Mário S. Alvim

Orcid: 0000-0002-4196-7467

Affiliations:
  • Federal University of Minas Gerais, Belo Horizonte, Brazil


According to our database1, Mário S. Alvim authored at least 61 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Opinion Update in a Subjective Logic Model for Social Networks.
CoRR, 2024

A Multi-Agent Model for Opinion Evolution under Cognitive Biases.
CoRR, 2024

Formal Privacy Analyses for Open Banking.
Proceedings of the Formal Methods: Foundations and Applications - 27th Brazilian Symposium, 2024

A Multi-agent Model for Opinion Evolution in Social Networks Under Cognitive Biases.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2024

The Privacy-Utility Trade-off in the Topics API.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A Formal Model for Polarization under Confirmation Bias in Social Networks.
Log. Methods Comput. Sci., 2023

A Quantitative Information Flow Analysis of the Topics API.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information Flow.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Information Leakage Games: Exploring Information as a Utility Function.
ACM Trans. Priv. Secur., 2022

A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study.
Proc. Priv. Enhancing Technol., 2022

Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata.
Proc. Priv. Enhancing Technol., 2022

How to build high quality L2R training data: Unsupervised compression-based selective sampling for learning to rank.
Inf. Sci., 2022

2021
The Impact of Stationarity, Regularity, and Context on the Predictability of Individual Human Mobility.
ACM Trans. Spatial Algorithms Syst., 2021

A Multi-agent Model for Polarization Under Confirmation Bias in Social Networks.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2021

2020
The Science of Quantitative Information Flow.
Information Security and Cryptography, Springer, ISBN: 978-3-319-96131-6, 2020

Catuscia Palamidessi: a journey from logic and concurrency to security and privacy.
ACM SIGLOG News, 2020

Exploiting semantic relationships for unsupervised expansion of sentiment lexicons.
Inf. Syst., 2020

Polarization and Belief Convergence of Agents in Strongly-Connected Influence Graphs.
CoRR, 2020

BrazilDAM: A Benchmark dataset for Tailings Dam Detection.
CoRR, 2020

On Privacy and Accuracy in Data Releases (Invited Paper).
Proceedings of the 31st International Conference on Concurrency Theory, 2020

2019
An axiomatization of information flow measures.
Theor. Comput. Sci., 2019

Deciphering Predictability Limits in Human Mobility.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

A Probabilistic Algorithm to Predict Missing Facts from Knowledge Graphs.
Proceedings of the Database and Expert Systems Applications, 2019

Toward a Formal Model for Group Polarization in Social Networks.
Proceedings of the Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 2019

2018
Information-Driven Rapidly-Exploring Random Tree for Efficient Environment Exploration.
J. Intell. Robotic Syst., 2018

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
Entropy, 2018

A Comparative Study on Unsupervised Domain Adaptation Approaches for Coffee Crop Mapping.
CoRR, 2018

Metric-based local differential privacy for statistical applications.
CoRR, 2018

Leakage and Protocol Composition in a Game-Theoretic Perspective.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

On the Predictability of a User's Next Check-in Using Data from Different Social Networks.
Proceedings of the 2nd ACM SIGSPATIAL Workshop on Prediction of Human Mobility, 2018

An Algebraic Approach for Reasoning About Information Flow.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

A Comparative Study on Unsupervised Domain Adaptation for Coffee Crop Mapping.
Proceedings of the Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 2018

PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Quantifying vulnerability of secret generation using hyper-distributions (extended version).
CoRR, 2017

Proof-Carrying Sensing: Towards Real-World Authentication in Cyber-Physical Systems.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Formal Analysis of the Information Leakage of the DC-Nets and Crowds Anonymity Protocols.
Proceedings of the Formal Methods: Foundations and Applications - 20th Brazilian Symposium, 2017

Quantifying Vulnerability of Secret Generation Using Hyper-Distributions.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

Modeling Information Flow in Dynamic Information Retrieval.
Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval, 2017

Information Leakage Games.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Axioms for Information Leakage.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Compression-Based Selective Sampling for Learning to Rank.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
On the information leakage of differentially-private mechanisms.
J. Comput. Secur., 2015

2014
Quantifying Information Flow for Dynamic Secrets.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

When Not All Bits Are Equal: Worth-Based Information Flow.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Additive and Multiplicative Notions of Leakage, and Their Capacities.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Computational Aspects of the Calculus of Structure
CoRR, 2013

2012
Quantitative information flow in interactive systems.
J. Comput. Secur., 2012

Measuring Information Leakage Using Generalized Gain Functions.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Formal approaches to information hiding : An analysis of interactive systems, statistical disclosure control, and refinement of specifications. (Des approches formelles pour le cachement d'information: Une analyse des systèmes interactifs, contrôle de divulgation statistique, et le raffinement des spécifications).
PhD thesis, 2011

Formal approaches to information hiding: An analysis of interactive systems, statistical disclosure control, and refinement of specifications.
CoRR, 2011

Differential Privacy: On the Trade-Off between Utility and Information Leakage.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

On the Relation between Differential Privacy and Quantitative Information Flow.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Quantitative Information Flow and Applications to Differential Privacy.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

2010
Differential Privacy versus Quantitative Information Flow
CoRR, 2010

Probabilistic Information Flow.
Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, 2010

Safe Equivalences for Security Properties.
Proceedings of the Theoretical Computer Science, 2010

Entropy and Attack Models in Information Flow - (Invited Talk).
Proceedings of the Theoretical Computer Science, 2010

Interactive Information Flow - (Invited Talk).
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Information Flow in Interactive Systems.
Proceedings of the CONCUR 2010 - Concurrency Theory, 21th International Conference, 2010


  Loading...