Melek Önen
Orcid: 0000-0003-0269-9495Affiliations:
- Eurecom, Sophia Antipolis, France
According to our database1,
Melek Önen
authored at least 106 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on eurecom.fr
On csauthors.net:
Bibliography
2024
ACM Comput. Surv., March, 2024
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Client Stragglers.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Enhancing Privacy in Federated Learning: Secure Aggregation for Real-World Healthcare Applications.
CoRR, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Privacy in Statistical Databases - International Conference, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 60th Annual Allerton Conference on Communication, 2024
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Stragglers.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation.
Proc. Priv. Enhancing Technol., October, 2023
Proc. Priv. Enhancing Technol., January, 2023
Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†.
Secur. Priv., 2023
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth.
IACR Cryptol. ePrint Arch., 2023
Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication.
IACR Cryptol. ePrint Arch., 2023
Fed-BioMed: Open, Transparent and Trusted Federated Learning for Real-world Healthcare Applications.
CoRR, 2023
Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
J. Cybersecur. Priv., October, 2022
IACR Cryptol. ePrint Arch., 2022
Funshade: Functional Secret Sharing for Two-Party Secure Thresholded Distance Evaluation.
IACR Cryptol. ePrint Arch., 2022
Adversarial Classification under Gaussian Mechanism: Calibrating the Attack to Sensitivity.
CoRR, 2022
Proceedings of the Privacy in Statistical Databases - International Conference, 2022
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the IEEE Information Theory Workshop, 2021
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects.
SN Comput. Sci., 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network Predictions.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 1st IEEE/ACM International Workshop on Software Engineering for AI in Autonomous Systems, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the CLOSER 2014, 2014
Proceedings of the Cloud Computing and Services Sciences, 2014
2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013
2012
Int. J. Commun. Networks Distributed Syst., 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks.
Proceedings of the Fifth Workshop on Social Network Systems, 2012
2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the IEEE 22nd International Symposium on Personal, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Global Communications Conference, 2011
2010
Comput. Commun., 2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
2009
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the Wireless Sensor Networks, 2007
2006
Proceedings of IEEE International Conference on Communications, 2006
2004
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004