Model extraction attack is one of the most prominent adversarial techniq...
Individuals are encouraged to prove their eligibility to access specific...
Consider two data holders, ABC and XYZ, with graph data (e.g., social
ne...
With the rapid development of technology in genome-related fields,
resea...
Location-based services have brought significant convenience to people i...
Database fingerprinting has been widely used to discourage unauthorized
...
Proximity-based contact tracing relies on user device interaction to est...
With the reduction of sequencing costs and the pervasiveness of computin...
Motivation: Cutting the cost of DNA sequencing technology led to a quant...
When sharing sensitive databases with other parties, a database owner ai...
With the increasing affordability and availability of patient data, hosp...
Motivation: Researchers need a rich trove of genomic datasets that they ...
Database fingerprinting schemes have been widely adopted to prevent
unau...
Privacy-preserving genomic data sharing is prominent to increase the pac...
Providing provenance in scientific workflows is essential for reproducib...
Anonymous data sharing has been becoming more challenging in today's
int...
In this work, we study the privacy risk due to profile matching across o...
Today, tracking and controlling the spread of a virus is a crucial need ...
In order to receive personalized services, individuals share their perso...
Sharing genome data in a privacy-preserving way stands as a major bottle...
In this paper, we attempt to provide a privacy-preserving and efficient
...
Large-scale datasets play a fundamental role in training deep learning
m...
A one-time program (OTP) works as follows: Alice provides Bob with the
i...
Today, vast amounts of location data are collected by various service
pr...
In this work, we propose a profile matching (or deanonymization) attack ...