default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2018
- Wei Bao, Qinghua Li:
Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric Programming. PAC 2018: 55-63 - Yongle Chen, Bingchu Jin, Dan Yu, Junjie Chen:
Malware Variants Detection Using Behavior Destructive Features. PAC 2018: 121-122 - Benjamin Johnson, Paul Laskowski:
Privacy, Polarization, and Passage of Divisive Laws. PAC 2018: 1-9 - Tae Wan Kim, Bryan R. Routledge:
Informational Privacy, A Right to Explanation, and Interpretable AI. PAC 2018: 64-74 - Nitin Kohli, Paul Laskowski:
Epsilon Voting: Mechanism Design for Parameter Selection in Differential Privacy. PAC 2018: 19-30 - Yunus Kucuk, Nikhil Patil, Zhan Shu, Guanhua Yan:
BigBing: Privacy-Preserving Cloud-Based Malware Classification Service. PAC 2018: 43-54 - Ang Li, David Darling, Qinghua Li:
PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones. PAC 2018: 10-18 - Wei Li, Chunqiang Hu, Tianyi Song, Jiguo Yu, Xiaoshuang Xing, Zhipeng Cai:
Privacy-Preserving Data Collection in Context-Aware Applications. PAC 2018: 75-85 - Jianqing Liu, Yaodan Hu, Hao Yue, Yanmin Gong, Yuguang Fang:
A Cloud-Based Secure and Privacy-Preserving Clustering Analysis of Infectious Disease. PAC 2018: 107-116 - Moses Namara, Henry Sloan, Priyanka Jaiswal, Bart P. Knijnenburg:
The Potential for User-Tailored Privacy on Facebook. PAC 2018: 31-42 - Yuwen Pu, Jin Luo, Ying Wang, Chunqiang Hu, Yan Huo, Jiong Zhang:
Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach. PAC 2018: 125-126 - Frederic Raber, Antonio Krüger:
Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice? PAC 2018: 86-94 - Harsimran Singh, Shamik Sarkar, Anuj Dimri, Aditya Bhaskara, Neal Patwari, Sneha Kumar Kasera, Samuel Ramirez, Kurt Derr:
Privacy Enabled Crowdsourced Transmitter Localization Using Adjusted Measurements. PAC 2018: 95-106 - Shiwen Wang, Hui Xia:
A Reputation Management Framework for MANETs. PAC 2018: 119-120 - Xiwei Wang, Hao Yang, Kiho Lim:
Privacy-Preserving POI Recommendation Using Nonnegative Matrix Factorization. PAC 2018: 117-118 - Zhonghu Xu, Kai Xing, Xuefeng Liu, Jiannong Cao:
Backward Thinking of Routing with High Uncertainties: Causal Entropy Based Routing in Multi-Agent Networks. PAC 2018: 123-124 - 2018 IEEE Symposium on Privacy-Aware Computing, PAC 2018, Washington, DC, USA, September 26-28, 2018. IEEE 2018, ISBN 978-1-5386-8442-9 [contents]
- 2017
- Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel:
Achieving Secure and Differentially Private Computations in Multiparty Settings. PAC 2017: 49-59 - Zhongjie Ba, Sixu Piao, Kui Ren:
Defending against Speaker Fingerprinting Based Device Tracking for Smartphones. PAC 2017: 188-189 - Chengjun Cai, Xingliang Yuan, Cong Wang:
Hardening Distributed and Encrypted Keyword Search via Blockchain. PAC 2017: 119-128 - Z. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel:
Patient-Driven Privacy Control through Generalized Distillation. PAC 2017: 1-12 - Russell A. Fink, David R. Zaret, Rachel B. Stonehirsch, Robert M. Seng, Samantha M. Tyson:
Streaming, Plaintext Private Information Retrieval Using Regular Expressions on Arbitrary Length Search Strings. PAC 2017: 107-118 - Yunpeng Gao, Tong Yan, Nan Zhang:
A Privacy-Preserving Framework for Rank Inference. PAC 2017: 180-181 - Ziye Geng, Yunhua He, Tong Niu, Hong Li, Limin Sun, Wei Cheng, Xu Li:
Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs. PAC 2017: 200-201 - Haihua Gong, Kai Xing, Wenwen Du:
Distinguishing between a Driver and Passenger via a Silent Smartphone. PAC 2017: 190-191 - Chong Guan, Yue Li, Kun Sun:
Your Neighbors are Listening: Evaluating PostMessage Use in OAuth. PAC 2017: 210-211 - Brinda Hampiholi, Gergely Alpár:
Privacy-Preserving Webshopping with Attributes. PAC 2017: 25-36 - Baohua Huang, Qi Lyu, Xiaolu Cheng, Wei Cheng:
PaJDBC: A Transparent Privacy-Aware Database Accessing Middleware for Java. PAC 2017: 194-195 - Kaibin Huang, Mark Manulis, Liqun Chen:
Password Authenticated Keyword Search. PAC 2017: 129-140 - Yousra Javed, Mohamed Shehab:
Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications. PAC 2017: 206-207
skipping 21 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-24 09:08 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint