Distributed and Secure ML with Self-tallying Multi-party Aggregation

Distributed and Secure ML with Self-tallying Multi-party Aggregation,
Yunhui Long, Tanmay Gangwani, Muhammad Haris Mughees, and Carl A. Gunter.
NeurIPS Workshop on Privacy Preserving Machine Learning, Montréal, Canada, December 2018. [VIDEO]

Last updated on Monday, May 20, 2019, 8:11 pm

Analysis of Bluetooth Low Energy Beacons in Indoor Localization Policy and Application

Analysis of Bluetooth Low Energy Beacons in Indoor Localization Policy and Application,
Jerry R. Guo.
Master of Science Thesis, University of Illinois at Urbana-Champaign, December, 2018.

Last updated on Sunday, December 9, 2018, 8:58 am

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System,
Bo Chen, Klara Nahrstedt, and Carl A. Gunter.
ACM Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ’18), November, 2018, New York, NY.

Last updated on Sunday, December 9, 2018, 8:47 am

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System.
Bo Chen, Klara Nahrstedt, and Carl Gunter. 2018.
EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous ’18), New York, NY, November 2018,

Last updated on Sunday, May 23, 2021, 9:05 am

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations,
Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, and Nikita Borisov.
ACM Computer and Communications Security (CCS ’18), Toronto Canada, October 2018.

Last updated on Saturday, August 25, 2018, 12:15 pm

NRF: A Naive Re-identification Framework

NRF: A Naive Re-identification Framework,
Shubhra Kanti, Karmaker Santu, Vincent Bindschadler, ChengXiang Zhai, and Carl A. Gunter.
ACM Workshop on Privacy in an Electronic Society (WPES ’18), Toronto, Canada, October 2018.

Last updated on Saturday, August 25, 2018, 12:11 pm

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter.
USENIX Security, Baltimore, MD, 2018.

Last updated on Saturday, May 22, 2021, 6:25 pm

AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance

AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance,
Tianyuan Liu, Avesta Hojjati, Adam Bates, and Klara Nahrstedt.
IEEE ICDCS 2018, 38th IEEE International Conference on Distributed Computing Systems, July 2018, Vienna, Austria.

Last updated on Sunday, December 9, 2018, 8:48 am

Privacy-Preserving Seedbased Data Structures

Privacy-Preserving Seedbased Data Structures,
Vincent Bindschaedler.
Doctoral Dissertation, University of Illinois at Urbana-Champaign, July 2018.

Last updated on Saturday, August 25, 2018, 12:05 pm

De facto diagnosis specialties: Recognition and discovery

De Facto Diagnosis Specialties: Recognition and Discovery,
Aston Zhang, Xun Lu, Carl A. Gunter, Shuochao Yao, Fangbo Tao, Rongda Zhu, Huan Gui, Daniel Fabbri, David Liebovitz, and Bradley Malin.
Learning Health Systems, 2018:e10057, 2018.

Last updated on Saturday, June 9, 2018, 3:05 pm