Olga Ohrimenko
Orcid: 0000-0002-9735-0538Affiliations:
- University of Melbourne, Australia
- Microsoft Research (former)
According to our database1,
Olga Ohrimenko
authored at least 72 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Combining Classical and Probabilistic Independence Reasoning to Verify the Security of Oblivious Algorithms (Extended Version).
CoRR, 2024
CoRR, 2024
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget.
CoRR, 2024
Combining Classical and Probabilistic Independence Reasoning to Verify the Security of Oblivious Algorithms.
Proceedings of the Formal Methods - 26th International Symposium, 2024
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Artif. Intell., October, 2023
IEEE Pervasive Comput., 2023
RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers via Randomized Deletion.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023
2022
CoRR, 2022
CoRR, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Randomize the Future: Asymptotically Optimal Locally Private Frequency Estimation Protocol for Longitudinal Data.
Proceedings of the PODS '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces.
CoRR, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
CoRR, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Verifying the consistency of remote untrusted services with conflict-free operations.
Inf. Comput., 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
2017
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2017
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory.
Proceedings of the 26th USENIX Security Symposium, 2017
2016
Proc. Priv. Enhancing Technol., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
PhD thesis, 2014
IACR Cryptol. ePrint Arch., 2014
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Principles of Distributed Systems - 18th International Conference, 2014
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014
2013
Computer Security.
Proceedings of the Handbook on Graph Drawing and Visualization., 2013
Proceedings of the 21st SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2013
2012
Proc. VLDB Endow., 2012
Inf. Process. Lett., 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, 2012
Graph Drawing in the Cloud: Privately Visualizing Relational Data Using Small Working Storage.
Proceedings of the Graph Drawing - 20th International Symposium, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
2009
2008
Proceedings of the Theory of Computing 2008. Proc. Fourteenth Computing: The Australasian Theory Symposium (CATS 2008), 2008
2007
Proceedings of the Principles and Practice of Constraint Programming, 2007