CoDrive: Improving Automobile Positioning via Collaborative Driving

CoDrive: Improving Automobile Positioning via Collaborative Driving,
Soteris Demetriou, Puneet Jain, Kyu-Han Kim.
IEEE International Conference on Computer Communications (INFOCOM 18′), Honolulu, HI, April 2018.

Last updated on Sunday, June 3, 2018, 7:47 pm

Ghost Installer in the Shadow: Security Analysis of App Installation on Android

Ghost Installer in the Shadow: Security Analysis of App Installation on Android
Yeonjoon Lee, Tongxin Li, Nan Zhang; Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen; Xiaoyong Zhou; Xinhui Han, Michael Grace
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 17′), Denver, CO, June 2017.

Last updated on Tuesday, January 2, 2018, 9:27 am

GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling

GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling,
Ali Yekkehkhany, Avesta Hojjati, Mohammad H Hajiesmaili.
The 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation (IFIP 2017), Columbus, NY, November 2017.

Last updated on Friday, December 29, 2017, 1:05 pm

CamForensics: Understanding Visual Privacy Leaks in the Wild

CamForensics: Understanding Visual Privacy Leaks in the Wild,
Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon Cox, Kyu-Han Kim.
Proceedings of the 15th ACM Conference on Embedded Networked Sensor Systems (SenSys ’17), November 2017.

Last updated on Wednesday, November 15, 2017, 1:08 pm

VISUALIZATION AND DIFFERENTIAL PRIVACY

Visualization and Differential Privacy,
Hyun Bin Lee.
Master of Science Thesis, University of Illinois at Urbana-Champaign, July 2017.

Last updated on Sunday, August 6, 2017, 2:36 pm

Side-Channel Attacks on Shared Search Indexes

Side-Channel Attacks on Shared Search Indexes
Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, and Thomas Ristenpart
In IEEE Security & Privacy (Oakland) 2017.

Last updated on Tuesday, January 2, 2018, 9:38 am

Leakage-Abuse Attacks against Order-Revealing Encryption

Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart
In IEEE Security & Privacy (Oakland) 2017.

Last updated on Tuesday, January 2, 2018, 9:35 am

LSTM AND EXTENDED DEAD RECKONING AUTOMOBILE ROUTE PREDICTION USING SMARTPHONE SENSORS

LSTM and Extended Dead Reckoning Automobile Route Prediction Using Smartphone Sensors,
Ryan Freedman,
Master of Science Thesis, University of Illinois at Urbana-Champaign, May 2017.

Last updated on Sunday, August 6, 2017, 2:32 pm

Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks.

Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks,
Vincent Bindschaedler, Shantanu Rane, Alejandro Brito, Vanishree Rao, and Ersin Uzun.
Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY ’17), 2017.

Last updated on Sunday, November 5, 2017, 9:03 pm

Synthesizing Plausible Privacy-Preserving Location Traces.

Synthesizing Plausible Privacy-Preserving Location Traces.
Vincent Bindschaedler, and Reza Shokri.
IEEE Security & Privacy (Oakland) 2016.

Last updated on Thursday, July 28, 2016, 5:59 pm