Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption S Oya, F Kerschbaum 30th USENIX security symposium (USENIX Security 21), 127-142, 2021 | 112 | 2021 |
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms S Oya, C Troncoso, F Pérez-González Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 96 | 2017 |
Investigating membership inference attacks under data dependencies T Humphries, S Oya, L Tulloch, M Rafuse, I Goldberg, U Hengartner, ... 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 473-488, 2023 | 65* | 2023 |
Is geo-indistinguishability what you are looking for? S Oya, C Troncoso, F Pérez-González Proceedings of the 2017 on Workshop on Privacy in the Electronic Society …, 2017 | 55 | 2017 |
Obfuscated access and search patterns in searchable encryption Z Shang, S Oya, A Peter, F Kerschbaum arXiv preprint arXiv:2102.09651, 2021 | 46 | 2021 |
Do dummies pay off? limits of dummy traffic protection in anonymous communications S Oya, C Troncoso, F Pérez-González Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 41 | 2014 |
{IHOP}: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization S Oya, F Kerschbaum 31st USENIX Security Symposium (USENIX Security 22), 2407-2424, 2022 | 29 | 2022 |
Rethinking location privacy for unknown mobility behaviors S Oya, C Troncoso, F Pérez-González 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 416-431, 2019 | 25* | 2019 |
Differentially private two-party set operations B Kacsmar, B Khurram, N Lukas, A Norton, M Shafieinejad, Z Shang, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 390-404, 2020 | 23 | 2020 |
A least squares approach to the static traffic analysis of high-latency anonymous communication systems F Pérez-González, C Troncoso, S Oya IEEE Transactions on Information Forensics and Security 9 (9), 1341-1355, 2014 | 16 | 2014 |
Practical over-threshold multi-party private set intersection RA Mahdavi, T Humphries, B Kacsmar, S Krastnikov, N Lukas, ... Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 14 | 2020 |
Meet the family of statistical disclosure attacks S Oya, C Troncoso, F Pérez-González 2013 IEEE Global Conference on Signal and Information Processing, 233-236, 2013 | 13 | 2013 |
Generalization techniques empirically outperform differential privacy against membership inference J Liu, S Oya, F Kerschbaum arXiv preprint arXiv:2110.05524, 2021 | 8 | 2021 |
Fast and private inference of deep neural networks by co-designing activation functions A Diaa, L Fenaux, T Humphries, M Dietz, F Ebrahimianghazani, ... 33rd USENIX Security Symposium (USENIX Security 24), 2191-2208, 2024 | 3 | 2024 |
A statistical approach to the design of privacy-preserving services SO Díez Universidade de Vigo, 2019 | 3 | 2019 |
Understanding the effects of real-world behavior in statistical disclosure attacks S Oya, C Troncoso, F Pérez-González 2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014 | 3 | 2014 |
Do Dummies Pay Off S Oya, C Troncoso, F Pérez-González Limits of Dummy Traffic Protection in Anonymous Communications. Available …, 0 | 3 | |
Design of pool mixes against profiling attacks in real conditions S Oya, F Pérez-González, C Troncoso IEEE/ACM Transactions on Networking 24 (6), 3662-3675, 2016 | 1 | 2016 |
Technical report for id tnet-2015-00294” optimal delay characteristic when the number of users is comparable to the number of rounds”,” S Oya, F Pérez-González, C Troncoso TechRepToN2016. pdf, 2016 | 1 | 2016 |
Technical report tsc/fpg/20032014: Performance analysis of the least squares disclosure attack with time-varying user behavior F Pérez-González, C Troncoso, S Oya FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack …, 2014 | 1 | 2014 |