Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privately Customizing Prefinetuning to Better Match User Data in Federated Learning., , , , , , and . CoRR, (2023)Practical GAN-based synthetic IP header trace generation using NetShare., , , , and . SIGCOMM, page 458-472. ACM, (2022)Distance-Aware Private Set Intersection., , and . USENIX Security Symposium, page 319-336. USENIX Association, (2023)Privacy Requirements and Realities of Digital Public Goods., , , and . SOUPS @ USENIX Security Symposium, page 159-177. USENIX Association, (2024)CFT-Forensics: High-Performance Byzantine Accountability for Crash Fault Tolerant Protocols., , , , , , and . AFT, volume 316 of LIPIcs, page 3:1-3:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2024)Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries., , and . Proc. Priv. Enhancing Technol., 2016 (3): 41-61 (2016)Rangzen: Anonymously Getting the Word Out in a Blackout., , , , , and . CoRR, (2016)Proof of Compliance for Anonymous, Unlinkable Messages., , and . IACR Cryptol. ePrint Arch., (2023)Rumor Source Obfuscation on Irregular Trees., , , , and . SIGMETRICS, page 153-164. ACM, (2016)RareGAN: Generating Samples for Rare Classes., , , and . AAAI, page 7506-7515. AAAI Press, (2022)