BUSEC Publications 2023–2025

Recent publications collected from DBLP for BUSEC faculty, postdocs, and graduate students.

2025

  1. Maryam Aliakbarpour, Konstantina Bairaktari, Adam Smith 0006, Marika Swanberg, Jonathan R. Ullman. Privacy in Metalearning and Multitask Learning: Modeling and Separations. — AISTATS
  2. Julie Ha, Chloé Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller 0001. Private Eyes: Zero-Leakage Iris Searchable Encryption. — CODASPY
  3. Yuanze Qin, Chang Xu, Qin Zhou, Lingxian Zhang, Yiding Zhang. An improved blockchain-based multi-region Federated Learning framework for crop disease diagnosis. — Comput. Electr. Eng.
  4. Marika Swanberg, Meenatchi Sundaram Muthu Selva Annamalai, Jamie Hayes, Borja Balle, Adam D. Smith 0001. Beyond the Worst Case: Extending Differential Privacy Guarantees to Realistic Adversaries. — CoRR
  5. Arthur Azevedo de Amorim, Amal Ahmed 0001, Marco Gaboardi. Cryptis: Cryptographic Reasoning in Separation Logic. — CoRR
  6. Shlomi Hod, Lucas Rosenblatt, Julia Stoyanovich. Do You Really Need Public Data? Surrogate Public Data for Differential Privacy on Tabular Data. — CoRR
  7. Wei Zhou, Changzheng Wei, Ying Yan 0002, Wei Tang, Zhihao Chen 0003, Xiong Xu, Xuebing Huang, Wengang Chen, Jie Zhang, Yang Chen, Xiaofu Zheng, Hanghang Wu, Shenglong Chen, Ermei Wang, Xiangfei Chen, Yang Yu, Meng Wu, Tao Zhu, Liwei Yuan, Feng Yu, Alex Zhang, Wei Wang 0465, Ji Luo, Zhengyu He, Wenbiao Zhao. DTVM: Revolutionizing Smart Contract Execution with Determinism and Compatibility. — CoRR
  8. Mark Bun, Marco Carmosino, Palak Jain 0004, Gabriel Kaptchuk, Satchit Sivakumar. Enforcing Demographic Coherence: A Harms Aware Framework for Reasoning about Private Data Release. — CoRR
  9. Ling Team, Binwei Zeng, Chao Huang, Chao Zhang, Changxin Tian, Cong Chen, Dingnan Jin, Feng Yu, Feng Zhu, Feng Yuan, Fakang Wang, Gangshan Wang, Guangyao Zhai, Haitao Zhang, Huizhong Li, Jun Zhou, Jia Liu, Junpeng Fang, Junjie Ou, Jun Hu, Ji Luo, Ji Zhang, Jian Liu, Jian Sha, Jianxue Qian, Jiewei Wu, Junping Zhao, Jianguo Li, Jubao Feng, Jingchao Di, Junming Xu, Jinghua Yao, Kuan Xu, Kewei Du, Longfei Li, Lei Liang, Lu Yu, Li Tang, Lin Ju, Peng Xu, Qing Cui, Song Liu, Shicheng Li, Shun Song, Song Yan, Tengwei Cai, Tianyi Chen, Ting Guo, Ting Huang, Tao Feng, Tao Wu, Wei Wu, Xiaolu Zhang, Xueming Yang, Xin Zhao, Xiaobo Hu, Xin Lin, Yao Zhao, Yilong Wang, Yongzhen Guo, Yuanyuan Wang, Yue Yang, Yang Cao, Yuhao Fu, Yi Xiong, Yanzhe Li, Zhe Li, Zhiqiang Zhang, Ziqi Liu, Zhaoxin Huan, Zujie Wen, Zhenhang Sun, Zhuoxuan Du, Zhengyu He. Every FLOP Counts: Scaling a 300B Mixture-of-Experts LING LLM without Premium GPUs. — CoRR
  10. Shahar Dobzinski, Alon Eden, Kira Goldner, Ariel Shaulker, Thodoris Tsilivis. Interdependent Bilateral Trade: Information vs Approximation. — CoRR
  11. Marika Swanberg, Ryan McKenna, Edo Roth, Albert Cheu, Peter Kairouz. Is API Access to LLMs Useful for Generating Private Synthetic Tabular Data? — CoRR
  12. Ephraim Linder, Sofya Raskhodnikova, Adam Smith 0006, Thomas Steinke 0002. Privately Evaluating Untrusted Black-Box Functions. — CoRR
  13. Leandro Gomes 0001, Patrick Baillot, Marco Gaboardi. A Kleene Algebra with Tests for Union Bound Reasoning About Probabilistic Programs. — CSL
  14. Arthur Azevedo de Amorim, Cheng Zhang, Marco Gaboardi. Kleene Algebra with Commutativity Conditions Is Undecidable. — CSL
  15. Peter K. Chan, Alyson Carrel, Mayank Varia, Xiao Wang 0012. Murmurs of the Silenced: Secure Reporting of Misconduct Settlements. — CSLAW
  16. Shahar Dobzinski, Alon Eden, Kira Goldner, Ariel Shaulker, Thodoris Tsilivis. Bilateral Trade with Interdependent Values: Information vs. Approximation. — EC
  17. Ran Canetti, Amos Fiat, Yannai A. Gonczarowski. Zero-Knowledge Mechanisms. — EC
  18. Zeyu Liu 0004, Katerina Sotiraki, Eran Tromer, Yunhao Wang. Snake-Eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption. — EUROCRYPT
  19. Mark Bun. 6th Symposium on Foundations of Responsible Computing, FORC 2025, June 4-6, 2025, Stanford University, CA, USA — FORC, LIPIcs
  20. Leandro Gomes 0001, Patrick Baillot, Marco Gaboardi. BiGKAT: An Algebraic Framework for Relational Verification of Probabilistic Programs. — FoSSaCS
  21. Alishah Chator, Matthew Green 0001, Pratyush Ranjan Tiwari. SoK: Privacy-Preserving Signatures. — IACR Commun. Cryptol.
  22. Ran Canetti, Ivan Damgård, Sebastian Kolby, Divya Ravi 0001, Sophia Yakoubov. Deniable Secret Sharing. — IACR Cryptol. ePrint Arch.
  23. Colin Finkbeiner, Mohamed E. Najd, Julia Guskind, Ghada Almashaqbeh. SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models. — IACR Cryptol. ePrint Arch.
  24. Ran Canetti, Megan Chen. Universally Composable Succinct Vector Commitments and Applications. — IACR Cryptol. ePrint Arch.
  25. Ji Luo, Wuyang Zhuo, Siyan Liu, Bingfei Xu. Corrections to "The Optimization of Carbon Emission Prediction in Low Carbon Energy Economy Under Big Data". — IEEE Access
  26. Ji Luo, Zijian Xiao, Zuxin Li, Xuecheng Chen, Chaopeng Hong, Xiao-Ping Zhang 0002, Xinlei Chen. SmartSpr: A Physics-Informed Mobile Sprinkler Scheduling System for Reducing Urban Particulate Matter Pollution. — IEEE Trans. Mob. Comput.
  27. Jian Wang 0078, Yiding Zhang, Zhengyang Song, Ting Cheng. BiGDC-BrainAgeNet: Enhancing EEG-Based Brain Age Prediction with Bidirectional Graph Diffusion Convolutions. — ISBRA
  28. Esty Kelman, Ephraim Linder, Sofya Raskhodnikova. Online Versus Offline Adversaries in Property Testing. — ITCS
  29. Chang Xu, Junqi Ding, Bo Wang, Yan Qiao, Lingxian Zhang, Yiding Zhang. Multimodal-information-based optimized agricultural prescription recommendation system of crop electronic medical records. — J. Ind. Inf. Integr.
  30. Jamie Hayes, Marika Swanberg, Harsh Chaudhari, Itay Yona, Ilia Shumailov, Milad Nasr, Christopher A. Choquette-Choo, Katherine Lee, A. Feder Cooper. Measuring memorization in language models via probabilistic extraction. — NAACL
  31. Chang Xu, Yiding Zhang, Lei Zhao, Haojie Wen, Lingxian Zhang. Knowledge-guided adaptive spatial-temporal graph contrastive learning framework: Regional crop diseases prediction based on electronic medical records. — Neural Networks
  32. Yingjie Jiang, Du Tang, Ji Luo, Yu Chen, Bofang Zheng, Yaojun Qiao. Mitigation of Power Offset Induced by Hard-Decision-Error in Fiber Longitudinal Power Profile Estimation. — OFC
  33. Megan Chen, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, Swagata Sasmal. Universally Composable Non-interactive Zero-Knowledge from Sigma Protocols via a New Straight-Line Compiler. — PKC
  34. Sofya Raskhodnikova, Teresa Anna Steiner. Fully Dynamic Algorithms for Graph Databases with Edge Differential Privacy. — Proc. ACM Manag. Data
  35. Qiancheng Fu, Ankush Das, Marco Gaboardi. Probabilistic Refinement Session Types. — Proc. ACM Program. Lang.
  36. Talya Eden, Quanquan C. Liu, Sofya Raskhodnikova, Adam D. Smith 0001. Triangle Counting With Local Edge Differential Privacy. — Random Struct. Algorithms
  37. Sofya Raskhodnikova, Satchit Sivakumar, Adam Smith 0006, Marika Swanberg. Differentially Private Sampling from Distributions. — SIAM J. Comput.
  38. Jane Lange, Ephraim Linder, Sofya Raskhodnikova, Arsen Vasilyan. Local Lipschitz Filters for Bounded-Range Functions with Applications to Arbitrary Real-Valued Functions. — SODA
  39. Shlomi Hod, Ran Canetti. Differentially Private Release of Israel's National Registry of Live Births. — SP
  40. Ephraim Linder, Sofya Raskhodnikova, Adam Smith 0006, Thomas Steinke 0002. Privately Evaluating Untrusted Black-Box Functions. — STOC

2024

  1. Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos-Florian Ristache. Testing Connectedness of Images. — Algorithmica
  2. Mark Bun, Gautam Kamath 0001, Argyris Mouzakis, Vikrant Singhal. Not All Learnable Distribution Classes are Privately Learnable. — ALT
  3. Mark Bun, Aloni Cohen, Rathin Desai. Private PAC Learning May be Harder than Online Learning. — ALT
  4. Sachin Chhabra, Yaoxin Zhuo, Riti Paul, Javad Sohankar, Ji Luo, Shan Li, Wendy Lee, Yi Su, Teresa Wu, Baoxin Li. Translation of Partially Paired Images with Generative Adversarial Networks. — BHI
  5. Heila Precel, Allison McDonald, Brent J. Hecht, Nicholas Vincent. A Canary in the AI Coal Mine: American Jews May Be Disproportionately Harmed by Intellectual Property Dispossession in Large Language Model Training. — CHI
  6. Kathryn D. Coduto, Allison McDonald. "Delete it and Move On": Digital Management of Shared Sexual Content after a Breakup. — CHI
  7. Chang Xu, Lei Zhao, Haojie Wen, Yiding Zhang, Lingxian Zhang. A novel cascaded multi-task method for crop prescription recommendation based on electronic medical record. — Comput. Electron. Agric.
  8. Heila Precel, Allison McDonald, Brent J. Hecht, Nicholas Vincent. A Canary in the AI Coal Mine: American Jews May Be Disproportionately Harmed by Intellectual Property Dispossession in Large Language Model Training. — CoRR
  9. Rachel Cummings, Shlomi Hod, Jayshree Sarathy, Marika Swanberg. ATTAXONOMY: Unpacking Differential Privacy Guarantees Against Practical Adversaries. — CoRR
  10. Róbert Istvan Busa-Fekete, Travis Dick, Claudio Gentile, Andrés Muñoz Medina, Adam Smith 0006, Marika Swanberg. Auditing Privacy Mechanisms via Label Inference Attacks. — CoRR
  11. Shlomi Hod, Ran Canetti. Differentially Private Release of Israel's National Registry of Live Births. — CoRR
  12. Cheng Zhang, Arthur Azevedo de Amorim, Marco Gaboardi. Domain Reasoning in TopKAT. — CoRR
  13. Sofya Raskhodnikova, Teresa Anna Steiner. Fully Dynamic Graph Algorithms with Edge Differential Privacy. — CoRR
  14. Vitaly Feldman, Audra McMillan, Satchit Sivakumar, Kunal Talwar. Instance-Optimal Private Density Estimation in the Wasserstein Distance. — CoRR
  15. Arthur Azevedo de Amorim, Cheng Zhang, Marco Gaboardi. Kleene algebra with commutativity conditions is undecidable. — CoRR
  16. Jamie Hayes, Marika Swanberg, Harsh Chaudhari, Itay Yona, Ilia Shumailov. Measuring memorization through probabilistic discoverable extraction. — CoRR
  17. Mark Bun, Gautam Kamath 0001, Argyris Mouzakis, Vikrant Singhal. Not All Learnable Distribution Classes are Privately Learnable. — CoRR
  18. Esty Kelman, Ephraim Linder, Sofya Raskhodnikova. Online versus Offline Adversaries in Property Testing. — CoRR
  19. Adam Block, Mark Bun, Rathin Desai, Abhishek Shetty, Zhiwei Steven Wu. Oracle-Efficient Differentially Private Learning with Public Data. — CoRR
  20. Maryam Aliakbarpour, Konstantina Bairaktari, Adam D. Smith 0001, Marika Swanberg, Jonathan R. Ullman. Privacy in Metalearning and Multitask Learning: Modeling and Separations. — CoRR
  21. Mark Bun, Aloni Cohen, Rathin Desai. Private PAC Learning May be Harder than Online Learning. — CoRR
  22. Marco Gaboardi, Michael Hay, Salil P. Vadhan. Programming Frameworks for Differential Privacy. — CoRR
  23. Vaughn Hamilton, Gabriel Kaptchuk, Allison McDonald, Elissa M. Redmiles. Safer Digital Intimacy For Sex Workers And Beyond: A Technical Research Agenda. — CoRR
  24. Kira Goldner, Taylor Lundy. Simple Mechanisms for Utility Maximization: Approximating Welfare in the I.I.D. Unit-Demand Setting. — CoRR
  25. Li Qiwei, Allison McDonald, Oliver L. Haimson, Sarita Schoenebeck, Eric Gilbert. The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media. — CoRR
  26. Palak Jain 0004, Adam Smith 0006, Connor Wagaman. Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation. — CoRR
  27. Yi Liu 0090, Yu Cui, Wen Cheng, Will Neil Browne, Bing Xue 0001, Chengyuan Zhu, Yiding Zhang, Mingkai Sheng, Lingfang Zeng. A Phenotypic Learning Classifier System for Problems with Continuous Features. — GECCO
  28. Sam Buxbaum, Mohammad Mahmoody. A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography. — IACR Commun. Cryptol.
  29. Nicolas Alhaddad, Mayank Varia, Ziling Yang. Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications. — IACR Commun. Cryptol.
  30. Sam Buxbaum, Mohammad Mahmoody. A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography. — IACR Cryptol. ePrint Arch.
  31. Nicolas Alhaddad, Leonid Reyzin, Mayank Varia. Committing AVID with Partial Retrieval and Optimal Storage. — IACR Cryptol. ePrint Arch.
  32. Zeyu Liu 0004, Katerina Sotiraki, Eran Tromer, Yunhao Wang. DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE. — IACR Cryptol. ePrint Arch.
  33. Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, Yiding Zhang. Fiat-Shamir for Bounded-Depth Adversaries. — IACR Cryptol. ePrint Arch.
  34. Nicolas Alhaddad, Mayank Varia, Ziling Yang. Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications. — IACR Cryptol. ePrint Arch.
  35. Zeyu Liu 0004, Eran Tromer, Yunhao Wang. PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. — IACR Cryptol. ePrint Arch.
  36. Ryan Little, Lucy Qin, Mayank Varia. Secure Account Recovery for a Privacy-Preserving Web Service. — IACR Cryptol. ePrint Arch.
  37. Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein. Towards general-purpose program obfuscation via local mixing. — IACR Cryptol. ePrint Arch.
  38. Megan Chen, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, Swagata Sasmal. Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler. — IACR Cryptol. ePrint Arch.
  39. Cheng Zhang, Arthur Azevedo de Amorim, Marco Gaboardi. Domain Reasoning in TopKAT. — ICALP
  40. Ji Luo, Wuyang Zhuo, Siyan Liu, Bingfei Xu. The Optimization of Carbon Emission Prediction in Low Carbon Energy Economy Under Big Data. — IEEE Access
  41. Vaughn Hamilton, Gabriel Kaptchuk, Allison McDonald, Elissa M. Redmiles. Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda. — IEEE Secur. Priv.
  42. Ji Luo, Zhenyu Wang, Pei Jiang 0006, Hongtao Xia, Yang Yang 0031, Yong Zhong. Design and Modeling of Large Helical Deformation Composite Actuators Under Complicated Loading Conditions. — IEEE Trans. Instrum. Meas.
  43. Shi Hu, Muhammad Aamir Nadeem, Ramayah Thurasamy, Ji Luo, Xiaobo Yi. Impacts of Procedural Justice and Ethical Leadership on Organizational Innovation. — Int. J. Asian Bus. Inf. Manag.
  44. Zijian Xiao, Ji Luo, Xuecheng Chen, Yuhan Cheng, Haoyang Wang 0012, Xinlei Chen. Poster Abstract: Sprinkler-UAV Cooperative Active Scheduling System. — IPSN
  45. Omri Ben-Eliezer, Esty Kelman, Uri Meir, Sofya Raskhodnikova. Property Testing with Online Adversaries. — ITCS
  46. Ji Luo, Wuyang Zhuo, Binfei Xu. A Deep Neural Network-Based Assistive Decision Method for Financial Risk Prediction in Carbon Trading Market. — J. Circuits Syst. Comput.
  47. Bojing Liu, Mengxiang Li, Zihui Ji, Hongming Li, Ji Luo. Intelligent Productivity Transformation: Corporate Market Demand Forecasting With the Aid of an AI Virtual Assistant. — J. Organ. End User Comput.
  48. Alon Eden, Michal Feldman, Amos Fiat, Kira Goldner, Anna R. Karlin. Combinatorial Auctions with Interdependent Valuations: SOS to the Rescue. — Math. Oper. Res.
  49. Róbert Busa-Fekete, Travis Dick, Claudio Gentile, Andrés Muñoz Medina, Adam Smith 0006, Marika Swanberg. Auditing Privacy Mechanisms via Label Inference Attacks. — NeurIPS
  50. Vitaly Feldman, Audra McMillan, Satchit Sivakumar, Kunal Talwar. Instance-Optimal Private Density Estimation in the Wasserstein Distance. — NeurIPS
  51. Maryam Aliakbarpour, Mark Bun, Adam Smith 0006. Optimal Hypothesis Selection in (Almost) Linear Time. — NeurIPS
  52. Adam Block, Mark Bun, Rathin Desai, Abhishek Shetty, Zhiwei Steven Wu. Oracle-Efficient Differentially Private Learning with Public Data. — NeurIPS
  53. Li Qiwei, Allison McDonald, Oliver L. Haimson, Sarita Schoenebeck, Eric Gilbert. The Sociotechnical Stack: Opportunities for Social Computing Research in Non-Consensual Intimate Media. — Proc. ACM Hum. Comput. Interact.
  54. Mark Bun, Marco Gaboardi, Marcel Neunhoeffer, Wanrong Zhang 0001. Continual Release of Differentially Private Synthetic Data from Longitudinal Data Collections. — Proc. ACM Manag. Data
  55. Jiawen Liu, Weihao Qu, Marco Gaboardi, Deepak Garg 0001, Jonathan R. Ullman. Program Analysis for Adaptive Data Analysis. — Proc. ACM Program. Lang.
  56. Elisabet Lobo Vesga, Alejandro Russo, Marco Gaboardi, Carlos Tomé Cortiñas. Sensitivity by Parametricity. — Proc. ACM Program. Lang.
  57. Tushar M. Jois, Gabrielle Beck, Sofia Belikovetsky, Joseph Carrigan, Alishah Chator, Logan Kostick, Maximilian Zinkus, Gabriel Kaptchuk, Aviel D. Rubin. SocIoTy: Practical Cryptography in Smart Home Contexts. — Proc. Priv. Enhancing Technol.
  58. Hadley Black, Iden Kalemaj, Sofya Raskhodnikova. Isoperimetric inequalities for real-valued functions with applications to monotonicity testing. — Random Struct. Algorithms
  59. Jianyun Liang, Jiyao Xu, Kun Wu, Ji Luo. Latitudinal Characteristics of Nighttime Electron Temperature in the Topside Ionosphere and Its Dependence on Solar and Geomagnetic Activities. — Remote. Sens.
  60. Shuchi Chawla 0001, Kira Goldner, Anna R. Karlin, J. Benjamin Miller. Non-Adaptive Matroid Prophet Inequalities. — SAGT
  61. Meryem Essaidi, Kira Goldner, S. Matthew Weinberg. To Regulate or Not to Regulate: Using Revenue Maximization Tools to Maximize Consumer Utility. — SAGT
  62. Ethan Seow, Yan Tong, Eli Baum, Sam Buxbaum, Muhammad Faisal 0001, John Liagouris, Vasiliki Kalavri, Mayank Varia. QueryShield: Cryptographically Secure Analytics in the Cloud. — SIGMOD Conference Companion
  63. Zeyu Liu 0004, Eran Tromer, Yunhao Wang. Group Oblivious Message Retrieval. — SP
  64. Palak Jain 0004, Adam Smith 0006, Connor Wagaman. Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation. — SP
  65. Sofya Raskhodnikova. The Role of Local Algorithms in Privacy (Invited Talk). — STACS
  66. Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein. Towards General-Purpose Program Obfuscation via Local Mixing. — TCC
  67. Zeyu Liu 0004, Eran Tromer, Yunhao Wang. PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation. — USENIX Security Symposium
  68. Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, Elissa M. Redmiles. "I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators. — USENIX Security Symposium
  69. Sharon Goldberg, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens 0001, Adam Suhl. RADIUS/UDP Considered Harmful. — USENIX Security Symposium
  70. Ryan Little, Lucy Qin, Mayank Varia. Secure Account Recovery for a Privacy-Preserving Web Service. — USENIX Security Symposium
  71. Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang 0012, Ning Luo. ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. — USENIX Security Symposium

2023

  1. Marco Gaboardi, Igor Walukiewicz. Report on Logic in Computer Science (LICS'23). — ACM SIGLOG News
  2. Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos Ristache. Testing Connectedness of Images. — APPROX/RANDOM
  3. Aloni Cohen, Adam D. Smith 0001, Marika Swanberg, Prashant Nalini Vasudevan. Control, Confidentiality, and the Right to be Forgotten. — CCS
  4. Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici. Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. — CCS
  5. Vaughn Hamilton, Ananta Soneji, Allison McDonald, Elissa M. Redmiles. "Nudes? Shouldn't I charge for these?": Motivations of New Sexual Content Creators on OnlyFans. — CHI
  6. Chunbao Xie, Ling Zhong, Jiangrong Luo, Ji Luo, Yingmiao Wu, Shuai Zheng, Lingxi Jiang, Jianbo Zhang, Yi Shi. Identification of mutation gene prognostic biomarker in multiple myeloma through gene panel exome sequencing and transcriptome analysis in Chinese population. — Comput. Biol. Medicine
  7. Amy Rathore, Marina Blanton, Marco Gaboardi, Lukasz Ziarek. A Formal Model for Secure Multiparty Computation. — CoRR
  8. Mark Bun, Nadezhda Voronova. Approximate degree lower bounds for oracle identification problems. — CoRR
  9. Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer. Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities. — CoRR
  10. Claudio Chamon, Andrei E. Ruckenstein, Eduardo R. Mucciolo, Ran Canetti. Circuit complexity and functionality: a thermodynamic perspective. — CoRR
  11. Alon Eden, Michal Feldman, Kira Goldner, Simon Mauras, Divyarthi Mohan. Constant Approximation for Private Interdependent Valuations. — CoRR
  12. Mark Bun, Marco Gaboardi, Marcel Neunhoeffer, Wanrong Zhang 0001. Continual Release of Differentially Private Synthetic Data. — CoRR
  13. Palak Jain 0004, Iden Kalemaj, Sofya Raskhodnikova, Satchit Sivakumar, Adam D. Smith 0001. Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation. — CoRR
  14. Shurong Lin, Mark Bun, Marco Gaboardi, Eric D. Kolaczyk, Adam Smith 0006. Differentially Private Confidence Intervals for Proportions under Stratified Random Sampling. — CoRR
  15. Marika Swanberg, Damien Desfontaines, Samuel Haney. DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection. — CoRR
  16. Xuanpeng Zhao, Guoyuan Wu 0001, Akula Venkatram, Ji Luo, Peng Hao 0001, Kanok Boriboonsomsin, Shaohua Hu. Integrated Simulation Platform for Quantifying the Traffic-Induced Environmental and Health Impacts. — CoRR
  17. Jane Lange, Ephraim Linder, Sofya Raskhodnikova, Arsen Vasilyan. Local Lipschitz Filters for Bounded-Range Functions. — CoRR
  18. Iden Kalemaj, Sofya Raskhodnikova, Adam D. Smith 0001, Charalampos E. Tsourakakis. Node-Differentially Private Estimation of the Number of Connected Components. — CoRR
  19. Omri Ben-Eliezer, Esty Kelman, Uri Meir, Sofya Raskhodnikova. Property Testing with Online Adversaries. — CoRR
  20. Mark Bun, Marco Gaboardi, Max Hopkins, Russell Impagliazzo, Rex Lei, Toniann Pitassi, Satchit Sivakumar, Jessica Sorrell. Stability is Stable: Connections between Replicability, Privacy, and Adaptive Generalization. — CoRR
  21. Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos-Florian Ristache. Testing Connectedness of Images. — CoRR
  22. Mark Bun, Marco Gaboardi, Ludmila Glinskih. The Complexity of Verifying Boolean Programs as Differentially Private. — CoRR
  23. Talya Eden, Quanquan C. Liu, Sofya Raskhodnikova, Adam D. Smith 0001. Triangle Counting with Local Edge Differential Privacy. — CoRR
  24. Ran Canetti, Amos Fiat, Yannai A. Gonczarowski. Zero-Knowledge Mechanisms. — CoRR
  25. Mark Bun, Nadezhda Voronova. Approximate degree lower bounds for oracle identification problems. — Electron. Colloquium Comput. Complex.
  26. Yang Liu 0039, Ji Luo, Yi Yang, Xuan Wang 0002, Mehdi Gheisari, Feng Luo. ShrewdAttack: Low Cost High Accuracy Model Extraction. — Entropy
  27. june wunder, Arthur Azevedo de Amorim, Patrick Baillot, Marco Gaboardi. Bunched Fuzz: Sensitivity for Vector Metrics. — ESOP
  28. Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner. Proof-Carrying Data from Arithmetized Random Oracles. — EUROCRYPT
  29. Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller 0001, Arthur Gervais, Dawn Song. SoK: Data Sovereignty. — EuroS&P
  30. Alon Eden, Michal Feldman, Kira Goldner, Simon Mauras, Divyarthi Mohan. Constant Approximation for Private Interdependent Valuations. — FOCS
  31. Marco Gaboardi, Femke van Raamsdonk. 8th International Conference on Formal Structures for Computation and Deduction, FSCD 2023, July 3-6, 2023, Rome, Italy — FSCD, LIPIcs
  32. Yiding Zhang, Xiangyuan Wang. Spatial and Temporal Evolution of Precipitation and Its Main Driving Factors in Jiangsu Province, China. — Geoinformatics
  33. Zeyu Liu 0004, Eran Tromer, Yunhao Wang. Group Oblivious Message Retrieval. — IACR Cryptol. ePrint Arch.
  34. Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, Sharon Goldberg, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein. OpenPubkey: Augmenting OpenID Connect with User held Signing Keys. — IACR Cryptol. ePrint Arch.
  35. Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici. Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. — IACR Cryptol. ePrint Arch.
  36. Julie Ha, Chloé Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller 0001. Private Eyes: Zero-Leakage Iris Searchable Encryption. — IACR Cryptol. ePrint Arch.
  37. Megan Chen, Alessandro Chiesa, Tom Gur, Jack O'Connor, Nicholas Spooner. Proof-Carrying Data From Arithmetized Random Oracles. — IACR Cryptol. ePrint Arch.
  38. Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller 0001, Arthur Gervais, Dawn Song. SoK: Data Sovereignty. — IACR Cryptol. ePrint Arch.
  39. Alishah Chator, Matthew Green 0001, Pratyush Ranjan Tiwari. SoK: Privacy-Preserving Signatures. — IACR Cryptol. ePrint Arch.
  40. Ran Canetti, Sebastian Kolby, Divya Ravi 0001, Eduardo Soria-Vazquez, Sophia Yakoubov. Taming Adaptivity in YOSO Protocols: The Modular Way. — IACR Cryptol. ePrint Arch.
  41. Muhammad Faisal 0001, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia. TVA: A multi-party computation system for secure and expressive time series analytics. — IACR Cryptol. ePrint Arch.
  42. Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang 0012, Ning Luo. ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge. — IACR Cryptol. ePrint Arch.
  43. Hadley Black, Iden Kalemaj, Sofya Raskhodnikova. Isoperimetric Inequalities for Real-Valued Functions with Applications to Monotonicity Testing. — ICALP
  44. Talya Eden, Quanquan C. Liu, Sofya Raskhodnikova, Adam Smith 0006. Triangle Counting with Local Edge Differential Privacy. — ICALP
  45. Palak Jain 0004, Sofya Raskhodnikova, Satchit Sivakumar, Adam D. Smith 0001. The Price of Differential Privacy under Continual Observation. — ICML
  46. Hao Zhang 0008, Ji Luo, Mengze Hu, Jun Yan 0009, Jian Zhang 0001, Zongyan Qiu. Detecting Exception Handling Bugs in C++ Programs. — ICSE
  47. Pei Jiang 0006, Ji Luo, Jiaxing Li, Michael Z. Q. Chen, Yonghua Chen, Yang Yang 0031, Rui Chen 0015. A Novel Scaffold-Reinforced Actuator With Tunable Attitude Ability for Grasping. — IEEE Trans. Robotics
  48. Frédéric Tuong, Mohammad Omidvar Tehrani, Marco Gaboardi, Steven Y. Ko. SymRustC: A Hybrid Fuzzer for Rust. — ISSTA
  49. Zvika Brakerski, Ran Canetti, Luowen Qian. On the Computational Hardness Needed for Quantum Cryptography. — ITCS
  50. Di Wang 0015, Lijie Hu, Huanyu Zhang, Marco Gaboardi, Jinhui Xu 0001. Generalized Linear Models in Non-interactive Local Differential Privacy with Public Data. — J. Mach. Learn. Res.
  51. Palak Jain 0004, Iden Kalemaj, Sofya Raskhodnikova, Satchit Sivakumar, Adam Smith 0006. Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation. — NeurIPS
  52. Maryam Aliakbarpour, Mark Bun, Adam Smith 0006. Hypothesis Selection with Memory Constraints. — NeurIPS
  53. John Liagouris, Vasiliki Kalavri, Muhammad Faisal 0001, Mayank Varia. SECRECY: Secure collaborative analytics in untrusted clouds. — NSDI
  54. Du Tang, Zhen Wu, Shuangyue Liu, Jiating Luo, Ji Luo, Bofang Zheng, Yaojun Qiao. Learned Perturbation-Aided Advanced Digital Backpropagation with Nonlinear Compensation Fusion for Subcarrier-Multiplexing Systems. — OFC
  55. Iden Kalemaj, Sofya Raskhodnikova, Adam D. Smith 0001, Charalampos E. Tsourakakis. Node-Differentially Private Estimation of the Number of Connected Components. — PODS
  56. Marika Swanberg, Damien Desfontaines, Samuel Haney. DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection. — Proc. Priv. Enhancing Technol.
  57. Julia Guskind, Walter O. Krawec. Semi-Quantum Random Number Generation. — QCE
  58. Sharon Goldberg, Leonid Reyzin, Dimitrios Papadopoulos 0001, Jan Vcelák. Verifiable Random Functions (VRFs). — RFC
  59. Mark Bun, Marco Gaboardi, Max Hopkins, Russell Impagliazzo, Rex Lei, Toniann Pitassi, Satchit Sivakumar, Jessica Sorrell. Stability Is Stable: Connections between Replicability, Privacy, and Adaptive Generalization. — STOC
  60. Ran Canetti, Sebastian Kolby, Divya Ravi 0001, Eduardo Soria-Vazquez, Sophia Yakoubov. Taming Adaptivity in YOSO Protocols: The Modular Way. — TCC
  61. Iden Kalemaj, Sofya Raskhodnikova, Nithin Varma 0001. Sublinear-Time Computation in the Presence of Online Erasures. — Theory Comput.
  62. Mark Bun, Nadezhda Voronova. Approximate Degree Lower Bounds for Oracle Identification Problems. — TQC
  63. Ji Luo, Yiling Hu 0003, Chengzhao Yu, Chaopeng Hong, Xiao-Ping Zhang 0002, Xinlei Chen. Field Reconstruction-Based Non-Rendezvous Calibration for Low Cost Mobile Sensors. — UbiComp/ISWC Adjunct
  64. Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer. Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities. — USENIX Security Symposium
  65. Jonathan Prokos, Neil Fendley, Matthew Green 0001, Roei Schuster, Eran Tromer, Tushar M. Jois, Yinzhi Cao. Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning. — USENIX Security Symposium
  66. Muhammad Faisal 0001, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia. TVA: A multi-party computation system for secure and expressive time series analytics. — USENIX Security Symposium