A Hypothesis Testing Approach to Sharing Logs with Confidence

A Hypothesis Testing Approach to Sharing Logs with Confidence,
Yunhui Long, Le Xu, and Carl A. Gunter.
ACM Conference on Data and Application Security and Privacy (CODASPY ’20), New Orleans, LA, March 2020.

Last updated on Friday, February 28, 2020, 10:13 am

Charting the Attack Surface of Trigger-Action IoT Platforms

Charting the Attack Surface of Trigger-Action IoT Platforms.
Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter.
ACM Computer and Communications Security (CCS ’18), November, 2019.

Last updated on Friday, February 21, 2020, 9:23 pm

BEEER: Distributed Record and Replay for Medical Devices in Hospital Operating Rooms

BEEER: Distributed Record and Replay for Medical Devices in Hospital Operating Rooms,
Avesta Hojjati, Yunhui Long, Soteris Demetriou, and Carl A. Gunter. 2019.
Hot Topics in the Science of Security Symposium (HotSoS), April, 2019, Nashville, TN,  [PPT]

Last updated on Sunday, May 19, 2019, 10:41 am

Distributed and Secure ML with Self-tallying Multi-party Aggregation

Distributed and Secure ML with Self-tallying Multi-party Aggregation,
Yunhui Long, Tanmay Gangwani, Muhammad Haris Mughees, and Carl A. Gunter.
NeurIPS Workshop on Privacy Preserving Machine Learning, Montréal, Canada, December 2018. [VIDEO]

Last updated on Monday, May 20, 2019, 8:11 pm

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System,
Bo Chen, Klara Nahrstedt, and Carl A. Gunter.
ACM Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ’18), November, 2018, New York, NY.

Last updated on Sunday, December 9, 2018, 8:47 am

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations,
Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, and Nikita Borisov.
ACM Computer and Communications Security (CCS ’18), Toronto Canada, October 2018.

Last updated on Saturday, August 25, 2018, 12:15 pm

NRF: A Naive Re-identification Framework

NRF: A Naive Re-identification Framework,
Shubhra Kanti, Karmaker Santu, Vincent Bindschadler, ChengXiang Zhai, and Carl A. Gunter.
ACM Workshop on Privacy in an Electronic Society (WPES ’18), Toronto, Canada, October 2018.

Last updated on Saturday, August 25, 2018, 12:11 pm

Privacy-Preserving Seedbased Data Structures

Privacy-Preserving Seedbased Data Structures,
Vincent Bindschaedler.
Doctoral Dissertation, University of Illinois at Urbana-Champaign, July 2018.

Last updated on Saturday, August 25, 2018, 12:05 pm

De facto diagnosis specialties: Recognition and discovery

De Facto Diagnosis Specialties: Recognition and Discovery,
Aston Zhang, Xun Lu, Carl A. Gunter, Shuochao Yao, Fangbo Tao, Rongda Zhu, Huan Gui, Daniel Fabbri, David Liebovitz, and Bradley Malin.
Learning Health Systems, 2018:e10057, 2018.

Last updated on Saturday, June 9, 2018, 3:05 pm

Inferring Properties of Neural Networks with Intelligent Designs

Inferring Properties of Neural Networks with Intelligent Designs,
Karan Ganju.
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2018.

Last updated on Sunday, June 3, 2018, 10:09 am