Model extraction attack is one of the most prominent adversarial techniq...
With privacy legislation empowering users with the right to be forgotten...
Proximity-based contact tracing relies on user device interaction to est...
With the reduction of sequencing costs and the pervasiveness of computin...
Providing provenance in scientific workflows is essential for reproducib...
Anonymous data sharing has been becoming more challenging in today's
int...
In this work, we study the privacy risk due to profile matching across o...
In this work, we propose a profile matching (or deanonymization) attack ...