Publications

Export 287 results:
Sort by: Author Title Type [ Year  (Desc)]
2010
Veugen T. Encrypted Integer Division. In: IEEE Workshop on Information Forensics and Security (WIFS'10). IEEE Workshop on Information Forensics and Security (WIFS'10). Seattle; 2010. Available at: http://wifs10.org/. Download: Encrypted integer division.pdf (181.46 KB)
Erkin Z, Beye M, Veugen T, Lagendijk RL. Efficiently Computing Private Recommendations. Advanced School of Computing and Imaging. 2010;2010. Download: ASCI10.pdf (100.9 KB)
Heule MJH, Verwer SE. Exact DFA identification using SAT solvers. In: Grammatical Inference: Theoretical Results and Applications (ICGI). Grammatical Inference: Theoretical Results and Applications (ICGI).; 2010:66–79.
Verwer SE, de Weerdt M, Witteveen C. A likelihood-ratio test for identifying probabilistic deterministic real-time automata from positive data. In: Grammatical Inference: Theoretical Results and Applications (ICGI). Grammatical Inference: Theoretical Results and Applications (ICGI).; 2010:203–216.
Pechenizkiy M, Tesanovic A, Manev G, et al. Patient condition modeling in remote patient management: Hospitalization prediction. In: Adjunct Proceedings of 18th International Conference on User Modeling, Adaptation, and Personalization: Posters and Demonstrations. Adjunct Proceedings of 18th International Conference on User Modeling, Adaptation, and Personalization: Posters and Demonstrations.; 2010:34–36.
Erkin Z, Beye M, Veugen T, Lagendijk RL. Privacy Enhanced Recommender System. In: Thirty-first Symposium on Information Theory in the Benelux. Thirty-first Symposium on Information Theory in the Benelux. Rotterdam; 2010:35-42. Download: EBVL10a.pdf (113.95 KB)
Blenn N, von Festenberg N, Spehr M, Gumhold S. A tool for automatic preprocessing stereoscopic-video. In: IS&T/SPIE Electronic Imaging. IS&T/SPIE Electronic Imaging.; 2010:75241J–75241J.
2009
Mitrokotsa A, Douligeris C. Integrated RFID and Sensor Networks: Architectures and Applications. In: Zhang Y, Yang LT, Chen J RFID and Sensor Networks: Architectures, Protocols, Security and Integrations. RFID and Sensor Networks: Architectures, Protocols, Security and Integrations.; 2009:511-535. Abstract  Download: AU7777_C018.pdf (509.66 KB)
Mitrokotsa A, Rieback MR, Tanenbaum AS. Classifying RFID Attacks and Defenses. Special Issue on Advances in RFID Technology, Information Systems Frontiers. 2009. Abstract  Download: ISF2009.pdf (621.63 KB)
Dimitrakakis C, Mitrokotsa A. Statistical Decision Making for Authentication and Intrusion Detection. In: Proceedings of the 8th IEEE International Conference on Machine Learning and Applications (ICMLA 2009). Proceedings of the 8th IEEE International Conference on Machine Learning and Applications (ICMLA 2009). Miami, FL, USA; 2009:To Appear. Abstract  Download: icmla_attacker_model.pdf (110.57 KB)
Erkin Z, Franz M, Guajardo J, et al. Privacy-Preserving Face Recognition Goldberg I, Atallah M. 9th International Symposium on Privacy Enhancing Technologies. 2009:235-253. Download: pet2009.pdf (232.64 KB); Implementation codes (8.25 MB)