Author of the publication

PrivApprox: Privacy-Preserving Stream Analytics.

, , , , , and . USENIX Annual Technical Conference, page 659-672. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , and . Peer-to-Peer Computing, page 22-29. IEEE Computer Society, (2008)Phagocytes: A Holistic Defense and Protection Against Active P2P Worms, , , , and . CoRR, (2011)WebIBC: Identity Based Cryptography for Client Side Security in Web Applications., , , , , and . ICDCS, page 689-696. IEEE Computer Society, (2008)Privacy-Preserving Data Analytics., , , , , and . Encyclopedia of Big Data Technologies, Springer, (2019)Non-tracking web analytics., , , , and . ACM Conference on Computer and Communications Security, page 687-698. ACM, (2012)Building and Analyzing a Global Co-Authorship Network Using Google Scholar Data., , , , , and . WWW (Companion Volume), page 1219-1224. ACM, (2017)Towards Statistical Queries over Distributed Private User Data., , , and . NSDI, page 169-182. USENIX Association, (2012)Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing., , , , , and . CoRR, (2017)Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service, , , , and . CoRR, (2011)An untold story of redundant clouds: making your service deployment truly reliable., , , and . HotDep, page 3:1-3:6. ACM, (2013)