LATEST PUBLICATIONS

Article

Linearly homomorphic structure-preserving signatures and their applications

, Thomas Peters, , Moti Yung

Designs, Codes and Cryptography
December 01, 2015
Compactly hiding linear spans: Tightly secure constant-size simulation-sound QA-NIZK proofs and applications

, Thomas Peters, , Moti Yung

ASIACRYPT 2015
November 29, 2015
Optimal greedy diversity for recommendation

Azin Ashkan, Branislav Kveton, Shlomo Berkovsky, Zheng Wen

IJCAI 2015
July 25, 2015
Cascading bandits: Learning to rank in the cascade model

Branislav Kveton, Csaba Szepesvári, Zheng Wen, Azin Ashkan

32nd International Conference on Machine Learning
July 06, 2015
Efficient learning in large-scale combinatorial semi-bandits

Zheng Wen, Branislav Kveton, Azin Ashkan

32nd International Conference on Machine Learning
July 06, 2015
Consistent estimation of dynamic and multi-layer block models

Qiuyi Han, Kevin S. Xu, Edoardo M. Airoldi

32nd International Conference on Machine Learning
July 06, 2015
PriView: Personalized media consumption meets privacy against inference attacks

Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Amy Zhang

IEEE Software
June 30, 2015
Privacy-utility trade-off under continual observation

Murat Erdogdu, Nadia Fawaz

ISIT 2015
June 14, 2015
Managing your private and public data: Bringing down inference attacks against your privacy

Salman Salamatian, Amy Zhang, Flávio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft

IEEE Journal of Selected Topics in Signal Processing
June 05, 2015
GraphSC: Parallel Secure Computation Made Easy

Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi

36th IEEE Symposium on Security and Privacy
May 18, 2015
Tight regret bounds for stochastic combinatorial semi-bandits

Branislav Kveton, Zheng Wen, Azin Ashkan, Csaba Szepesvári

AISTATS 2015
May 09, 2015
Characterizing mobile user habits: The case for energy budgeting

Ramanujan K. Sheshadri, , , Dimitrios Koutsonikolas, Anna Kaisa Pietilainen, , Jaideep Chandrashekar

18th IEEE Global Internet Symposium (GI 2015)
April 27, 2015
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model

, , Moti Yung, Thomas Peters

18th International Workshop on Practice and Theory in Public Key Cryptography
March 30, 2015
The Distributions of Individual Bits in the Output of Multiplicative Operations

Michael Tunstall,

Cryptography and Communications
March 01, 2015
Privacy-utility trade-off for time-series with application to smart-meter data

Murat Erdogdu, Nadia Fawaz, Andrea Montanari

Workshop on Computational Sustainability
January 25, 2015
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security

, , Moti Yung, Thomas Peters

20th International Conference on the Theory and Application of Cryptology and Information Security
December 07, 2014
Matroid Bandits: Practical Large-Scale Combinatorial Bandits

Branislav Kveton, Zheng Wen, Azin Ashkan, Hoda Eydgahi

AAAI 2014 Workshop
July 27, 2014
Large-Scale Optimistic Adaptive Submodularity

Victor Gabillon, Branislav Kveton, Zheng Wen, Brian Eriksson, S. Muthukrishnan

AAAI 2014
July 27, 2014
Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold Signatures with Short Shares

, , Moti Yung

33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014)
July 15, 2014
Privacy Tradeoffs in Predictive Analytics

Stratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, Nina Taft

International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS)
June 24, 2014
Spectral Bandits for Smooth Graph Functions

Michal Valko, Remi Munos, Branislav Kveton, Tomas Kocak

ICML 2014
June 21, 2014
PriView: Media Consumption and Recommendation Meet Privacy Against Inference Attacks

Amy Zhang, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton

W2SP 2014
May 18, 2014
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures

, Thomas Peters, , Moti Yung

33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2014)
May 11, 2014
Budget Feasible Mechanisms for Experimental Design

Thibaut Horel, Stratis Ioannidis, S Muthukrishnan

Latin American Theoretical Informatics (LATIN)
April 03, 2014
Privacy Auctions for Recommender Systems

Pranav Dandekar, Nadia Fawaz, Stratis Ioannidis.

ACM Transactions on Economics and Computation (TEAC)
March 26, 2014
Traceable Group Encryption

, Moti Yung, , Thomas Peters

17th IACR International Conference on Practice and Theory of Public-Key Cryptography
March 26, 2014
Group Signatures with Message-Dependent Opening in the Standard Model

,

RSA Conference 2014 - Cryptographers' Track
February 24, 2014
RiskRoute: A Framework for Mitigating Network Outage Threats

Brian Eriksson, Ramakrishnan Durairajan, Paul Barford

ACM CoNext 2013
December 17, 2013
Linear Regression as a Non-Cooperative Game

Stratis Ioannidis, Patrick Loiseau

Web and Internet Economics (WINE)
December 06, 2013
Adaptive Submodular Maximization in Bandit Setting

Victor Gabillon, Branislav Kveton, Zheng Wen, Brian Eriksson, S. Muthukrishnan

NIPS 2013
December 05, 2013
How to Hide the Elephant– or the Donkey– in the Room: Practical Privacy Against Statistical Inference for Large Data

Salman Salamatian, Amy Zhang, Flavio du Pin Calmon, Sandilya Bhamidipati, Nadia Fawaz, Branislav Kveton, Pedro Oliveira, Nina Taft

IEEE Global Conference on Signal and Information Processing (GlobalSIP)
December 05, 2013
AdReveal: Improving Transparency Into Online Targeted Advertising

Bin Liu, Anmol Sheth, Udi Weinsberg, Jaideep Chandrashekar, Ramesh Govindan

Hotnets 2013
November 21, 2013
Privacy-preserving matrix factorization

Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, , Nina Taft, Dan Boneh

20th ACM Conference on Computer and Communications Security
November 04, 2013
Privacy-Utility Trade-Off under Statistical Uncertainty

Ali Makhdoumi, Nadia Fawaz

ALLERTON 2013
October 02, 2013
Nearly Optimal Private Convolution

Nadia Fawaz, S. Muthukrishnan, Aleksandar Nikolov

European Symposium on Algorithms, ESA 2013
September 02, 2013
Minimal Interaction Search: Multi-Way Search with Item Categories

Sandilya Bhamidipati, Branislav Kveton, S. Muthukrishnan

AAAI 2013 Workshop
July 15, 2013
Structured Kernel-Based Reinforcement Learning

Branislav Kveton, Georgios Theocharous

AAAI 2013
July 14, 2013
Orchestrating Massively Distributed CDNs

Joe Wenjie Jiang, Stratis Ioannidis, Laurent Massoulie, Fabio Picconi

ACM CoNext
December 10, 2012
Privacy Auctions for Recommender Systems

Pranav Dandekar, Nadia Fawaz, Stratis Ioannidis

WINE 2012
December 09, 2012
Privacy against Statistical Inference

Flavio du Pin Calmon, Nadia Fawaz

ALLERTON 2012
October 01, 2012
BlurMe: Infering and obfuscating user gender based on ratings

Udi Weinsberg, Smriti Bhagat, Stratis Ioannidis, Nina Taft

ACM Recsys 2012
September 11, 2012
Guess Who Rated This Movie: Identifying Users Through Subspace Clustering

Amy Zhang, Nadia Fawaz, Stratis Ioannidis, Andrea Montanari

UAI 2012
August 15, 2012
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread

Teddy Furon,

IEEE Security & Privacy
September 01, 2010

Paper

What Can a Dumb Watch Teach a Smartwatch? Informing the Design of Smartwatches

Kent Lyons

International Symposium on Wearable Computers
September 07, 2015
Stochastic block transition models for dynamic networks

Kevin Xu

18th International Conference on Artificial Intelligence and Statistics
May 09, 2015
Privacy-utility tradeoffs for time-series

Nadia Fawaz, Murat Erdogdu

ITA 2015
February 01, 2015
Recent Advances in ID-based Encryption

15th International Conference on Cryptology – INDOCRYPT 2014
December 14, 2014
On Social Event Organization.

Keqian Li, Wei Lu, Smriti Bhagat, Laks V. S. Lakshmanan, Cong Yu

KDD
August 24, 2014
Optimal Recommendations under Attraction, Aversion, and Social Influence.

Wei Lu, Stratis Ioannidis, Smriti Bhagat, Laks V. S. Lakshmanan

KDD
August 24, 2014
SSPM: Sparse Privacy Preserving Mappings

Salman Salamatian, Nadia Fawaz, Branislav Kveton, Nina Taft

UAI
July 23, 2014
From Differential Privacy to Divergence Privacy

Nadia Fawaz, Flavio du Pin Calmon, Ali Makhdoumi, Salman Salamatian

ITA 2014
February 14, 2014
Temporal coherency for video Tone Mapping

Ronan Boitard, Kadi Bouatouch, Remi Cozot, Dominique Thoreau, Adrien gruson

Proc. SPIE 8499, Applications of Digital Image Processing XXXV
August 13, 2012
Private linear maps under decaying privacy

Nadia Fawaz, Muthu Muthukrishnan, Aleksandar Nikolov

Information Theory and Applications Workshop (ITA)
February 15, 2012

Miscellaneous

A Key-Private Cryptosystem from the Quadratic Residuosity

12th International Conference on Security and Cryptography
July 22, 2015
Smart Card Research and Advanced Applications

, Amir Moradi

13th Smart Card Research and Advanced Application Conference
April 24, 2015
Social Computing, Behavioral-Cultural Modeling, and Prediction

Nitin Agarwal, Kevin Xu, Nathaniel Osgood

8th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction
March 31, 2015

Poster

H-Studio: An Authoring Tool for Adding Haptic and Motion

Fabien Danieau, Jeremie Bernon, Julien Fleureau, Philippe Guillotel, Nicolas Mollet, Marc Christie, Anatole Lecuyer

UIST 2013
October 08, 2013