I have a dream!(differentially private smart metering) G Ács, C Castelluccia International Workshop on Information Hiding, 118-132, 2011 | 500 | 2011 |
Differentially private sequential data publication via variable-length n-grams R Chen, G Acs, C Castelluccia Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 340 | 2012 |
Provably secure on-demand source routing in mobile ad hoc networks G Acs, L Buttyan, I Vajda IEEE transactions on Mobile Computing 5 (11), 1533-1546, 2006 | 298 | 2006 |
Differentially private histogram publishing through lossy compression G Acs, C Castelluccia, R Chen 2012 IEEE 12th International Conference on Data Mining, 1-10, 2012 | 205 | 2012 |
You are what you like! information leakage through users’ interests A Chaabane, G Acs, MA Kaafar Proceedings of the 19th annual network & distributed system security …, 2012 | 195 | 2012 |
Differentially private mixture of generative neural networks G Acs, L Melis, C Castelluccia, E De Cristofaro IEEE Transactions on Knowledge and Data Engineering 31 (6), 1109-1121, 2018 | 146 | 2018 |
Cache privacy in named-data networking G Acs, M Conti, P Gasti, C Ghali, G Tsudik 2013 IEEE 33rd International Conference on Distributed Computing Systems, 41-51, 2013 | 135 | 2013 |
A case study: Privacy preserving release of spatio-temporal density in paris G Acs, C Castelluccia Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014 | 132 | 2014 |
A taxonomy of routing protocols for wireless sensor networks G Acs, L Buttyán BUTE Telecommunication department, 32-40, 2007 | 74 | 2007 |
Provable security of on-demand distance vector routing in wireless ad hoc networks G Ács, L Buttyán, I Vajda Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop …, 2005 | 74 | 2005 |
On the unicity of smartphone applications JP Achara, G Acs, C Castelluccia Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 27-36, 2015 | 57 | 2015 |
Modelling adversaries and security objectives for routing protocols in wireless sensor networks G Acs, L Buttyán, I Vajda Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006 | 51 | 2006 |
Privacy-aware caching in information-centric networking G Acs, M Conti, P Gasti, C Ghali, G Tsudik, CA Wood IEEE Transactions on Dependable and Secure Computing 16 (2), 313-328, 2017 | 45 | 2017 |
Privacy-preserving and bandwidth-efficient federated learning: An application to in-hospital mortality prediction R Kerkouche, G Acs, C Castelluccia, P Genevès Proceedings of the Conference on Health, Inference, and Learning, 25-35, 2021 | 28 | 2021 |
The security proof of a link-state routing protocol for wireless sensor networks G Acs, L Buttyán, I Vajda 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, 1-6, 2007 | 25 | 2007 |
Dream: Differentially private smart metering G Acs, C Castelluccia arXiv preprint arXiv:1201.2531, 2012 | 24 | 2012 |
Extracting vehicle sensor signals from CAN logs for driver re-identification S Lestyan, G Acs, G Biczók, Z Szalay arXiv preprint arXiv:1902.08956, 2019 | 21 | 2019 |
Near-optimal fingerprinting with constraints GG Gulyas, G Acs, C Castelluccia arXiv preprint arXiv:1605.08664, 2016 | 21 | 2016 |
Automatic driver identification from in-vehicle network logs M Remeli, S Lestyán, G Acs, G Biczók 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 1150-1157, 2019 | 18 | 2019 |
Compression boosts differentially private federated learning R Kerkouche, G Ács, C Castelluccia, P Genevès 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 304-318, 2021 | 17 | 2021 |