What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Erman Ayday
Google Scholar
30
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/esorics
A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization.
Osama Zafar
Mina Namazi
Yuqiao Xu
Youngjin Yoo
Erman Ayday
2024
journals/popets
AUTOLYCUS: Exploiting Explainable Artificial Intelligence (XAI) for Model Extraction Attacks against Interpretable Models.
Abdullah Çaglar Öksüz
Anisa Halimi
Erman Ayday
2024
journals/popets
Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data.
Tianxi Ji
Erman Ayday
Emre Yilmaz
Pan Li
2024
conf/ccs
WPES '24: 23rd Workshop on Privacy in the Electronic Society (WPES).
Erman Ayday
Jaideep Vaidya
2024
conf/esorics
Privacy-Preserving Optimal Parameter Selection for Collaborative Clustering.
Maryam Ghasemian
Erman Ayday
2023
journals/popets
Robust Fingerprint of Privacy-Preserving Location Trajectories.
Yuzhou Jiang
Emre Yilmaz
Erman Ayday
2023
conf/ndss
Privacy-Preserving Database Fingerprinting.
Tianxi Ji
Erman Ayday
Emre Yilmaz
Ming Li
Pan Li
2022
journals/popets
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Anisa Halimi
Leonard Dervishi
Erman Ayday
Apostolos Pyrgelis
Juan Ramón Troncoso-Pastoriza
Jean-Pierre Hubaux
Xiaoqian Jiang
Jaideep Vaidya
2022
conf/uss
Back-Propagating System Dependency Impact for Attack Investigation.
Pengcheng Fang
Peng Gao
Changlin Liu
Erman Ayday
Kangkook Jee
Ting Wang
Yanfang (Fanny) Ye
Zhuotao Liu
Xusheng Xiao
2022
conf/esorics
Privacy-Preserving Link Prediction.
Didem Demirag
Mina Namazi
Erman Ayday
Jeremy Clark
2021
journals/popets
Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons.
Kerem Ayoz
Erman Ayday
A. Ercüment Çiçek
2020
conf/esorics
Tracking the Invisible: Privacy-Preserving Contact Tracing to Control the Spread of a Virus.
Didem Demirag
Erman Ayday
2020
conf/esorics
Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation.
Anisa Halimi
Erman Ayday
2020
conf/icics
Profile Matching Across Online Social Networks.
Anisa Halimi
Erman Ayday
2019
conf/fc
One-Time Programs Made Practical.
Lianying Zhao
Joseph I. Choi
Didem Demirag
Kevin R. B. Butler
Mohammad Mannan
Erman Ayday
Jeremy Clark
2017
conf/cns
Privacy-preserving fog computing paradigm.
Nabil Abubaker
Leonard Dervishi
Erman Ayday
2016
conf/ccs
Privacy and Security in the Genomic Era.
Erman Ayday
Jean-Pierre Hubaux
2016
conf/fc
Cryptographic Solutions for Genomic Privacy.
Erman Ayday
2015
journals/popets
De-anonymizing Genomic Databases Using Phenotypic Traits.
Mathias Humbert
Kévin Huguenin
Joachim Hugonot
Erman Ayday
Jean-Pierre Hubaux
2015
conf/ccs
Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies.
Florian Tramèr
Zhicong Huang
Jean-Pierre Hubaux
Erman Ayday
2015
conf/fc
On Non-cooperative Genomic Privacy.
Mathias Humbert
Erman Ayday
Jean-Pierre Hubaux
Amalio Telenti
2015
conf/sp
GenoGuard: Protecting Genomic Data against Brute-Force Attacks.
Zhicong Huang
Erman Ayday
Jacques Fellay
Jean-Pierre Hubaux
Ari Juels
2015
conf/sp
Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations.
Sahel Shariati Samani
Zhicong Huang
Erman Ayday
Mark J. Elliot
Jacques Fellay
Jean-Pierre Hubaux
Zoltán Kutalik
2015
conf/sp
Privacy Threats and Practical Solutions for Genetic Risk Tests.
Ludovic Barman
Mohammed Taha Elgraini
Jean Louis Raisaro
Jean-Pierre Hubaux
Erman Ayday
2015
conf/esorics
Can you Really Anonymize the Donors of Genomic Data in Today's Digital World?
Mohammed Alser
Nour Almadhoun
Azita Nouri
Can Alkan
Erman Ayday
2014
conf/ccs
Controlled Functional Encryption.
Muhammad Naveed
Shashank Agrawal
Manoj Prabhakaran
XiaoFeng Wang
Erman Ayday
Jean-Pierre Hubaux
Carl A. Gunter
2013
conf/ccs
Addressing the concerns of the lacks family: quantification of kin genomic privacy.
Mathias Humbert
Erman Ayday
Jean-Pierre Hubaux
Amalio Telenti
2013
conf/uss
Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data.
Erman Ayday
Jean Louis Raisaro
Paul J. McLaren
Jacques Fellay
Jean-Pierre Hubaux
2013
conf/esorics
Privacy-Preserving Processing of Raw Genomic Data.
Erman Ayday
Jean Louis Raisaro
Urs Hengartner
Adam Molyneaux
Jean-Pierre Hubaux
2013
conf/ndss
Privacy-Enhancing Technologies for Medical Tests Using Genomic Data.
Erman Ayday
Jean Louis Raisaro
Jean-Pierre Hubaux
Coauthors
A. Ercüment Çiçek
(1)
Abdullah Çaglar Öksüz
(1)
Adam Molyneaux
(1)
Amalio Telenti
(2)
Anisa Halimi
(4)
Apostolos Pyrgelis
(1)
Ari Juels
(1)
Azita Nouri
(1)
Can Alkan
(1)
Carl A. Gunter
(1)
Changlin Liu
(1)
Didem Demirag
(3)
Emre Yilmaz
(3)
Erman Ayday
(30)
Florian Tramèr
(1)
Jacques Fellay
(3)
Jaideep Vaidya
(2)
Jean Louis Raisaro
(4)
Jean-Pierre Hubaux
(13)
Jeremy Clark
(2)
Joachim Hugonot
(1)
Joseph I. Choi
(1)
Juan Ramón Troncoso-Pastoriza
(1)
Kangkook Jee
(1)
Kerem Ayoz
(1)
Kévin Huguenin
(1)
Kevin R. B. Butler
(1)
Leonard Dervishi
(2)
Lianying Zhao
(1)
Ludovic Barman
(1)
Manoj Prabhakaran
(1)
Mark J. Elliot
(1)
Maryam Ghasemian
(1)
Mathias Humbert
(3)
Mina Namazi
(2)
Ming Li
(1)
Mohammad Mannan
(1)
Mohammed Alser
(1)
Mohammed Taha Elgraini
(1)
Muhammad Naveed
(1)
Nabil Abubaker
(1)
Nour Almadhoun
(1)
Osama Zafar
(1)
Pan Li
(2)
Paul J. McLaren
(1)
Peng Gao
(1)
Pengcheng Fang
(1)
Sahel Shariati Samani
(1)
Shashank Agrawal
(1)
Tianxi Ji
(2)
Ting Wang
(1)
Urs Hengartner
(1)
XiaoFeng Wang
(1)
Xiaoqian Jiang
(1)
Xusheng Xiao
(1)
Yanfang (Fanny) Ye
(1)
Youngjin Yoo
(1)
Yuqiao Xu
(1)
Yuzhou Jiang
(1)
Zhicong Huang
(3)
Zhuotao Liu
(1)
Zoltán Kutalik
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to