An Extensible De-Identification Framework for Privacy Protection of Unstructured Health Information: Creating Sustainable Privacy InfrastructuresStefano BraghinJoao Bettencourt-Silvaet al.2019MEDINFO 2019
Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial ForensicsMark WeberGiacomo Domeniconiet al.2019KDD 2019
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge ProofsJonathan BootleVadim Lyubashevskyet al.2019CRYPTO 2019
On Efficiently Processing Workflow Provenance Queries in SparkRajmohan CPranay Kumar Lohiaet al.2019ICDCS 2019
AnonTokens: tracing re-identification attacks through decoy recordsSpiros AntonatosStefano Braghinet al.2019arXiv
Memory Categorization: Separating Attacker-Controlled DataMatthias NeugschwandtnerAlessandro Sorniottiet al.2019DIMVA 2019
Homomorphic Training of 30,000 Logistic Regression ModelsFlavio BergamaschiShai Haleviet al.2019ACNS 2019
Towards deep neural network training on encrypted dataKarthik NandakumarNalini K. Rathaet al.2019CVPRW 2019
Reaching Data Confidentiality and Model Accountability on the CalTrainZhongshu GuHani Jamjoomet al.2019DSN 2019
Promoting Distributed Trust in Machine Learning and Computational Simulation via a Blockchain NetworkKibichii BoreRavi Kiran Ramanet al.2019ICBC 2019