Gergely Acs
Gergely Acs
Research Engineer, INRIA
在 inria.fr 的电子邮件经过验证
标题
引用次数
引用次数
年份
I have a dream!(differentially private smart metering)
G Ács, C Castelluccia
International Workshop on Information Hiding, 118-132, 2011
3912011
Provably secure on-demand source routing in mobile ad hoc networks
G Acs, L Buttyan, I Vajda
IEEE transactions on Mobile Computing 5 (11), 1533-1546, 2006
3132006
Differentially private sequential data publication via variable-length n-grams
R Chen, G Acs, C Castelluccia
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2572012
You are what you like! information leakage through users’ interests
A Chaabane, G Acs, MA Kaafar
Proceedings of the 19th annual network & distributed system security …, 2012
1602012
Differentially private histogram publishing through lossy compression
G Acs, C Castelluccia, R Chen
2012 IEEE 12th International Conference on Data Mining, 1-10, 2012
1552012
Cache privacy in named-data networking
G Acs, M Conti, P Gasti, C Ghali, G Tsudik
2013 IEEE 33rd International Conference on Distributed Computing Systems, 41-51, 2013
1222013
A case study: Privacy preserving release of spatio-temporal density in paris
G Acs, C Castelluccia
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
1002014
Differentially private mixture of generative neural networks
G Acs, L Melis, C Castelluccia, E De Cristofaro
IEEE Transactions on Knowledge and Data Engineering 31 (6), 1109-1121, 2018
812018
A taxonomy of routing protocols for wireless sensor networks
G Acs, L Buttyán
BUTE Telecommunication department, 32-40, 2007
682007
Provable security of on-demand distance vector routing in wireless ad hoc networks
G Ács, L Buttyán, I Vajda
European Workshop on Security in Ad-hoc and Sensor Networks, 113-127, 2005
672005
Modelling adversaries and security objectives for routing protocols in wireless sensor networks
G Acs, L Buttyán, I Vajda
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
492006
On the unicity of smartphone applications
JP Achara, G Acs, C Castelluccia
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 27-36, 2015
402015
Privacy-aware caching in information-centric networking
G Acs, M Conti, P Gasti, C Ghali, G Tsudik, CA Wood
IEEE Transactions on Dependable and Secure Computing 16 (2), 313-328, 2017
372017
The security proof of a link-state routing protocol for wireless sensor networks
G Acs, L Buttyán, I Vajda
2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, 1-6, 2007
222007
The pitfalls of hashing for privacy
L Demir, A Kumar, M Cunche, C Lauradoux
IEEE Communications Surveys & Tutorials 20 (1), 551-565, 2017
182017
Dream: Differentially private smart metering
G Acs, C Castelluccia
arXiv preprint arXiv:1201.2531, 2012
172012
Near-optimal fingerprinting with constraints
GG Gulyas, G Acs, C Castelluccia
arXiv preprint arXiv:1605.08664, 2016
162016
Misbehaving router detection in link-state routing for wireless mesh networks
G Acs, L Buttyán, L Dóra
2010 IEEE International Symposium on" A World of Wireless, Mobile and …, 2010
152010
Extracting vehicle sensor signals from CAN logs for driver re-identification
S Lestyan, G Acs, G Biczók, Z Szalay
arXiv preprint arXiv:1902.08956, 2019
122019
Secure routing in multi-hop wireless networks
G Ács
Budapesti Műszaki és Gazdaságtudományi Egyetem, 2009
122009
系统目前无法执行此操作,请稍后再试。
文章 1–20