Follow
Simon Oya
Simon Oya
Verified email at ece.ubc.ca - Homepage
Title
Cited by
Cited by
Year
Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption
S Oya, F Kerschbaum
30th USENIX security symposium (USENIX Security 21), 127-142, 2021
1122021
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms
S Oya, C Troncoso, F Pérez-González
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
962017
Investigating membership inference attacks under data dependencies
T Humphries, S Oya, L Tulloch, M Rafuse, I Goldberg, U Hengartner, ...
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 473-488, 2023
65*2023
Is geo-indistinguishability what you are looking for?
S Oya, C Troncoso, F Pérez-González
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society …, 2017
552017
Obfuscated access and search patterns in searchable encryption
Z Shang, S Oya, A Peter, F Kerschbaum
arXiv preprint arXiv:2102.09651, 2021
462021
Do dummies pay off? limits of dummy traffic protection in anonymous communications
S Oya, C Troncoso, F Pérez-González
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
412014
{IHOP}: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization
S Oya, F Kerschbaum
31st USENIX Security Symposium (USENIX Security 22), 2407-2424, 2022
292022
Rethinking location privacy for unknown mobility behaviors
S Oya, C Troncoso, F Pérez-González
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 416-431, 2019
25*2019
Differentially private two-party set operations
B Kacsmar, B Khurram, N Lukas, A Norton, M Shafieinejad, Z Shang, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 390-404, 2020
232020
A least squares approach to the static traffic analysis of high-latency anonymous communication systems
F Pérez-González, C Troncoso, S Oya
IEEE Transactions on Information Forensics and Security 9 (9), 1341-1355, 2014
162014
Practical over-threshold multi-party private set intersection
RA Mahdavi, T Humphries, B Kacsmar, S Krastnikov, N Lukas, ...
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
142020
Meet the family of statistical disclosure attacks
S Oya, C Troncoso, F Pérez-González
2013 IEEE Global Conference on Signal and Information Processing, 233-236, 2013
132013
Generalization techniques empirically outperform differential privacy against membership inference
J Liu, S Oya, F Kerschbaum
arXiv preprint arXiv:2110.05524, 2021
82021
Fast and private inference of deep neural networks by co-designing activation functions
A Diaa, L Fenaux, T Humphries, M Dietz, F Ebrahimianghazani, ...
33rd USENIX Security Symposium (USENIX Security 24), 2191-2208, 2024
32024
A statistical approach to the design of privacy-preserving services
SO Díez
Universidade de Vigo, 2019
32019
Understanding the effects of real-world behavior in statistical disclosure attacks
S Oya, C Troncoso, F Pérez-González
2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014
32014
Do Dummies Pay Off
S Oya, C Troncoso, F Pérez-González
Limits of Dummy Traffic Protection in Anonymous Communications. Available …, 0
3
Design of pool mixes against profiling attacks in real conditions
S Oya, F Pérez-González, C Troncoso
IEEE/ACM Transactions on Networking 24 (6), 3662-3675, 2016
12016
Technical report for id tnet-2015-00294” optimal delay characteristic when the number of users is comparable to the number of rounds”,”
S Oya, F Pérez-González, C Troncoso
TechRepToN2016. pdf, 2016
12016
Technical report tsc/fpg/20032014: Performance analysis of the least squares disclosure attack with time-varying user behavior
F Pérez-González, C Troncoso, S Oya
FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20