{"id":3387,"date":"2012-10-12T10:20:51","date_gmt":"2012-10-12T14:20:51","guid":{"rendered":"https:\/\/www.bu.edu\/cs\/?page_id=3387"},"modified":"2025-08-22T15:46:34","modified_gmt":"2025-08-22T19:46:34","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/cs\/research-groups\/security\/busec\/publications\/","title":{"rendered":"BUSEC Publications"},"content":{"rendered":"\n<div class='wrap'>\n<h1>BUSEC Publications 2023\u20132025<\/h1>\n<div class='sub'>Recent publications collected from DBLP for BUSEC faculty, postdocs, and graduate students.<\/div>\n<h2>2025<\/h2>\n<div class='card'>\n<ol>\n<li><span class='authors'>Maryam Aliakbarpour, Konstantina Bairaktari, Adam Smith 0006, <strong class='group'>Marika Swanberg<\/strong>, Jonathan R. Ullman.<\/span> <a href='https:\/\/proceedings.mlr.press\/v258\/aliakbarpour25b.html' target='_blank' rel=\"noopener noreferrer\">Privacy in Metalearning and Multitask Learning: Modeling and Separations.<\/a> <span class='venue'>\u2014 AISTATS<\/span><\/li>\n<li><span class='authors'><strong class='group'>Julie Ha<\/strong>, Chlo\u00e9 Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller 0001.<\/span> <a href='https:\/\/doi.org\/10.1145\/3714393.3726497' target='_blank' rel=\"noopener noreferrer\">Private Eyes: Zero-Leakage Iris Searchable Encryption.<\/a> <span class='venue'>\u2014 CODASPY<\/span><\/li>\n<li><span class='authors'>Yuanze Qin, Chang Xu, Qin Zhou, Lingxian Zhang, <strong class='group'>Yiding Zhang<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1016\/j.compeleceng.2025.110181' target='_blank' rel=\"noopener noreferrer\">An improved blockchain-based multi-region Federated Learning framework for crop disease diagnosis.<\/a> <span class='venue'>\u2014 Comput. Electr. Eng.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Marika Swanberg<\/strong>, Meenatchi Sundaram Muthu Selva Annamalai, Jamie Hayes, Borja Balle, Adam D. Smith 0001.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2507.08158' target='_blank' rel=\"noopener noreferrer\">Beyond the Worst Case: Extending Differential Privacy Guarantees to Realistic Adversaries.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Arthur Azevedo de Amorim, Amal Ahmed 0001, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2502.21156' target='_blank' rel=\"noopener noreferrer\">Cryptis: Cryptographic Reasoning in Separation Logic.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Shlomi Hod<\/strong>, Lucas Rosenblatt, Julia Stoyanovich.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2504.14368' target='_blank' rel=\"noopener noreferrer\">Do You Really Need Public Data? Surrogate Public Data for Differential Privacy on Tabular Data.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Wei Zhou, Changzheng Wei, Ying Yan 0002, Wei Tang, Zhihao Chen 0003, Xiong Xu, Xuebing Huang, Wengang Chen, Jie Zhang, Yang Chen, Xiaofu Zheng, Hanghang Wu, Shenglong Chen, Ermei Wang, Xiangfei Chen, Yang Yu, Meng Wu, Tao Zhu, Liwei Yuan, Feng Yu, Alex Zhang, Wei Wang 0465, <strong class='group'>Ji Luo<\/strong>, Zhengyu He, Wenbiao Zhao.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2504.16552' target='_blank' rel=\"noopener noreferrer\">DTVM: Revolutionizing Smart Contract Execution with Determinism and Compatibility.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, Marco Carmosino, Palak Jain 0004, Gabriel Kaptchuk, <strong class='group'>Satchit Sivakumar<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2502.02709' target='_blank' rel=\"noopener noreferrer\">Enforcing Demographic Coherence: A Harms Aware Framework for Reasoning about Private Data Release.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Ling Team, Binwei Zeng, Chao Huang, Chao Zhang, Changxin Tian, Cong Chen, Dingnan Jin, Feng Yu, Feng Zhu, Feng Yuan, Fakang Wang, Gangshan Wang, Guangyao Zhai, Haitao Zhang, Huizhong Li, Jun Zhou, Jia Liu, Junpeng Fang, Junjie Ou, Jun Hu, <strong class='group'>Ji Luo<\/strong>, Ji Zhang, Jian Liu, Jian Sha, Jianxue Qian, Jiewei Wu, Junping Zhao, Jianguo Li, Jubao Feng, Jingchao Di, Junming Xu, Jinghua Yao, Kuan Xu, Kewei Du, Longfei Li, Lei Liang, Lu Yu, Li Tang, Lin Ju, Peng Xu, Qing Cui, Song Liu, Shicheng Li, Shun Song, Song Yan, Tengwei Cai, Tianyi Chen, Ting Guo, Ting Huang, Tao Feng, Tao Wu, Wei Wu, Xiaolu Zhang, Xueming Yang, Xin Zhao, Xiaobo Hu, Xin Lin, Yao Zhao, Yilong Wang, Yongzhen Guo, Yuanyuan Wang, Yue Yang, Yang Cao, Yuhao Fu, Yi Xiong, Yanzhe Li, Zhe Li, Zhiqiang Zhang, Ziqi Liu, Zhaoxin Huan, Zujie Wen, Zhenhang Sun, Zhuoxuan Du, Zhengyu He.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2503.05139' target='_blank' rel=\"noopener noreferrer\">Every FLOP Counts: Scaling a 300B Mixture-of-Experts LING LLM without Premium GPUs.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Shahar Dobzinski, Alon Eden, <strong class='group'>Kira Goldner<\/strong>, Ariel Shaulker, Thodoris Tsilivis.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2506.23896' target='_blank' rel=\"noopener noreferrer\">Interdependent Bilateral Trade: Information vs Approximation.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Marika Swanberg<\/strong>, Ryan McKenna, Edo Roth, Albert Cheu, Peter Kairouz.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2502.06555' target='_blank' rel=\"noopener noreferrer\">Is API Access to LLMs Useful for Generating Private Synthetic Tabular Data?<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ephraim Linder<\/strong>, <strong class='group'>Sofya Raskhodnikova<\/strong>, Adam Smith 0006, Thomas Steinke 0002.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2503.19268' target='_blank' rel=\"noopener noreferrer\">Privately Evaluating Untrusted Black-Box Functions.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Leandro Gomes 0001, Patrick Baillot, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.CSL.2025.35' target='_blank' rel=\"noopener noreferrer\">A Kleene Algebra with Tests for Union Bound Reasoning About Probabilistic Programs.<\/a> <span class='venue'>\u2014 CSL<\/span><\/li>\n<li><span class='authors'>Arthur Azevedo de Amorim, Cheng Zhang, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.CSL.2025.36' target='_blank' rel=\"noopener noreferrer\">Kleene Algebra with Commutativity Conditions Is Undecidable.<\/a> <span class='venue'>\u2014 CSL<\/span><\/li>\n<li><span class='authors'>Peter K. Chan, Alyson Carrel, <strong class='group'>Mayank Varia<\/strong>, Xiao Wang 0012.<\/span> <a href='https:\/\/doi.org\/10.1145\/3709025.3712207' target='_blank' rel=\"noopener noreferrer\">Murmurs of the Silenced: Secure Reporting of Misconduct Settlements.<\/a> <span class='venue'>\u2014 CSLAW<\/span><\/li>\n<li><span class='authors'>Shahar Dobzinski, Alon Eden, <strong class='group'>Kira Goldner<\/strong>, Ariel Shaulker, Thodoris Tsilivis.<\/span> <a href='https:\/\/doi.org\/10.1145\/3736252.3742607' target='_blank' rel=\"noopener noreferrer\">Bilateral Trade with Interdependent Values: Information vs. Approximation.<\/a> <span class='venue'>\u2014 EC<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ran Canetti<\/strong>, Amos Fiat, Yannai A. Gonczarowski.<\/span> <a href='https:\/\/doi.org\/10.1145\/3736252.3742535' target='_blank' rel=\"noopener noreferrer\">Zero-Knowledge Mechanisms.<\/a> <span class='venue'>\u2014 EC<\/span><\/li>\n<li><span class='authors'>Zeyu Liu 0004, Katerina Sotiraki, <strong class='group'>Eran Tromer<\/strong>, Yunhao Wang.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-91131-6_5' target='_blank' rel=\"noopener noreferrer\">Snake-Eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption.<\/a> <span class='venue'>\u2014 EUROCRYPT<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>.<\/span> <a href='https:\/\/www.dagstuhl.de\/dagpub\/978-3-95977-367-6' target='_blank' rel=\"noopener noreferrer\">6th Symposium on Foundations of Responsible Computing, FORC 2025, June 4-6, 2025, Stanford University, CA, USA<\/a> <span class='venue'>\u2014 FORC, LIPIcs<\/span><\/li>\n<li><span class='authors'>Leandro Gomes 0001, Patrick Baillot, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-90897-2_12' target='_blank' rel=\"noopener noreferrer\">BiGKAT: An Algebraic Framework for Relational Verification of Probabilistic Programs.<\/a> <span class='venue'>\u2014 FoSSaCS<\/span><\/li>\n<li><span class='authors'><strong class='group'>Alishah Chator<\/strong>, Matthew Green 0001, Pratyush Ranjan Tiwari.<\/span> <a href='https:\/\/doi.org\/10.62056\/a3wa3z10k' target='_blank' rel=\"noopener noreferrer\">SoK: Privacy-Preserving Signatures.<\/a> <span class='venue'>\u2014 IACR Commun. Cryptol.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ran Canetti<\/strong>, Ivan Damg\u00e5rd, Sebastian Kolby, Divya Ravi 0001, Sophia Yakoubov.<\/span> <a href='https:\/\/eprint.iacr.org\/2025\/525' target='_blank' rel=\"noopener noreferrer\">Deniable Secret Sharing.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Colin Finkbeiner, Mohamed E. Najd, <strong class='group'>Julia Guskind<\/strong>, Ghada Almashaqbeh.<\/span> <a href='https:\/\/eprint.iacr.org\/2025\/043' target='_blank' rel=\"noopener noreferrer\">SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ran Canetti<\/strong>, <strong class='group'>Megan Chen<\/strong>.<\/span> <a href='https:\/\/eprint.iacr.org\/2025\/1103' target='_blank' rel=\"noopener noreferrer\">Universally Composable Succinct Vector Commitments and Applications.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ji Luo<\/strong>, Wuyang Zhuo, Siyan Liu, Bingfei Xu.<\/span> <a href='https:\/\/doi.org\/10.1109\/ACCESS.2025.3534998' target='_blank' rel=\"noopener noreferrer\">Corrections to &amp;quot;The Optimization of Carbon Emission Prediction in Low Carbon Energy Economy Under Big Data&amp;quot;.<\/a> <span class='venue'>\u2014 IEEE Access<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ji Luo<\/strong>, Zijian Xiao, Zuxin Li, Xuecheng Chen, Chaopeng Hong, Xiao-Ping Zhang 0002, Xinlei Chen.<\/span> <a href='https:\/\/doi.org\/10.1109\/TMC.2025.3555448' target='_blank' rel=\"noopener noreferrer\">SmartSpr: A Physics-Informed Mobile Sprinkler Scheduling System for Reducing Urban Particulate Matter Pollution.<\/a> <span class='venue'>\u2014 IEEE Trans. Mob. Comput.<\/span><\/li>\n<li><span class='authors'>Jian Wang 0078, <strong class='group'>Yiding Zhang<\/strong>, Zhengyang Song, Ting Cheng.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-981-95-0695-8_26' target='_blank' rel=\"noopener noreferrer\">BiGDC-BrainAgeNet: Enhancing EEG-Based Brain Age Prediction with Bidirectional Graph Diffusion Convolutions.<\/a> <span class='venue'>\u2014 ISBRA<\/span><\/li>\n<li><span class='authors'>Esty Kelman, <strong class='group'>Ephraim Linder<\/strong>, <strong class='group'>Sofya Raskhodnikova<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.ITCS.2025.65' target='_blank' rel=\"noopener noreferrer\">Online Versus Offline Adversaries in Property Testing.<\/a> <span class='venue'>\u2014 ITCS<\/span><\/li>\n<li><span class='authors'>Chang Xu, Junqi Ding, Bo Wang, Yan Qiao, Lingxian Zhang, <strong class='group'>Yiding Zhang<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1016\/j.jii.2024.100748' target='_blank' rel=\"noopener noreferrer\">Multimodal-information-based optimized agricultural prescription recommendation system of crop electronic medical records.<\/a> <span class='venue'>\u2014 J. Ind. Inf. Integr.<\/span><\/li>\n<li><span class='authors'>Jamie Hayes, <strong class='group'>Marika Swanberg<\/strong>, Harsh Chaudhari, Itay Yona, Ilia Shumailov, Milad Nasr, Christopher A. Choquette-Choo, Katherine Lee, A. Feder Cooper.<\/span> <a href='https:\/\/doi.org\/10.18653\/v1\/2025.naacl-long.469' target='_blank' rel=\"noopener noreferrer\">Measuring memorization in language models via probabilistic extraction.<\/a> <span class='venue'>\u2014 NAACL<\/span><\/li>\n<li><span class='authors'>Chang Xu, <strong class='group'>Yiding Zhang<\/strong>, Lei Zhao, Haojie Wen, Lingxian Zhang.<\/span> <a href='https:\/\/doi.org\/10.1016\/j.neunet.2025.107597' target='_blank' rel=\"noopener noreferrer\">Knowledge-guided adaptive spatial-temporal graph contrastive learning framework: Regional crop diseases prediction based on electronic medical records.<\/a> <span class='venue'>\u2014 Neural Networks<\/span><\/li>\n<li><span class='authors'>Yingjie Jiang, Du Tang, <strong class='group'>Ji Luo<\/strong>, Yu Chen, Bofang Zheng, Yaojun Qiao.<\/span> <a href='https:\/\/ieeexplore.ieee.org\/document\/11046912' target='_blank' rel=\"noopener noreferrer\">Mitigation of Power Offset Induced by Hard-Decision-Error in Fiber Longitudinal Power Profile Estimation.<\/a> <span class='venue'>\u2014 OFC<\/span><\/li>\n<li><span class='authors'><strong class='group'>Megan Chen<\/strong>, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, Swagata Sasmal.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-91820-9_13' target='_blank' rel=\"noopener noreferrer\">Universally Composable Non-interactive Zero-Knowledge from Sigma Protocols via a New Straight-Line Compiler.<\/a> <span class='venue'>\u2014 PKC<\/span><\/li>\n<li><span class='authors'><strong class='group'>Sofya Raskhodnikova<\/strong>, Teresa Anna Steiner.<\/span> <a href='https:\/\/doi.org\/10.1145\/3725236' target='_blank' rel=\"noopener noreferrer\">Fully Dynamic Algorithms for Graph Databases with Edge Differential Privacy.<\/a> <span class='venue'>\u2014 Proc. ACM Manag. Data<\/span><\/li>\n<li><span class='authors'>Qiancheng Fu, Ankush Das, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1145\/3729317' target='_blank' rel=\"noopener noreferrer\">Probabilistic Refinement Session Types.<\/a> <span class='venue'>\u2014 Proc. ACM Program. Lang.<\/span><\/li>\n<li><span class='authors'>Talya Eden, Quanquan C. Liu, <strong class='group'>Sofya Raskhodnikova<\/strong>, Adam D. Smith 0001.<\/span> <a href='https:\/\/doi.org\/10.1002\/rsa.70002' target='_blank' rel=\"noopener noreferrer\">Triangle Counting With Local Edge Differential Privacy.<\/a> <span class='venue'>\u2014 Random Struct. Algorithms<\/span><\/li>\n<li><span class='authors'><strong class='group'>Sofya Raskhodnikova<\/strong>, <strong class='group'>Satchit Sivakumar<\/strong>, Adam Smith 0006, <strong class='group'>Marika Swanberg<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1137\/22m1538703' target='_blank' rel=\"noopener noreferrer\">Differentially Private Sampling from Distributions.<\/a> <span class='venue'>\u2014 SIAM J. Comput.<\/span><\/li>\n<li><span class='authors'>Jane Lange, <strong class='group'>Ephraim Linder<\/strong>, <strong class='group'>Sofya Raskhodnikova<\/strong>, Arsen Vasilyan.<\/span> <a href='https:\/\/doi.org\/10.1137\/1.9781611978322.93' target='_blank' rel=\"noopener noreferrer\">Local Lipschitz Filters for Bounded-Range Functions with Applications to Arbitrary Real-Valued Functions.<\/a> <span class='venue'>\u2014 SODA<\/span><\/li>\n<li><span class='authors'><strong class='group'>Shlomi Hod<\/strong>, <strong class='group'>Ran Canetti<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1109\/SP61157.2025.00101' target='_blank' rel=\"noopener noreferrer\">Differentially Private Release of Israel&amp;apos;s National Registry of Live Births.<\/a> <span class='venue'>\u2014 SP<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ephraim Linder<\/strong>, <strong class='group'>Sofya Raskhodnikova<\/strong>, Adam Smith 0006, Thomas Steinke 0002.<\/span> <a href='https:\/\/doi.org\/10.1145\/3717823.3718247' target='_blank' rel=\"noopener noreferrer\">Privately Evaluating Untrusted Black-Box Functions.<\/a> <span class='venue'>\u2014 STOC<\/span><\/li>\n<\/ol><\/div>\n<h2>2024<\/h2>\n<div class='card'>\n<ol>\n<li><span class='authors'>Piotr Berman, Meiram Murzabulatov, <strong class='group'>Sofya Raskhodnikova<\/strong>, Dragos-Florian Ristache.<\/span> <a href='https:\/\/doi.org\/10.1007\/s00453-024-01248-x' target='_blank' rel=\"noopener noreferrer\">Testing Connectedness of Images.<\/a> <span class='venue'>\u2014 Algorithmica<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, Gautam Kamath 0001, Argyris Mouzakis, Vikrant Singhal.<\/span> <a href='https:\/\/proceedings.mlr.press\/v237\/bun24b.html' target='_blank' rel=\"noopener noreferrer\">Not All Learnable Distribution Classes are Privately Learnable.<\/a> <span class='venue'>\u2014 ALT<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, Aloni Cohen, Rathin Desai.<\/span> <a href='https:\/\/proceedings.mlr.press\/v237\/bun24a.html' target='_blank' rel=\"noopener noreferrer\">Private PAC Learning May be Harder than Online Learning.<\/a> <span class='venue'>\u2014 ALT<\/span><\/li>\n<li><span class='authors'>Sachin Chhabra, Yaoxin Zhuo, Riti Paul, Javad Sohankar, <strong class='group'>Ji Luo<\/strong>, Shan Li, Wendy Lee, Yi Su, Teresa Wu, Baoxin Li.<\/span> <a href='https:\/\/doi.org\/10.1109\/BHI62660.2024.10913765' target='_blank' rel=\"noopener noreferrer\">Translation of Partially Paired Images with Generative Adversarial Networks.<\/a> <span class='venue'>\u2014 BHI<\/span><\/li>\n<li><span class='authors'>Heila Precel, <strong class='group'>Allison McDonald<\/strong>, Brent J. Hecht, Nicholas Vincent.<\/span> <a href='https:\/\/doi.org\/10.1145\/3613904.3642749' target='_blank' rel=\"noopener noreferrer\">A Canary in the AI Coal Mine: American Jews May Be Disproportionately Harmed by Intellectual Property Dispossession in Large Language Model Training.<\/a> <span class='venue'>\u2014 CHI<\/span><\/li>\n<li><span class='authors'>Kathryn D. Coduto, <strong class='group'>Allison McDonald<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1145\/3613904.3642722' target='_blank' rel=\"noopener noreferrer\">&amp;quot;Delete it and Move On&amp;quot;: Digital Management of Shared Sexual Content after a Breakup.<\/a> <span class='venue'>\u2014 CHI<\/span><\/li>\n<li><span class='authors'>Chang Xu, Lei Zhao, Haojie Wen, <strong class='group'>Yiding Zhang<\/strong>, Lingxian Zhang.<\/span> <a href='https:\/\/doi.org\/10.1016\/j.compag.2024.108790' target='_blank' rel=\"noopener noreferrer\">A novel cascaded multi-task method for crop prescription recommendation based on electronic medical record.<\/a> <span class='venue'>\u2014 Comput. Electron. Agric.<\/span><\/li>\n<li><span class='authors'>Heila Precel, <strong class='group'>Allison McDonald<\/strong>, Brent J. Hecht, Nicholas Vincent.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2403.13073' target='_blank' rel=\"noopener noreferrer\">A Canary in the AI Coal Mine: American Jews May Be Disproportionately Harmed by Intellectual Property Dispossession in Large Language Model Training.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Rachel Cummings, <strong class='group'>Shlomi Hod<\/strong>, Jayshree Sarathy, <strong class='group'>Marika Swanberg<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2405.01716' target='_blank' rel=\"noopener noreferrer\">ATTAXONOMY: Unpacking Differential Privacy Guarantees Against Practical Adversaries.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>R\u00f3bert Istvan Busa-Fekete, Travis Dick, Claudio Gentile, Andr\u00e9s Mu\u00f1oz Medina, Adam Smith 0006, <strong class='group'>Marika Swanberg<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2406.02797' target='_blank' rel=\"noopener noreferrer\">Auditing Privacy Mechanisms via Label Inference Attacks.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Shlomi Hod<\/strong>, <strong class='group'>Ran Canetti<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2405.00267' target='_blank' rel=\"noopener noreferrer\">Differentially Private Release of Israel&amp;apos;s National Registry of Live Births.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Cheng Zhang, Arthur Azevedo de Amorim, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2404.18417' target='_blank' rel=\"noopener noreferrer\">Domain Reasoning in TopKAT.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Sofya Raskhodnikova<\/strong>, Teresa Anna Steiner.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2409.17623' target='_blank' rel=\"noopener noreferrer\">Fully Dynamic Graph Algorithms with Edge Differential Privacy.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Vitaly Feldman, Audra McMillan, <strong class='group'>Satchit Sivakumar<\/strong>, Kunal Talwar.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2406.19566' target='_blank' rel=\"noopener noreferrer\">Instance-Optimal Private Density Estimation in the Wasserstein Distance.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Arthur Azevedo de Amorim, Cheng Zhang, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2411.15979' target='_blank' rel=\"noopener noreferrer\">Kleene algebra with commutativity conditions is undecidable.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Jamie Hayes, <strong class='group'>Marika Swanberg<\/strong>, Harsh Chaudhari, Itay Yona, Ilia Shumailov.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2410.19482' target='_blank' rel=\"noopener noreferrer\">Measuring memorization through probabilistic discoverable extraction.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, Gautam Kamath 0001, Argyris Mouzakis, Vikrant Singhal.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2402.00267' target='_blank' rel=\"noopener noreferrer\">Not All Learnable Distribution Classes are Privately Learnable.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Esty Kelman, <strong class='group'>Ephraim Linder<\/strong>, <strong class='group'>Sofya Raskhodnikova<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2411.18617' target='_blank' rel=\"noopener noreferrer\">Online versus Offline Adversaries in Property Testing.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Adam Block, <strong class='group'>Mark Bun<\/strong>, Rathin Desai, Abhishek Shetty, Zhiwei Steven Wu.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2402.09483' target='_blank' rel=\"noopener noreferrer\">Oracle-Efficient Differentially Private Learning with Public Data.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Maryam Aliakbarpour, Konstantina Bairaktari, Adam D. Smith 0001, <strong class='group'>Marika Swanberg<\/strong>, Jonathan R. Ullman.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2412.12374' target='_blank' rel=\"noopener noreferrer\">Privacy in Metalearning and Multitask Learning: Modeling and Separations.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, Aloni Cohen, Rathin Desai.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2402.11119' target='_blank' rel=\"noopener noreferrer\">Private PAC Learning May be Harder than Online Learning.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Marco Gaboardi<\/strong>, Michael Hay, Salil P. Vadhan.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2403.11088' target='_blank' rel=\"noopener noreferrer\">Programming Frameworks for Differential Privacy.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Vaughn Hamilton, Gabriel Kaptchuk, <strong class='group'>Allison McDonald<\/strong>, Elissa M. Redmiles.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2403.10688' target='_blank' rel=\"noopener noreferrer\">Safer Digital Intimacy For Sex Workers And Beyond: A Technical Research Agenda.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Kira Goldner<\/strong>, Taylor Lundy.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2402.12340' target='_blank' rel=\"noopener noreferrer\">Simple Mechanisms for Utility Maximization: Approximating Welfare in the I.I.D. Unit-Demand Setting.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Li Qiwei, <strong class='group'>Allison McDonald<\/strong>, Oliver L. Haimson, Sarita Schoenebeck, Eric Gilbert.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2405.03585' target='_blank' rel=\"noopener noreferrer\">The Sociotechnical Stack: Opportunities for Social Computing Research in Non-consensual Intimate Media.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Palak Jain 0004, Adam Smith 0006, <strong class='group'>Connor Wagaman<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2403.04630' target='_blank' rel=\"noopener noreferrer\">Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Yi Liu 0090, Yu Cui, Wen Cheng, Will Neil Browne, Bing Xue 0001, Chengyuan Zhu, <strong class='group'>Yiding Zhang<\/strong>, Mingkai Sheng, Lingfang Zeng.<\/span> <a href='https:\/\/doi.org\/10.1145\/3638529.3654007' target='_blank' rel=\"noopener noreferrer\">A Phenotypic Learning Classifier System for Problems with Continuous Features.<\/a> <span class='venue'>\u2014 GECCO<\/span><\/li>\n<li><span class='authors'><strong class='group'>Sam Buxbaum<\/strong>, Mohammad Mahmoody.<\/span> <a href='https:\/\/doi.org\/10.62056\/a6ksr-10k' target='_blank' rel=\"noopener noreferrer\">A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography.<\/a> <span class='venue'>\u2014 IACR Commun. Cryptol.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Nicolas Alhaddad<\/strong>, <strong class='group'>Mayank Varia<\/strong>, Ziling Yang.<\/span> <a href='https:\/\/doi.org\/10.62056\/a0qj5w7sf' target='_blank' rel=\"noopener noreferrer\">Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications.<\/a> <span class='venue'>\u2014 IACR Commun. Cryptol.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Sam Buxbaum<\/strong>, Mohammad Mahmoody.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/2095' target='_blank' rel=\"noopener noreferrer\">A Note on the Minimality of One-Way Functions in Post-Quantum Cryptography.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Nicolas Alhaddad<\/strong>, <strong class='group'>Leonid Reyzin<\/strong>, <strong class='group'>Mayank Varia<\/strong>.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/685' target='_blank' rel=\"noopener noreferrer\">Committing AVID with Partial Retrieval and Optimal Storage.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Zeyu Liu 0004, Katerina Sotiraki, <strong class='group'>Eran Tromer<\/strong>, Yunhao Wang.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/510' target='_blank' rel=\"noopener noreferrer\">DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Liyan Chen, Yilei Chen, Zikuan Huang, Nuozhou Sun, Tianqi Yang, <strong class='group'>Yiding Zhang<\/strong>.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/256' target='_blank' rel=\"noopener noreferrer\">Fiat-Shamir for Bounded-Depth Adversaries.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Nicolas Alhaddad<\/strong>, <strong class='group'>Mayank Varia<\/strong>, Ziling Yang.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/326' target='_blank' rel=\"noopener noreferrer\">Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Zeyu Liu 0004, <strong class='group'>Eran Tromer<\/strong>, Yunhao Wang.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/204' target='_blank' rel=\"noopener noreferrer\">PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ryan Little<\/strong>, Lucy Qin, <strong class='group'>Mayank Varia<\/strong>.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/962' target='_blank' rel=\"noopener noreferrer\">Secure Account Recovery for a Privacy-Preserving Web Service.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ran Canetti<\/strong>, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/006' target='_blank' rel=\"noopener noreferrer\">Towards general-purpose program obfuscation via local mixing.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Megan Chen<\/strong>, Pousali Dey, Chaya Ganesh, Pratyay Mukherjee, Pratik Sarkar, Swagata Sasmal.<\/span> <a href='https:\/\/eprint.iacr.org\/2024\/1713' target='_blank' rel=\"noopener noreferrer\">Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Cheng Zhang, Arthur Azevedo de Amorim, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.ICALP.2024.157' target='_blank' rel=\"noopener noreferrer\">Domain Reasoning in TopKAT.<\/a> <span class='venue'>\u2014 ICALP<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ji Luo<\/strong>, Wuyang Zhuo, Siyan Liu, Bingfei Xu.<\/span> <a href='https:\/\/doi.org\/10.1109\/ACCESS.2024.3351468' target='_blank' rel=\"noopener noreferrer\">The Optimization of Carbon Emission Prediction in Low Carbon Energy Economy Under Big Data.<\/a> <span class='venue'>\u2014 IEEE Access<\/span><\/li>\n<li><span class='authors'>Vaughn Hamilton, Gabriel Kaptchuk, <strong class='group'>Allison McDonald<\/strong>, Elissa M. Redmiles.<\/span> <a href='https:\/\/doi.org\/10.1109\/MSEC.2023.3324615' target='_blank' rel=\"noopener noreferrer\">Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda.<\/a> <span class='venue'>\u2014 IEEE Secur. Priv.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ji Luo<\/strong>, Zhenyu Wang, Pei Jiang 0006, Hongtao Xia, Yang Yang 0031, Yong Zhong.<\/span> <a href='https:\/\/doi.org\/10.1109\/TIM.2024.3460936' target='_blank' rel=\"noopener noreferrer\">Design and Modeling of Large Helical Deformation Composite Actuators Under Complicated Loading Conditions.<\/a> <span class='venue'>\u2014 IEEE Trans. Instrum. Meas.<\/span><\/li>\n<li><span class='authors'>Shi Hu, Muhammad Aamir Nadeem, Ramayah Thurasamy, <strong class='group'>Ji Luo<\/strong>, Xiaobo Yi.<\/span> <a href='https:\/\/doi.org\/10.4018\/ijabim.340775' target='_blank' rel=\"noopener noreferrer\">Impacts of Procedural Justice and Ethical Leadership on Organizational Innovation.<\/a> <span class='venue'>\u2014 Int. J. Asian Bus. Inf. Manag.<\/span><\/li>\n<li><span class='authors'>Zijian Xiao, <strong class='group'>Ji Luo<\/strong>, Xuecheng Chen, Yuhan Cheng, Haoyang Wang 0012, Xinlei Chen.<\/span> <a href='https:\/\/doi.org\/10.1109\/IPSN61024.2024.00040' target='_blank' rel=\"noopener noreferrer\">Poster Abstract: Sprinkler-UAV Cooperative Active Scheduling System.<\/a> <span class='venue'>\u2014 IPSN<\/span><\/li>\n<li><span class='authors'>Omri Ben-Eliezer, Esty Kelman, Uri Meir, <strong class='group'>Sofya Raskhodnikova<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.ITCS.2024.11' target='_blank' rel=\"noopener noreferrer\">Property Testing with Online Adversaries.<\/a> <span class='venue'>\u2014 ITCS<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ji Luo<\/strong>, Wuyang Zhuo, Binfei Xu.<\/span> <a href='https:\/\/doi.org\/10.1142\/s0218126624501536' target='_blank' rel=\"noopener noreferrer\">A Deep Neural Network-Based Assistive Decision Method for Financial Risk Prediction in Carbon Trading Market.<\/a> <span class='venue'>\u2014 J. Circuits Syst. Comput.<\/span><\/li>\n<li><span class='authors'>Bojing Liu, Mengxiang Li, Zihui Ji, Hongming Li, <strong class='group'>Ji Luo<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.4018\/joeuc.336284' target='_blank' rel=\"noopener noreferrer\">Intelligent Productivity Transformation: Corporate Market Demand Forecasting With the Aid of an AI Virtual Assistant.<\/a> <span class='venue'>\u2014 J. Organ. End User Comput.<\/span><\/li>\n<li><span class='authors'>Alon Eden, Michal Feldman, Amos Fiat, <strong class='group'>Kira Goldner<\/strong>, Anna R. Karlin.<\/span> <a href='https:\/\/doi.org\/10.1287\/moor.2023.1371' target='_blank' rel=\"noopener noreferrer\">Combinatorial Auctions with Interdependent Valuations: SOS to the Rescue.<\/a> <span class='venue'>\u2014 Math. Oper. Res.<\/span><\/li>\n<li><span class='authors'>R\u00f3bert Busa-Fekete, Travis Dick, Claudio Gentile, Andr\u00e9s Mu\u00f1oz Medina, Adam Smith 0006, <strong class='group'>Marika Swanberg<\/strong>.<\/span> <a href='http:\/\/papers.nips.cc\/paper_files\/paper\/2024\/hash\/97005e2b425c93015a91c312ba5c5298-Abstract-Conference.html' target='_blank' rel=\"noopener noreferrer\">Auditing Privacy Mechanisms via Label Inference Attacks.<\/a> <span class='venue'>\u2014 NeurIPS<\/span><\/li>\n<li><span class='authors'>Vitaly Feldman, Audra McMillan, <strong class='group'>Satchit Sivakumar<\/strong>, Kunal Talwar.<\/span> <a href='http:\/\/papers.nips.cc\/paper_files\/paper\/2024\/hash\/a406c9f8eb70032a21110a4d86735ab9-Abstract-Conference.html' target='_blank' rel=\"noopener noreferrer\">Instance-Optimal Private Density Estimation in the Wasserstein Distance.<\/a> <span class='venue'>\u2014 NeurIPS<\/span><\/li>\n<li><span class='authors'>Maryam Aliakbarpour, <strong class='group'>Mark Bun<\/strong>, Adam Smith 0006.<\/span> <a href='http:\/\/papers.nips.cc\/paper_files\/paper\/2024\/hash\/ffee3090eac0aae698b2d77ac5642c2c-Abstract-Conference.html' target='_blank' rel=\"noopener noreferrer\">Optimal Hypothesis Selection in (Almost) Linear Time.<\/a> <span class='venue'>\u2014 NeurIPS<\/span><\/li>\n<li><span class='authors'>Adam Block, <strong class='group'>Mark Bun<\/strong>, Rathin Desai, Abhishek Shetty, Zhiwei Steven Wu.<\/span> <a href='http:\/\/papers.nips.cc\/paper_files\/paper\/2024\/hash\/cd9664c7094d90e512ce27f2fd58198b-Abstract-Conference.html' target='_blank' rel=\"noopener noreferrer\">Oracle-Efficient Differentially Private Learning with Public Data.<\/a> <span class='venue'>\u2014 NeurIPS<\/span><\/li>\n<li><span class='authors'>Li Qiwei, <strong class='group'>Allison McDonald<\/strong>, Oliver L. Haimson, Sarita Schoenebeck, Eric Gilbert.<\/span> <a href='https:\/\/doi.org\/10.1145\/3686914' target='_blank' rel=\"noopener noreferrer\">The Sociotechnical Stack: Opportunities for Social Computing Research in Non-Consensual Intimate Media.<\/a> <span class='venue'>\u2014 Proc. ACM Hum. Comput. Interact.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, <strong class='group'>Marco Gaboardi<\/strong>, Marcel Neunhoeffer, Wanrong Zhang 0001.<\/span> <a href='https:\/\/doi.org\/10.1145\/3651595' target='_blank' rel=\"noopener noreferrer\">Continual Release of Differentially Private Synthetic Data from Longitudinal Data Collections.<\/a> <span class='venue'>\u2014 Proc. ACM Manag. Data<\/span><\/li>\n<li><span class='authors'>Jiawen Liu, Weihao Qu, <strong class='group'>Marco Gaboardi<\/strong>, Deepak Garg 0001, Jonathan R. Ullman.<\/span> <a href='https:\/\/doi.org\/10.1145\/3656414' target='_blank' rel=\"noopener noreferrer\">Program Analysis for Adaptive Data Analysis.<\/a> <span class='venue'>\u2014 Proc. ACM Program. Lang.<\/span><\/li>\n<li><span class='authors'>Elisabet Lobo Vesga, Alejandro Russo, <strong class='group'>Marco Gaboardi<\/strong>, Carlos Tom\u00e9 Corti\u00f1as.<\/span> <a href='https:\/\/doi.org\/10.1145\/3689726' target='_blank' rel=\"noopener noreferrer\">Sensitivity by Parametricity.<\/a> <span class='venue'>\u2014 Proc. ACM Program. Lang.<\/span><\/li>\n<li><span class='authors'>Tushar M. Jois, Gabrielle Beck, Sofia Belikovetsky, Joseph Carrigan, <strong class='group'>Alishah Chator<\/strong>, Logan Kostick, Maximilian Zinkus, Gabriel Kaptchuk, Aviel D. Rubin.<\/span> <a href='https:\/\/doi.org\/10.56553\/popets-2024-0026' target='_blank' rel=\"noopener noreferrer\">SocIoTy: Practical Cryptography in Smart Home Contexts.<\/a> <span class='venue'>\u2014 Proc. Priv. Enhancing Technol.<\/span><\/li>\n<li><span class='authors'>Hadley Black, Iden Kalemaj, <strong class='group'>Sofya Raskhodnikova<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1002\/rsa.21211' target='_blank' rel=\"noopener noreferrer\">Isoperimetric inequalities for real-valued functions with applications to monotonicity testing.<\/a> <span class='venue'>\u2014 Random Struct. Algorithms<\/span><\/li>\n<li><span class='authors'>Jianyun Liang, Jiyao Xu, Kun Wu, <strong class='group'>Ji Luo<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.3390\/rs16162946' target='_blank' rel=\"noopener noreferrer\">Latitudinal Characteristics of Nighttime Electron Temperature in the Topside Ionosphere and Its Dependence on Solar and Geomagnetic Activities.<\/a> <span class='venue'>\u2014 Remote. Sens.<\/span><\/li>\n<li><span class='authors'>Shuchi Chawla 0001, <strong class='group'>Kira Goldner<\/strong>, Anna R. Karlin, J. Benjamin Miller.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-71033-9_22' target='_blank' rel=\"noopener noreferrer\">Non-Adaptive Matroid Prophet Inequalities.<\/a> <span class='venue'>\u2014 SAGT<\/span><\/li>\n<li><span class='authors'>Meryem Essaidi, <strong class='group'>Kira Goldner<\/strong>, S. Matthew Weinberg.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-71033-9_18' target='_blank' rel=\"noopener noreferrer\">To Regulate or Not to Regulate: Using Revenue Maximization Tools to Maximize Consumer Utility.<\/a> <span class='venue'>\u2014 SAGT<\/span><\/li>\n<li><span class='authors'>Ethan Seow, Yan Tong, <strong class='group'>Eli Baum<\/strong>, <strong class='group'>Sam Buxbaum<\/strong>, Muhammad Faisal 0001, <strong class='group'>John Liagouris<\/strong>, Vasiliki Kalavri, <strong class='group'>Mayank Varia<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1145\/3626246.3654749' target='_blank' rel=\"noopener noreferrer\">QueryShield: Cryptographically Secure Analytics in the Cloud.<\/a> <span class='venue'>\u2014 SIGMOD Conference Companion<\/span><\/li>\n<li><span class='authors'>Zeyu Liu 0004, <strong class='group'>Eran Tromer<\/strong>, Yunhao Wang.<\/span> <a href='https:\/\/doi.org\/10.1109\/SP54263.2024.00115' target='_blank' rel=\"noopener noreferrer\">Group Oblivious Message Retrieval.<\/a> <span class='venue'>\u2014 SP<\/span><\/li>\n<li><span class='authors'>Palak Jain 0004, Adam Smith 0006, <strong class='group'>Connor Wagaman<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1109\/SP54263.2024.00196' target='_blank' rel=\"noopener noreferrer\">Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation.<\/a> <span class='venue'>\u2014 SP<\/span><\/li>\n<li><span class='authors'><strong class='group'>Sofya Raskhodnikova<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.STACS.2024.2' target='_blank' rel=\"noopener noreferrer\">The Role of Local Algorithms in Privacy (Invited Talk).<\/a> <span class='venue'>\u2014 STACS<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ran Canetti<\/strong>, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-78023-3_2' target='_blank' rel=\"noopener noreferrer\">Towards General-Purpose Program Obfuscation via Local Mixing.<\/a> <span class='venue'>\u2014 TCC<\/span><\/li>\n<li><span class='authors'>Zeyu Liu 0004, <strong class='group'>Eran Tromer<\/strong>, Yunhao Wang.<\/span> <a href='https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/liu-zeyu' target='_blank' rel=\"noopener noreferrer\">PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation.<\/a> <span class='venue'>\u2014 USENIX Security Symposium<\/span><\/li>\n<li><span class='authors'>Ananta Soneji, Vaughn Hamilton, Adam Doup\u00e9, <strong class='group'>Allison McDonald<\/strong>, Elissa M. Redmiles.<\/span> <a href='https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/soneji' target='_blank' rel=\"noopener noreferrer\">&amp;quot;I feel physically safe but not politically safe&amp;quot;: Understanding the Digital Threats and Safety Practices of OnlyFans Creators.<\/a> <span class='venue'>\u2014 USENIX Security Symposium<\/span><\/li>\n<li><span class='authors'><strong class='group'>Sharon Goldberg<\/strong>, Miro Haller, Nadia Heninger, Mike Milano, Dan Shumow, Marc Stevens 0001, Adam Suhl.<\/span> <a href='https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/goldberg' target='_blank' rel=\"noopener noreferrer\">RADIUS\/UDP Considered Harmful.<\/a> <span class='venue'>\u2014 USENIX Security Symposium<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ryan Little<\/strong>, Lucy Qin, <strong class='group'>Mayank Varia<\/strong>.<\/span> <a href='https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/little' target='_blank' rel=\"noopener noreferrer\">Secure Account Recovery for a Privacy-Preserving Web Service.<\/a> <span class='venue'>\u2014 USENIX Security Symposium<\/span><\/li>\n<li><span class='authors'>Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, <strong class='group'>Eran Tromer<\/strong>, Xiao Wang 0012, Ning Luo.<\/span> <a href='https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/luick' target='_blank' rel=\"noopener noreferrer\">ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge.<\/a> <span class='venue'>\u2014 USENIX Security Symposium<\/span><\/li>\n<\/ol><\/div>\n<h2>2023<\/h2>\n<div class='card'>\n<ol>\n<li><span class='authors'><strong class='group'>Marco Gaboardi<\/strong>, Igor Walukiewicz.<\/span> <a href='https:\/\/doi.org\/10.1145\/3636362.3636370' target='_blank' rel=\"noopener noreferrer\">Report on Logic in Computer Science (LICS&amp;apos;23).<\/a> <span class='venue'>\u2014 ACM SIGLOG News<\/span><\/li>\n<li><span class='authors'>Piotr Berman, Meiram Murzabulatov, <strong class='group'>Sofya Raskhodnikova<\/strong>, Dragos Ristache.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.APPROX\/RANDOM.2023.66' target='_blank' rel=\"noopener noreferrer\">Testing Connectedness of Images.<\/a> <span class='venue'>\u2014 APPROX\/RANDOM<\/span><\/li>\n<li><span class='authors'>Aloni Cohen, Adam D. Smith 0001, <strong class='group'>Marika Swanberg<\/strong>, Prashant Nalini Vasudevan.<\/span> <a href='https:\/\/doi.org\/10.1145\/3576915.3616585' target='_blank' rel=\"noopener noreferrer\">Control, Confidentiality, and the Right to be Forgotten.<\/a> <span class='venue'>\u2014 CCS<\/span><\/li>\n<li><span class='authors'>Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, <strong class='group'>Eran Tromer<\/strong>, Boris Zadov, Yuval Elovici.<\/span> <a href='https:\/\/doi.org\/10.1145\/3576915.3616620' target='_blank' rel=\"noopener noreferrer\">Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.<\/a> <span class='venue'>\u2014 CCS<\/span><\/li>\n<li><span class='authors'>Vaughn Hamilton, Ananta Soneji, <strong class='group'>Allison McDonald<\/strong>, Elissa M. Redmiles.<\/span> <a href='https:\/\/doi.org\/10.1145\/3544548.3580730' target='_blank' rel=\"noopener noreferrer\">&amp;quot;Nudes? Shouldn&amp;apos;t I charge for these?&amp;quot;: Motivations of New Sexual Content Creators on OnlyFans.<\/a> <span class='venue'>\u2014 CHI<\/span><\/li>\n<li><span class='authors'>Chunbao Xie, Ling Zhong, <strong class='group'>Jiangrong Luo<\/strong>, <strong class='group'>Ji Luo<\/strong>, Yingmiao Wu, Shuai Zheng, Lingxi Jiang, Jianbo Zhang, Yi Shi.<\/span> <a href='https:\/\/doi.org\/10.1016\/j.compbiomed.2023.107224' target='_blank' rel=\"noopener noreferrer\">Identification of mutation gene prognostic biomarker in multiple myeloma through gene panel exome sequencing and transcriptome analysis in Chinese population.<\/a> <span class='venue'>\u2014 Comput. Biol. Medicine<\/span><\/li>\n<li><span class='authors'>Amy Rathore, Marina Blanton, <strong class='group'>Marco Gaboardi<\/strong>, Lukasz Ziarek.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2306.00308' target='_blank' rel=\"noopener noreferrer\">A Formal Model for Secure Multiparty Computation.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, Nadezhda Voronova.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2303.03921' target='_blank' rel=\"noopener noreferrer\">Approximate degree lower bounds for oracle identification problems.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Santiago Cu\u00e9llar, Bill Harris, James Parker, Stuart Pernsteiner, <strong class='group'>Eran Tromer<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2301.01321' target='_blank' rel=\"noopener noreferrer\">Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Claudio Chamon, Andrei E. Ruckenstein, Eduardo R. Mucciolo, <strong class='group'>Ran Canetti<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2309.05731' target='_blank' rel=\"noopener noreferrer\">Circuit complexity and functionality: a thermodynamic perspective.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Alon Eden, Michal Feldman, <strong class='group'>Kira Goldner<\/strong>, Simon Mauras, Divyarthi Mohan.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2310.00958' target='_blank' rel=\"noopener noreferrer\">Constant Approximation for Private Interdependent Valuations.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, <strong class='group'>Marco Gaboardi<\/strong>, Marcel Neunhoeffer, Wanrong Zhang 0001.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2306.07884' target='_blank' rel=\"noopener noreferrer\">Continual Release of Differentially Private Synthetic Data.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Palak Jain 0004, Iden Kalemaj, <strong class='group'>Sofya Raskhodnikova<\/strong>, <strong class='group'>Satchit Sivakumar<\/strong>, Adam D. Smith 0001.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2306.06723' target='_blank' rel=\"noopener noreferrer\">Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Shurong Lin, <strong class='group'>Mark Bun<\/strong>, <strong class='group'>Marco Gaboardi<\/strong>, Eric D. Kolaczyk, Adam Smith 0006.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2301.08324' target='_blank' rel=\"noopener noreferrer\">Differentially Private Confidence Intervals for Proportions under Stratified Random Sampling.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Marika Swanberg<\/strong>, Damien Desfontaines, Samuel Haney.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2301.01998' target='_blank' rel=\"noopener noreferrer\">DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Xuanpeng Zhao, Guoyuan Wu 0001, Akula Venkatram, <strong class='group'>Ji Luo<\/strong>, Peng Hao 0001, Kanok Boriboonsomsin, Shaohua Hu.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2306.15753' target='_blank' rel=\"noopener noreferrer\">Integrated Simulation Platform for Quantifying the Traffic-Induced Environmental and Health Impacts.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Jane Lange, <strong class='group'>Ephraim Linder<\/strong>, <strong class='group'>Sofya Raskhodnikova<\/strong>, Arsen Vasilyan.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2308.14716' target='_blank' rel=\"noopener noreferrer\">Local Lipschitz Filters for Bounded-Range Functions.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Iden Kalemaj, <strong class='group'>Sofya Raskhodnikova<\/strong>, Adam D. Smith 0001, Charalampos E. Tsourakakis.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2304.05890' target='_blank' rel=\"noopener noreferrer\">Node-Differentially Private Estimation of the Number of Connected Components.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Omri Ben-Eliezer, Esty Kelman, Uri Meir, <strong class='group'>Sofya Raskhodnikova<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2311.16566' target='_blank' rel=\"noopener noreferrer\">Property Testing with Online Adversaries.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, <strong class='group'>Marco Gaboardi<\/strong>, Max Hopkins, Russell Impagliazzo, Rex Lei, Toniann Pitassi, <strong class='group'>Satchit Sivakumar<\/strong>, Jessica Sorrell.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2303.12921' target='_blank' rel=\"noopener noreferrer\">Stability is Stable: Connections between Replicability, Privacy, and Adaptive Generalization.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Piotr Berman, Meiram Murzabulatov, <strong class='group'>Sofya Raskhodnikova<\/strong>, Dragos-Florian Ristache.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2312.03681' target='_blank' rel=\"noopener noreferrer\">Testing Connectedness of Images.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, <strong class='group'>Marco Gaboardi<\/strong>, Ludmila Glinskih.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2309.04642' target='_blank' rel=\"noopener noreferrer\">The Complexity of Verifying Boolean Programs as Differentially Private.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'>Talya Eden, Quanquan C. Liu, <strong class='group'>Sofya Raskhodnikova<\/strong>, Adam D. Smith 0001.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2305.02263' target='_blank' rel=\"noopener noreferrer\">Triangle Counting with Local Edge Differential Privacy.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ran Canetti<\/strong>, Amos Fiat, Yannai A. Gonczarowski.<\/span> <a href='https:\/\/doi.org\/10.48550\/arXiv.2302.05590' target='_blank' rel=\"noopener noreferrer\">Zero-Knowledge Mechanisms.<\/a> <span class='venue'>\u2014 CoRR<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, Nadezhda Voronova.<\/span> <a href='https:\/\/eccc.weizmann.ac.il\/report\/2023\/024' target='_blank' rel=\"noopener noreferrer\">Approximate degree lower bounds for oracle identification problems.<\/a> <span class='venue'>\u2014 Electron. Colloquium Comput. Complex.<\/span><\/li>\n<li><span class='authors'>Yang Liu 0039, <strong class='group'>Ji Luo<\/strong>, Yi Yang, Xuan Wang 0002, Mehdi Gheisari, Feng Luo.<\/span> <a href='https:\/\/doi.org\/10.3390\/e25020282' target='_blank' rel=\"noopener noreferrer\">ShrewdAttack: Low Cost High Accuracy Model Extraction.<\/a> <span class='venue'>\u2014 Entropy<\/span><\/li>\n<li><span class='authors'>june wunder, Arthur Azevedo de Amorim, Patrick Baillot, <strong class='group'>Marco Gaboardi<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-30044-8_17' target='_blank' rel=\"noopener noreferrer\">Bunched Fuzz: Sensitivity for Vector Metrics.<\/a> <span class='venue'>\u2014 ESOP<\/span><\/li>\n<li><span class='authors'><strong class='group'>Megan Chen<\/strong>, Alessandro Chiesa, Tom Gur, Jack O&amp;apos;Connor, Nicholas Spooner.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-30617-4_13' target='_blank' rel=\"noopener noreferrer\">Proof-Carrying Data from Arithmetized Random Oracles.<\/a> <span class='venue'>\u2014 EUROCRYPT<\/span><\/li>\n<li><span class='authors'>Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, <strong class='group'>Ran Canetti<\/strong>, Andrew Miller 0001, Arthur Gervais, Dawn Song.<\/span> <a href='https:\/\/doi.org\/10.1109\/EuroSP57164.2023.00017' target='_blank' rel=\"noopener noreferrer\">SoK: Data Sovereignty.<\/a> <span class='venue'>\u2014 EuroS&amp;amp;P<\/span><\/li>\n<li><span class='authors'>Alon Eden, Michal Feldman, <strong class='group'>Kira Goldner<\/strong>, Simon Mauras, Divyarthi Mohan.<\/span> <a href='https:\/\/doi.org\/10.1109\/FOCS57990.2023.00018' target='_blank' rel=\"noopener noreferrer\">Constant Approximation for Private Interdependent Valuations.<\/a> <span class='venue'>\u2014 FOCS<\/span><\/li>\n<li><span class='authors'><strong class='group'>Marco Gaboardi<\/strong>, Femke van Raamsdonk.<\/span> <a href='https:\/\/www.dagstuhl.de\/dagpub\/978-3-95977-277-8' target='_blank' rel=\"noopener noreferrer\">8th International Conference on Formal Structures for Computation and Deduction, FSCD 2023, July 3-6, 2023, Rome, Italy<\/a> <span class='venue'>\u2014 FSCD, LIPIcs<\/span><\/li>\n<li><span class='authors'><strong class='group'>Yiding Zhang<\/strong>, Xiangyuan Wang.<\/span> <a href='https:\/\/doi.org\/10.1109\/Geoinformatics60313.2023.10247796' target='_blank' rel=\"noopener noreferrer\">Spatial and Temporal Evolution of Precipitation and Its Main Driving Factors in Jiangsu Province, China.<\/a> <span class='venue'>\u2014 Geoinformatics<\/span><\/li>\n<li><span class='authors'>Zeyu Liu 0004, <strong class='group'>Eran Tromer<\/strong>, Yunhao Wang.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/534' target='_blank' rel=\"noopener noreferrer\">Group Oblivious Message Retrieval.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Ethan Heilman, Lucie Mugnier, Athanasios Filippidis, <strong class='group'>Sharon Goldberg<\/strong>, Sebastien Lipman, Yuval Marcus, Mike Milano, Sidhartha Premkumar, Chad Unrein.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/296' target='_blank' rel=\"noopener noreferrer\">OpenPubkey: Augmenting OpenID Connect with User held Signing Keys.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, <strong class='group'>Eran Tromer<\/strong>, Boris Zadov, Yuval Elovici.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/1068' target='_blank' rel=\"noopener noreferrer\">Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Julie Ha<\/strong>, Chlo\u00e9 Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller 0001.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/736' target='_blank' rel=\"noopener noreferrer\">Private Eyes: Zero-Leakage Iris Searchable Encryption.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Megan Chen<\/strong>, Alessandro Chiesa, Tom Gur, Jack O&amp;apos;Connor, Nicholas Spooner.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/587' target='_blank' rel=\"noopener noreferrer\">Proof-Carrying Data From Arithmetized Random Oracles.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, <strong class='group'>Ran Canetti<\/strong>, Andrew Miller 0001, Arthur Gervais, Dawn Song.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/967' target='_blank' rel=\"noopener noreferrer\">SoK: Data Sovereignty.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Alishah Chator<\/strong>, Matthew Green 0001, Pratyush Ranjan Tiwari.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/1039' target='_blank' rel=\"noopener noreferrer\">SoK: Privacy-Preserving Signatures.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ran Canetti<\/strong>, Sebastian Kolby, Divya Ravi 0001, Eduardo Soria-Vazquez, Sophia Yakoubov.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/1077' target='_blank' rel=\"noopener noreferrer\">Taming Adaptivity in YOSO Protocols: The Modular Way.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Muhammad Faisal 0001, Jerry Zhang, <strong class='group'>John Liagouris<\/strong>, Vasiliki Kalavri, <strong class='group'>Mayank Varia<\/strong>.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/1120' target='_blank' rel=\"noopener noreferrer\">TVA: A multi-party computation system for secure and expressive time series analytics.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Daniel Luick, John C. Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, <strong class='group'>Eran Tromer<\/strong>, Xiao Wang 0012, Ning Luo.<\/span> <a href='https:\/\/eprint.iacr.org\/2023\/1762' target='_blank' rel=\"noopener noreferrer\">ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge.<\/a> <span class='venue'>\u2014 IACR Cryptol. ePrint Arch.<\/span><\/li>\n<li><span class='authors'>Hadley Black, Iden Kalemaj, <strong class='group'>Sofya Raskhodnikova<\/strong>.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.ICALP.2023.25' target='_blank' rel=\"noopener noreferrer\">Isoperimetric Inequalities for Real-Valued Functions with Applications to Monotonicity Testing.<\/a> <span class='venue'>\u2014 ICALP<\/span><\/li>\n<li><span class='authors'>Talya Eden, Quanquan C. Liu, <strong class='group'>Sofya Raskhodnikova<\/strong>, Adam Smith 0006.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.ICALP.2023.52' target='_blank' rel=\"noopener noreferrer\">Triangle Counting with Local Edge Differential Privacy.<\/a> <span class='venue'>\u2014 ICALP<\/span><\/li>\n<li><span class='authors'>Palak Jain 0004, <strong class='group'>Sofya Raskhodnikova<\/strong>, <strong class='group'>Satchit Sivakumar<\/strong>, Adam D. Smith 0001.<\/span> <a href='https:\/\/proceedings.mlr.press\/v202\/jain23b.html' target='_blank' rel=\"noopener noreferrer\">The Price of Differential Privacy under Continual Observation.<\/a> <span class='venue'>\u2014 ICML<\/span><\/li>\n<li><span class='authors'>Hao Zhang 0008, <strong class='group'>Ji Luo<\/strong>, Mengze Hu, Jun Yan 0009, Jian Zhang 0001, Zongyan Qiu.<\/span> <a href='https:\/\/doi.org\/10.1109\/ICSE48619.2023.00098' target='_blank' rel=\"noopener noreferrer\">Detecting Exception Handling Bugs in C++ Programs.<\/a> <span class='venue'>\u2014 ICSE<\/span><\/li>\n<li><span class='authors'>Pei Jiang 0006, <strong class='group'>Ji Luo<\/strong>, Jiaxing Li, <strong class='group'>Michael Z. Q. Chen<\/strong>, Yonghua Chen, Yang Yang 0031, Rui Chen 0015.<\/span> <a href='https:\/\/doi.org\/10.1109\/TRO.2022.3200550' target='_blank' rel=\"noopener noreferrer\">A Novel Scaffold-Reinforced Actuator With Tunable Attitude Ability for Grasping.<\/a> <span class='venue'>\u2014 IEEE Trans. Robotics<\/span><\/li>\n<li><span class='authors'>Fr\u00e9d\u00e9ric Tuong, Mohammad Omidvar Tehrani, <strong class='group'>Marco Gaboardi<\/strong>, Steven Y. Ko.<\/span> <a href='https:\/\/doi.org\/10.1145\/3597926.3604927' target='_blank' rel=\"noopener noreferrer\">SymRustC: A Hybrid Fuzzer for Rust.<\/a> <span class='venue'>\u2014 ISSTA<\/span><\/li>\n<li><span class='authors'>Zvika Brakerski, <strong class='group'>Ran Canetti<\/strong>, Luowen Qian.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.ITCS.2023.24' target='_blank' rel=\"noopener noreferrer\">On the Computational Hardness Needed for Quantum Cryptography.<\/a> <span class='venue'>\u2014 ITCS<\/span><\/li>\n<li><span class='authors'>Di Wang 0015, Lijie Hu, Huanyu Zhang, <strong class='group'>Marco Gaboardi<\/strong>, Jinhui Xu 0001.<\/span> <a href='https:\/\/jmlr.org\/papers\/v24\/21-0523.html' target='_blank' rel=\"noopener noreferrer\">Generalized Linear Models in Non-interactive Local Differential Privacy with Public Data.<\/a> <span class='venue'>\u2014 J. Mach. Learn. Res.<\/span><\/li>\n<li><span class='authors'>Palak Jain 0004, Iden Kalemaj, <strong class='group'>Sofya Raskhodnikova<\/strong>, <strong class='group'>Satchit Sivakumar<\/strong>, Adam Smith 0006.<\/span> <a href='http:\/\/papers.nips.cc\/paper_files\/paper\/2023\/hash\/0ef1afa0daa888d695dcd5e9513bafa3-Abstract-Conference.html' target='_blank' rel=\"noopener noreferrer\">Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation.<\/a> <span class='venue'>\u2014 NeurIPS<\/span><\/li>\n<li><span class='authors'>Maryam Aliakbarpour, <strong class='group'>Mark Bun<\/strong>, Adam Smith 0006.<\/span> <a href='http:\/\/papers.nips.cc\/paper_files\/paper\/2023\/hash\/9dd67d30e0edd53581363c1b49006e1d-Abstract-Conference.html' target='_blank' rel=\"noopener noreferrer\">Hypothesis Selection with Memory Constraints.<\/a> <span class='venue'>\u2014 NeurIPS<\/span><\/li>\n<li><span class='authors'><strong class='group'>John Liagouris<\/strong>, Vasiliki Kalavri, Muhammad Faisal 0001, <strong class='group'>Mayank Varia<\/strong>.<\/span> <a href='https:\/\/www.usenix.org\/conference\/nsdi23\/presentation\/liagouris' target='_blank' rel=\"noopener noreferrer\">SECRECY: Secure collaborative analytics in untrusted clouds.<\/a> <span class='venue'>\u2014 NSDI<\/span><\/li>\n<li><span class='authors'>Du Tang, Zhen Wu, Shuangyue Liu, <strong class='group'>Jiating Luo<\/strong>, <strong class='group'>Ji Luo<\/strong>, Bofang Zheng, Yaojun Qiao.<\/span> <a href='https:\/\/doi.org\/10.23919\/OFC49934.2023.10116724' target='_blank' rel=\"noopener noreferrer\">Learned Perturbation-Aided Advanced Digital Backpropagation with Nonlinear Compensation Fusion for Subcarrier-Multiplexing Systems.<\/a> <span class='venue'>\u2014 OFC<\/span><\/li>\n<li><span class='authors'>Iden Kalemaj, <strong class='group'>Sofya Raskhodnikova<\/strong>, Adam D. Smith 0001, Charalampos E. Tsourakakis.<\/span> <a href='https:\/\/doi.org\/10.1145\/3584372.3588671' target='_blank' rel=\"noopener noreferrer\">Node-Differentially Private Estimation of the Number of Connected Components.<\/a> <span class='venue'>\u2014 PODS<\/span><\/li>\n<li><span class='authors'><strong class='group'>Marika Swanberg<\/strong>, Damien Desfontaines, Samuel Haney.<\/span> <a href='https:\/\/doi.org\/10.56553\/popets-2023-0109' target='_blank' rel=\"noopener noreferrer\">DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection.<\/a> <span class='venue'>\u2014 Proc. Priv. Enhancing Technol.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Julia Guskind<\/strong>, Walter O. Krawec.<\/span> <a href='https:\/\/doi.org\/10.1109\/QCE57702.2023.00137' target='_blank' rel=\"noopener noreferrer\">Semi-Quantum Random Number Generation.<\/a> <span class='venue'>\u2014 QCE<\/span><\/li>\n<li><span class='authors'><strong class='group'>Sharon Goldberg<\/strong>, <strong class='group'>Leonid Reyzin<\/strong>, Dimitrios Papadopoulos 0001, Jan Vcel\u00e1k.<\/span> <a href='https:\/\/doi.org\/10.17487\/RFC9381' target='_blank' rel=\"noopener noreferrer\">Verifiable Random Functions (VRFs).<\/a> <span class='venue'>\u2014 RFC<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, <strong class='group'>Marco Gaboardi<\/strong>, Max Hopkins, Russell Impagliazzo, Rex Lei, Toniann Pitassi, <strong class='group'>Satchit Sivakumar<\/strong>, Jessica Sorrell.<\/span> <a href='https:\/\/doi.org\/10.1145\/3564246.3585246' target='_blank' rel=\"noopener noreferrer\">Stability Is Stable: Connections between Replicability, Privacy, and Adaptive Generalization.<\/a> <span class='venue'>\u2014 STOC<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ran Canetti<\/strong>, Sebastian Kolby, Divya Ravi 0001, Eduardo Soria-Vazquez, Sophia Yakoubov.<\/span> <a href='https:\/\/doi.org\/10.1007\/978-3-031-48618-0_2' target='_blank' rel=\"noopener noreferrer\">Taming Adaptivity in YOSO Protocols: The Modular Way.<\/a> <span class='venue'>\u2014 TCC<\/span><\/li>\n<li><span class='authors'>Iden Kalemaj, <strong class='group'>Sofya Raskhodnikova<\/strong>, Nithin Varma 0001.<\/span> <a href='https:\/\/doi.org\/10.4086\/toc.2023.v019a001' target='_blank' rel=\"noopener noreferrer\">Sublinear-Time Computation in the Presence of Online Erasures.<\/a> <span class='venue'>\u2014 Theory Comput.<\/span><\/li>\n<li><span class='authors'><strong class='group'>Mark Bun<\/strong>, Nadezhda Voronova.<\/span> <a href='https:\/\/doi.org\/10.4230\/LIPIcs.TQC.2023.1' target='_blank' rel=\"noopener noreferrer\">Approximate Degree Lower Bounds for Oracle Identification Problems.<\/a> <span class='venue'>\u2014 TQC<\/span><\/li>\n<li><span class='authors'><strong class='group'>Ji Luo<\/strong>, Yiling Hu 0003, Chengzhao Yu, Chaopeng Hong, Xiao-Ping Zhang 0002, Xinlei Chen.<\/span> <a href='https:\/\/doi.org\/10.1145\/3594739.3612908' target='_blank' rel=\"noopener noreferrer\">Field Reconstruction-Based Non-Rendezvous Calibration for Low Cost Mobile Sensors.<\/a> <span class='venue'>\u2014 UbiComp\/ISWC Adjunct<\/span><\/li>\n<li><span class='authors'>Santiago Cu\u00e9llar, Bill Harris, James Parker, Stuart Pernsteiner, <strong class='group'>Eran Tromer<\/strong>.<\/span> <a href='https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/cuellar' target='_blank' rel=\"noopener noreferrer\">Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities.<\/a> <span class='venue'>\u2014 USENIX Security Symposium<\/span><\/li>\n<li><span class='authors'>Jonathan Prokos, Neil Fendley, Matthew Green 0001, Roei Schuster, <strong class='group'>Eran Tromer<\/strong>, Tushar M. Jois, Yinzhi Cao.<\/span> <a href='https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/prokos' target='_blank' rel=\"noopener noreferrer\">Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning.<\/a> <span class='venue'>\u2014 USENIX Security Symposium<\/span><\/li>\n<li><span class='authors'>Muhammad Faisal 0001, Jerry Zhang, <strong class='group'>John Liagouris<\/strong>, Vasiliki Kalavri, <strong class='group'>Mayank Varia<\/strong>.<\/span> <a href='https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/faisal' target='_blank' rel=\"noopener noreferrer\">TVA: A multi-party computation system for secure and expressive time series analytics.<\/a> <span class='venue'>\u2014 USENIX Security Symposium<\/span><\/li>\n<\/ol><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>BUSEC Publications 2023\u20132025 Recent publications collected from DBLP for BUSEC faculty, postdocs, and graduate students. 2025 Maryam Aliakbarpour, Konstantina Bairaktari, Adam Smith 0006, Marika Swanberg, Jonathan R. Ullman. Privacy in Metalearning and Multitask Learning: Modeling and Separations. \u2014 AISTATS Julie Ha, Chlo\u00e9 Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller 0001. Private Eyes: Zero-Leakage Iris Searchable [&hellip;]<\/p>\n","protected":false},"author":5698,"featured_media":0,"parent":2981,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/pages\/3387"}],"collection":[{"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/users\/5698"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/comments?post=3387"}],"version-history":[{"count":51,"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/pages\/3387\/revisions"}],"predecessor-version":[{"id":22096,"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/pages\/3387\/revisions\/22096"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/pages\/2981"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/cs\/wp-json\/wp\/v2\/media?parent=3387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}