control enforcement scheme resilient to re-injection attacks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Privacy Preserving Statistics in the Smart Grid.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

A-PPL: An Accountability Policy Language.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

StealthGuard: Proofs of Retrievability with Hidden Watchdogs.
Proceedings of the Computer Security - ESORICS 2014, 2014

A Cloud Accountability Policy Representation Framework.
Proceedings of the CLOSER 2014, 2014

From Regulatory Obligations to Enforceable Accountability Policies in the Cloud.
Proceedings of the Cloud Computing and Services Sciences, 2014

2013
ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Privacy Preserving Similarity Detection for Data Analysis.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Local key management in opportunistic networks.
Int. J. Commun. Networks Distributed Syst., 2012

Special section on Security and Social Networking.
Comput. Commun., 2012

PRICE: Privacy preserving incentives for cooperation enforcement.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

2011
PRISM - Privacy-Preserving Search in MapReduce.
IACR Cryptol. ePrint Arch., 2011

Safebook: A distributed privacy preserving Online Social Network.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Catch the Jammer in Wireless Sensor Network.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Broker-Based Private Matching.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Analysis of Privacy in Online Social Networks from the Graph Theory Perspective.
Proceedings of the Global Communications Conference, 2011

2010
Secure P2P Data Storage and Maintenance.
Int. J. Digit. Multim. Broadcast., 2010

Privacy and confidentiality in context-based and epidemic forwarding.
Comput. Commun., 2010

Bootstrapping security associations in opportunistic networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

2009
Privacy in context-based and epidemic forwarding.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

Privacy-Preserving Content-Based Publish/Subscribe Networks.
Proceedings of the Emerging Challenges for Security, 2009

Privacy in Content-Based Opportunistic Networks.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Security Protocol for Self-Organizing Data Storage.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2007
Optimistic fair exchange for secure forwarding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Secure Data Aggregation with Multiple Encryption.
Proceedings of the Wireless Sensor Networks, 2007

2006
Simulation based performance evaluation of a user-centric group rekeying protocol.
Proceedings of IEEE International Conference on Communications, 2006

2004
Group Rekeying with a Customer Perspective.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Denial of service prevention in satellite networks.
Proceedings of IEEE International Conference on Communications, 2004

Reliable group rekeying with a customer perspective.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004


  Loading...