Mohamed Maouche

According to our database1, Mohamed Maouche authored at least 15 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Differentially private and decentralized randomized power method.
CoRR, 2024

Synthetic Data: Generate Avatar Data on Demand.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

2023
Differentially Private Speaker Anonymization.
Proc. Priv. Enhancing Technol., January, 2023

Community Detection Attack against Collaborative Learning-based Recommender Systems.
CoRR, 2023

Towards an evolution in the characterization of the risk of re-identification of medical images.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Privacy and Utility of X-Vector Based Speaker Anonymization.
IEEE ACM Trans. Audio Speech Lang. Process., 2022

The VoicePrivacy 2020 Challenge: Results and findings.
Comput. Speech Lang., 2022

Enhancing Speech Privacy with Slicing.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

2020
Design Choices for X-Vector Based Speaker Anonymization.
Proceedings of the 21st Annual Conference of the International Speech Communication Association, 2020

A Comparative Study of Speech Anonymization Metrics.
Proceedings of the 21st Annual Conference of the International Speech Communication Association, 2020

2019
Protection against re-identification attacks in location privacy. (Préservation contre les attaques de ré-identification sur des données de mobilité).
PhD thesis, 2019

MooD: MObility Data Privacy as Orphan Disease: Experimentation and Deployment Paper.
Proceedings of the 20th International Middleware Conference, 2019

2018
HMC: Robust Privacy Protection of Mobility Data against Multiple Re-Identification Attacks.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

ACCIO: How to Make Location Privacy Experimentation Open and Easy.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2017
AP-Attack: A Novel User Re-identification Attack On Mobility Datasets.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017


  Loading...