Author of the publication

Monte Carlo and Reconstruction Membership Inference Attacks against Generative Models.

, , and . PoPETs, 2019 (4): 232-249 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data., , , , , , , and . Sicherheit, volume P-228 of LNI, page 115-125. GI, (2014)Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases., and . DBSec, volume 10359 of Lecture Notes in Computer Science, page 325-336. Springer, (2017)Adjustably encrypted in-memory column-store., , , , , , , and . ACM Conference on Computer and Communications Security, page 1325-1328. ACM, (2013)An Encrypted In-Memory Column-Store: The Onion Selection Problem., , , , , , and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 14-26. Springer, (2013)Reconstruction and Membership Inference Attacks against Generative Models., , and . CoRR, (2019)Privacy by Encrypted Databases., , , , , , , and . APF, volume 8450 of Lecture Notes in Computer Science, page 56-69. Springer, (2014)Monte Carlo and Reconstruction Membership Inference Attacks against Generative Models., , and . PoPETs, 2019 (4): 232-249 (2019)Optimal Re-encryption Strategy for Joins in Encrypted Databases., , , , , , and . DBSec, volume 7964 of Lecture Notes in Computer Science, page 195-210. Springer, (2013)Towards an Automatic Generation of Low-Interaction Web Application Honeypots., , and . ARES, page 27:1-27:6. ACM, (2018)