Abstract is missing.
- Patient-Driven Privacy Control through Generalized DistillationZ. Berkay Celik, David Lopez-Paz, Patrick D. McDaniel. 1-12 [doi]
- LinkedIn Salary: A System for Secure Collection and Presentation of Structured Compensation Insights to Job SeekersKrishnaram Kenthapadi, Ahsan Chudhary, Stuart Ambler. 13-24 [doi]
- Privacy-Preserving Webshopping with AttributesBrinda Hampiholi, Gergely Alpár. 25-36 [doi]
- Distributed Cardinality Estimation of Set Operations with Differential PrivacyRade Stanojevic, Mohamed Nabeel, Ting Yu. 37-48 [doi]
- Achieving Secure and Differentially Private Computations in Multiparty SettingsAbbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, Patrick D. McDaniel. 49-59 [doi]
- Differential Privacy Preserving Causal Graph DiscoveryDepeng Xu, Shuhan Yuan, Xintao Wu. 60-71 [doi]
- Towards Privacy-Aware Collaborative Security: A Game-Theoretic ApproachRicheng Jin, Xiaofan He, Huaiyu Dai, Rudra Dutta, Peng Ning. 72-83 [doi]
- Measuring Personality for Automatic Elicitation of Privacy PreferencesHoda Mehrpouyan, Ion Madrazo Azpiazu, Maria Soledad Pera. 84-95 [doi]
- Secure Strategyproof Ascending-Price Spectrum AuctionJiafan Wang, Sherman S. M. Chow. 96-106 [doi]
- Streaming, Plaintext Private Information Retrieval Using Regular Expressions on Arbitrary Length Search StringsRussell A. Fink, David R. Zaret, Rachel B. Stonehirsch, Robert M. Seng, Samantha M. Tyson. 107-118 [doi]
- Hardening Distributed and Encrypted Keyword Search via BlockchainChengjun Cai, Xingliang Yuan, Cong Wang 0001. 119-128 [doi]
- Password Authenticated Keyword SearchKaibin Huang, Mark Manulis, Liqun Chen. 129-140 [doi]
- LiLAC: Lightweight Low-Latency Anonymous ChatJohn P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, Matthew Wright. 141-151 [doi]
- Privilege Leakage and Information Stealing through the Android Task MechanismYinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang, Wei Cheng. 152-163 [doi]
- ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software ExploitabilityGuanhua Yan, Junchen Lu, Zhan Shu, Yunus Kucuk. 164-175 [doi]
- A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT ApplicationsWei Li, Tianyi Song, Yingshu Li, Liran Ma, Jiguo Yu, Xiuzhen Cheng. 176-177 [doi]
- A Model-Checking Approach for Enforcing Purpose-Based Privacy PoliciesRezvan Joshaghani, Hoda Mehrpouyan. 178-179 [doi]
- A Privacy-Preserving Framework for Rank InferenceYunpeng Gao, Tong Yan, Nan Zhang. 180-181 [doi]
- Assessing Quality of Contribution in Information Sharing for Threat IntelligenceAziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. 182-183 [doi]
- DPWeka: Achieving Differential Privacy in WEKASrinidhi Katla, Depeng Xu, Yongkai Wu, Qiuping Pan, Xintao Wu. 184-185 [doi]
- Data Independent Identification for Privacy PreservationTianhang Zheng, Zhi Sun, Kui Ren 0001. 186-187 [doi]
- Defending against Speaker Fingerprinting Based Device Tracking for SmartphonesZhongjie Ba, Sixu Piao, Kui Ren 0001. 188-189 [doi]
- Distinguishing between a Driver and Passenger via a Silent SmartphoneHaihua Gong, Kai Xing, Wenwen Du. 190-191 [doi]
- Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance ApplicationsJoongheon Kim, Yeong Jong Mo, Woojoo Lee, DaeHun Nyang. 192-193 [doi]
- PaJDBC: A Transparent Privacy-Aware Database Accessing Middleware for JavaBaohua Huang, Qi Lyu, Xiaolu Cheng, Wei Cheng. 194-195 [doi]
- Personal Information Inference in Social NetworksBo Mei, Yinhao Xiao, Xiuzhen Cheng, Hong Li, Yunchuan Sun. 196-197 [doi]
- Poster: Perturbation Based Private Profile Matching in Social NetworksRuinian Li, Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Shenglin Wang, Rongfang Bie. 198-199 [doi]
- Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSsZiye Geng, Yunhua He, Tong Niu, Hong Li, Limin Sun, Wei Cheng, Xu Li. 200-201 [doi]
- Poster: Towards Fully Distributed User Authentication with BlockchainLin Zhang, Hong Li, Limin Sun, Zhiqiang Shi, Yunhua He. 202-203 [doi]
- Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image ReconstructionZihao Shan, Kui Ren 0001, Zhan Qin. 204-205 [doi]
- Towards Improving Comprehension of Touch ID Authentication with Smartphone ApplicationsYousra Javed, Mohamed Shehab. 206-207 [doi]
- Understanding the Privacy Implications of DNSSEC Look-Aside ValidationAziz Mohaisen, Zhongshu Gu, Kui Ren 0001, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang. 208-209 [doi]
- Your Neighbors are Listening: Evaluating PostMessage Use in OAuthChong Guan, Yue Li 0002, Kun Sun. 210-211 [doi]