Vincent Bindschaedler

Orcid: 0000-0002-3066-7354

According to our database1, Vincent Bindschaedler authored at least 34 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SoK: Memorization in General-Purpose Large Language Models.
CoRR, 2023

EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Digital Watermarking for Detecting Malicious Intellectual Property Cores in NoC Architectures.
IEEE Trans. Very Large Scale Integr. Syst., 2022

Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds.
Proc. Priv. Enhancing Technol., 2022

Analyzing the Monetization Ecosystem of Stalkerware.
Proc. Priv. Enhancing Technol., 2022

On the Choice of Databases in Differential Privacy Composition.
CoRR, 2022

On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning.
CoRR, 2022

PermPress: Machine Learning-Based Pipeline to Evaluate Permissions in App Privacy Policies.
IEEE Access, 2022

Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Enhanced Membership Inference Attacks against Machine Learning Models.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption.
CoRR, 2021

Generative Models for Security: Attacks, Defenses, and Opportunities.
CoRR, 2021

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Beyond L<sub>p</sub> Clipping: Equalization based Psychoacoustic Attacks against ASRs.
Proceedings of the Asian Conference on Machine Learning, 2021

2020
A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Towards Realistic Membership Inferences: The Case of Survey Data.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2018
The Tao of Inference in Privacy-Protected Databases.
Proc. VLDB Endow., 2018

Understanding Membership Inferences on Well-Generalized Learning Models.
CoRR, 2018

NRF: A Naive Re-identification Framework.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

2017
Plausible Deniability for Privacy-Preserving Data Synthesis.
Proc. VLDB Endow., 2017

Towards Measuring Membership Privacy.
CoRR, 2017

Side-Channel Attacks on Shared Search Indexes.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Leakage-Abuse Attacks against Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Synthesizing Plausible Privacy-Preserving Location Traces.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Privacy through Fake yet Semantically Real Traces.
CoRR, 2015

Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A Location-Privacy Threat Stemmingfrom the Use of Shared Public IP Addresses.
IEEE Trans. Mob. Comput., 2014

2013
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

2011
The Inconvenient Truth about Web Certificates.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011


  Loading...