Author of the publication

Refinement Orders for Quantitative Information Flow and Differential Privacy.

, , and . J. Cybersecur. Priv., 1 (1): 40-77 (December 2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bisimulation for Demonic Schedulers., , and . FoSSaCS, volume 5504 of Lecture Notes in Computer Science, page 318-332. Springer, (2009)Refinement Orders for Quantitative Information Flow and Differential Privacy., , and . J. Cybersecur. Priv., 1 (1): 40-77 (December 2020)Information Leakage Games: Exploring Information as a Utility Function., , , and . CoRR, (2020)Exact Optimization of Conformal Predictors via Incremental and Decremental Learning., , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 1836-1845. PMLR, (2021)Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy., , and . CSF, page 442-457. IEEE, (2019)Maritime Reporting Systems., , and . Guide to Maritime Informatics, Springer, (2021)Refinement Metrics for Quantitative Information Flow., and . The Art of Modelling Computational Systems, volume 11760 of Lecture Notes in Computer Science, page 397-416. Springer, (2019)Optimal Obfuscation Mechanisms via Machine Learning., , and . CSF, page 153-168. IEEE, (2020)Implementing clustering for vehicular ad-hoc networks in ns-3., , and . WNS3, page 25-31. ACM, (2015)F-BLEAU: Fast Black-Box Leakage Estimation., , and . IEEE Symposium on Security and Privacy, page 835-852. IEEE, (2019)