• Publications
  • Influence
Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples
TLDR
We introduce the notion of dependent differential privacy (DDP) that accounts for the dependence that exists between tuples and propose a dependent perturbation mechanism (DPM) to achieve the privacy guarantees in DDP. Expand
  • 107
  • 16
  • PDF
An up-to-date comparison of state-of-the-art classification algorithms
TLDR
We compare the accuracy of 11 classification algorithms pairwise and groupwise. Expand
  • 156
  • 6
  • PDF
Hedging with Futures Contracts in a Deregulated Electricity Industry
This paper is a statistical study of direct and cross hedging strategies using futures contracts in an electricity market. A comparison of the strategies is based on the standard deviation or risk ofExpand
  • 121
  • 4
LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships
TLDR
We design LinkMirage, a system that mediates privacy-preserving access to social relationships and provides untrusted external applications with an obfuscated view of the social relationship graph while preserving graph utility. Expand
  • 36
  • 2
  • PDF
PARS: A Uniform and Open-source Password Analysis and Research System
TLDR
We introduce an open-source and modular password analysis and research system, PARS, which provides a uniform, comprehensive and scalable research platform for password security. Expand
  • 21
  • 2
  • PDF
Exploiting Temporal Dynamics in Sybil Defenses
TLDR
Sybil attacks present a significant threat to many Internet systems and applications, in which a single adversary inserts multiple colluding identities in the system to compromise security and privacy. Expand
  • 29
  • 1
  • PDF
Sparse Frequency Diverse MIMO Radar Imaging for Off-Grid Target Based on Adaptive Iterative MAP
TLDR
We propose a novel approach of sparse adaptive calibration recovery via iterative maximum a posteriori (SACR-iMAP) for the general off-grid FD-MIMO radar imaging. Expand
  • 20
  • 1
  • PDF
DEEProtect: Enabling Inference-based Access Control on Mobile Sensing Applications
TLDR
We present DEEProtect, a framework that enables a novel form of inference control, in which mobile apps with access to sensor data are limited (provably) in their ability to make inferences about user's sensitive data and behavior. Expand
  • 18
  • 1
  • PDF
Zoledronic acid increases bone mineral density and improves health-related quality of life over two years of treatment in Chinese women with postmenopausal osteoporosis.
INTRODUCTION Osteoporosis is characterised by decreased bone mass and weakened bones, with an increased risk of fractures. Osteoporotic fracture, the most serious complication of osteoporosis, isExpand
  • 10
  • 1
Blind De-anonymization Attacks using Social Networks
TLDR
We propose a novel structure-based de-anonymization attack, which does not require the attacker to have prior information (e.g., seeds). Expand
  • 12
  • 1
  • PDF