Florian Kerschbaum
Orcid: 0000-0003-4288-2286Affiliations:
- University of Waterloo, ON, Canada
According to our database1,
Florian Kerschbaum
authored at least 201 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. VLDB Endow., April, 2024
FastLloyd: Federated, Accurate, Secure, and Tunable k-Means Clustering with Differential Privacy.
CoRR, 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
2023
Proc. ACM Manag. Data, December, 2023
Proc. Priv. Enhancing Technol., October, 2023
Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates.
Proc. Priv. Enhancing Technol., October, 2023
Proc. VLDB Endow., 2023
Found. Trends Priv. Secur., 2023
Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks against Deep Image Classification.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
ACM Trans. Priv. Secur., 2022
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
DP-VAE: Human-Readable Text Anonymization for Online Reviews with Differentially Private Variational Autoencoders.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization.
Proceedings of the 31st USENIX Security Symposium, 2022
Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Assessing Differentially Private Variational Autoencoders Under Membership Inference.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Quantifying identifiability to choose and audit epsilon in differentially private deep learning.
Proc. VLDB Endow., 2021
IACR Cryptol. ePrint Arch., 2021
Generalization Techniques Empirically Outperform Differential Privacy against Membership Inference.
CoRR, 2021
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version).
CoRR, 2021
Quantifying identifiability to choose and audit ε in differentially private deep learning.
CoRR, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 International Conference on Management of Data, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proc. Priv. Enhancing Technol., 2019
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Proc. IEEE, 2018
J. Comput. Secur., 2018
Proceedings of the 2018 International Conference on Management of Data, 2018
SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018
2017
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Dagstuhl Reports, 2014
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the IEEE International Congress on Big Data, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012
Proceedings of the International Conference on Information Systems, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
2011
Sicheres und nachhaltiges Benchmarking in der Cloud - Eine Mehrparteien-Cloud-Anwendung ohne vertrauenswürdigen Dienstanbieter.
Wirtschaftsinf., 2011
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation.
IACR Cryptol. ePrint Arch., 2011
Secure collaborative supply chain planning and inverse optimization - The JELS model.
Eur. J. Oper. Res., 2011
Secure and Sustainable Benchmarking in Clouds - A Multi-Party Cloud Application with an Untrusted Service Provider.
Bus. Inf. Syst. Eng., 2011
Proceedings of the ICPE'11, 2011
Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the IEEE International Conference on Web Services, 2011
Proceedings of the International Conference on Information Systems, 2011
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
2009
J. Univers. Comput. Sci., 2009
J. Syst. Archit., 2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Risk-Aware Secure Supply Chain Master Planning.
Proceedings of the Security in Information Systems, 2009
On the practical importance of communication complexity for secure multi-party computation protocols.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09).
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009
Proceedings of the Database and Expert Systems Applications, 2009
Improving Practical Performance on Secure and Private Collaborative Linear Programming.
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Enterp. Inf. Syst., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
A New Way to Think About Secure Computation: Language-based Secure Computation.
Proceedings of the Security in Information Systems, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007
2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the Data and Applications Security XX, 2006
2004
Proceedings of the Biometric Authentication, First International Conference, 2004
2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
2002
J. Comput. Secur., 2002
2001
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals.
Comput. Secur., 2001
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation.
Proceedings of the Information Hiding, 4th International Workshop, 2001