Carmela Troncoso
Orcid: 0000-0002-2374-2248Affiliations:
- EPFL, Lausanne, Switzerland
According to our database1,
Carmela Troncoso
authored at least 118 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Cybersecur., January, 2024
IACR Cryptol. ePrint Arch., 2024
Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks.
CoRR, 2024
CoRR, 2024
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Proc. Priv. Enhancing Technol., October, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Transferable Adversarial Robustness for Categorical Data via Universal Robust Embeddings.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 2nd European Workshop on Algorithmic Fairness, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Nat. Comput. Sci., 2022
This is not the padding you are looking for! On the ineffectiveness of QUIC PADDING against website fingerprinting.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications.
Frontiers Digit. Health, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
Towards a common performance and effectiveness terminology for digital proximity tracing applications.
CoRR, 2020
Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign.
CoRR, 2020
Datashare: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the FAT* '20: Conference on Fairness, 2020
GenoShare: Supporting Privacy-Informed Decisions for Sharing Individual-Level Genetic Data.
Proceedings of the AMIA 2020, 2020
2019
Disparate Vulnerability: on the Unfairness of Privacy Attacks Against Machine Learning.
CoRR, 2019
CoRR, 2019
CoRR, 2019
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Symposium on Computer Science and Law, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
CoRR, 2018
CoRR, 2018
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.
ACM Trans. Priv. Secur., 2017
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments.
Proc. Priv. Enhancing Technol., 2017
Proc. Priv. Enhancing Technol., 2017
CoRR, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE/ACM Trans. Netw., 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
2014
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2014
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014
2013
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
The watchful forensic analyst: Multi-clue information fusion with background knowledge.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
2012
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012
A Least Squares approach to user profiling in pool mix-based anonymous communication systems.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Design and Analysis Methods for Privacy Technologies (Ontwerp- en analysemethodes van privacytechnologieën).
PhD thesis, 2011
IEEE Trans. Dependable Secur. Comput., 2011
Comput. Networks, 2011
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Computer Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the Computer Security, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007