Reza Shokri

According to our database1, Reza Shokri authored at least 56 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Epione: Lightweight Contact Tracing with Strong Privacy.
IEEE Data Eng. Bull., 2020

On the Privacy Risks of Algorithmic Fairness.
CoRR, 2020

SOTERIA: In Search of Efficient Neural Networks for Private Inference.
CoRR, 2020

Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising.
CoRR, 2020

ML Privacy Meter: Aiding Regulatory Compliance by Quantifying the Privacy Risks of Machine Learning.
CoRR, 2020

Model Explanations with Differential Privacy.
CoRR, 2020

On Adversarial Bias and the Robustness of Fair Machine Learning.
CoRR, 2020

Bypassing Backdoor Detection Algorithms in Deep Learning.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Membership Encoding for Deep Learning.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer.
CoRR, 2019

Privacy Risks of Explaining Machine Learning Models.
CoRR, 2019

Ultimate Power of Inference Attacks: Privacy Risks of High-Dimensional Models.
CoRR, 2019

Membership Inference Attacks Against Adversarially Robust Deep Learning Models.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Trusting Machine Learning: Privacy, Robustness, and Transparency Challenges.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Privacy Risks of Securing Machine Learning Models against Adversarial Examples.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins.
IEEE Trans. Mob. Comput., 2018

Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks.
CoRR, 2018

Chiron: Privacy-preserving Machine Learning as a Service.
CoRR, 2018

A Non-Parametric Generative Model for Human Trajectories.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Machine Learning with Membership Privacy using Adversarial Regularization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Quantifying Interdependent Privacy Risks with Location Data.
IEEE Trans. Mob. Comput., 2017

Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.
ACM Trans. Priv. Secur., 2017

Plausible Deniability for Privacy-Preserving Data Synthesis.
Proc. VLDB Endow., 2017

Membership Inference Attacks Against Machine Learning Models.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Membership Inference Attacks against Machine Learning Models.
CoRR, 2016

Defeating Image Obfuscation with Deep Learning.
CoRR, 2016

Synthesizing Plausible Privacy-Preserving Location Traces.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Privacy Games: Optimal User-Centric Data Obfuscation.
Proc. Priv. Enhancing Technol., 2015

Quantifying and protecting location privacy.
it Inf. Technol., 2015

Privacy through Fake yet Semantically Real Traces.
CoRR, 2015

Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Privacy-Preserving Deep Learning.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration.
IEEE Trans. Dependable Secur. Comput., 2014

Privacy Games: Optimal Protection Mechanism Design for Bayesian and Differential Privacy.
CoRR, 2014

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Quantifying the Effect of Co-location Information on Location Privacy.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Quantifying Web-Search Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Quantifizierung und Schutz von Location Privacy.
Proceedings of the Ausgezeichnete Informatikdissertationen 2013, 2013

2012
Protecting location privacy: optimal strategy against localization attacks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Quantifying Location Privacy.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Quantifying Location Privacy: The Case of Sporadic Location Exposure.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Collaborative Location Privacy.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Collaborative Location Privacy with Rational Users.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Evaluating the Privacy Risk of Location-Based Services.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Unraveling an old cloak: k-anonymity for location privacy.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

On the tradeoff between trust and privacy in wireless ad hoc networks.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

2009
A distortion-based metric for location privacy.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

A practical secure neighbor verification protocol for wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Preserving privacy in collaborative filtering through distributed aggregation of offline profiles.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

On the Optimal Placement of Mix Zones.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

2008
AntMig: A Novel Code Migration Method to Conserve Energy in Wireless Sensor Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
Efficient and Adjustable Recipient Anonymity in Mobile Ad Hoc Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Anonymous Routing in MANET Using Random Identifiers.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Chain-Based Anonymous Routing for Wireless Ad Hoc Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
DDPM: Dynamic Deterministic Packet Marking for IP Traceback.
Proceedings of the 14th IEEE International Conference on Networks, 2006


  Loading...