î•ñƒWƒ‡ƒEƒzƒEƒZƒLƒ…ƒŠƒeƒB“ÁƒgƒN˜_ƒƒ“
‹e’rƒLƒNƒ`@_–¾ƒqƒƒAƒL
‰ÎƒJƒˆƒE—jƒQƒcƒˆƒE3ŒÀƒQƒ“@313 ‹³ŽºƒLƒ‡ƒEƒVƒc@(2017”Ntƒnƒ‹ƒZƒƒXƒ^[j
No Date @ Contents Author Issue Keyword
1 2017/4/11 @ Guidance @ @ @
2 2017/4/18 @ Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries Giulia Fanti  and Vasyl Pihur and _lfar Erlingsson PETs 16 ƒvƒ‰ƒCƒoƒV[C@Šm—¦˜_ƒJƒNƒŠƒcƒƒ“
@ 2017/4/25 @ ‹xuƒLƒ…ƒEƒRƒE @ @ @
@ 2017/5/2 @ j“úƒVƒ…ƒNƒWƒc @ @ @
3 2017/5/9 @ Linking Health Records for Federated Query Processing Rinku Dewri , Toan Ong,  and Ramakrishna Thurimella  PETs 16 ˆÃ†ƒAƒ“ƒSƒEƒvƒƒgƒRƒ‹Cƒvƒ‰ƒCƒoƒV[
4 2017/5/16 @ Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites Rick Wash and Emilee Rader, Michigan State University; Ruthie Berman, Macalester College; Zac Wellmer Soups 16 ƒpƒXƒ[ƒhC’²¸ƒ`ƒ‡ƒEƒT
5 2017/5/23 @ You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors Neil Zhenqiang Gong, Iowa State University; Bin Liu, Rutgers University Usenix 16 SNS, ‘®«ƒ]ƒNƒZƒC„’èƒXƒCƒeƒC
6 2017/5/30 @ Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner, University of Washington Usenix 16 Tracking, ƒvƒ‰ƒCƒoƒV[
7 2017/6/6 @ Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose, The University of North Carolina at Chapel Hill Usenix 16 VR, ŠçƒJƒI”FŽ¯ƒjƒ“ƒVƒL
8 2017/6/13 @ Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir Memon, Mustaque Ahamad NDSS 17 CPS, IoT, ƒlƒbƒgƒ[ƒNƒZƒLƒ…ƒŠƒeƒB
9 2017/6/20 @ P2P Mixing and Unlinkable Bitcoin Transactions Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate NDSS 17 ˆÃ†ƒAƒ“ƒSƒE’ʉ݃cƒEƒJC“½–¼«ƒgƒNƒƒCƒZƒC
10 2017/6/27 @ On the Instability of Bitcoin Without the Block Reward Miles Carlsten Harry Kalodner S. Matthew Weinberg Arvind Narayanan CCS 16 ƒrƒbƒgƒRƒCƒ“C’²¸ƒ`ƒ‡ƒEƒT
11 2017/7/4 @ Prepose: Privacy, Security, and Reliability for Gesture-Based Programming Lucas Silva Figueiredo; Benjamin Livshits; David Molnar; Margus Veanes IEEESP 16 ”FØƒjƒ“ƒVƒ‡ƒECƒWƒFƒXƒ`ƒƒ[
@ 2017/7/11 @ ‹xuƒLƒ…ƒEƒRƒE @ @ @
12 2017/7/18 @ Users Really Do Plug in USB Drives They Find Matthew Tischer; Zakir Durumeric; Sam Foster; Sunny Duan; Alec Mori; Elie Bursztein; Michael Bailey IEEESP 16 lŠÔƒjƒ“ƒQƒ“—v‘fƒˆƒEƒ\C’²¸ƒ`ƒ‡ƒEƒT
13 2017/7/25 @ Cloak of Visibility: Detecting When Machines Browse a Different Web Luca Invernizzi; Kurt Thomas; Alexandros Kapravelos; Oxana Comanescu; Jean-Michel Picod; Elie Bursztein IEEESP 16 ƒEƒFƒuCƒNƒ[ƒLƒ“ƒO’²¸ƒ`ƒ‡ƒEƒT
14 •âuƒzƒRƒE @ Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints Pierre Laperdrix; Walter Rudametkin; Benoit Baudry IEEESP 16 ƒEƒFƒuCŽ¯•ÊƒVƒLƒxƒc
@ @ @ @ @ @ @
¦ IEEESP (IEEE Symposium on Security and Privacy)
CCS (ACM conference on computer and communications security)
KDD (ACM SIGKDD Int. Conference on Knowledge Discovery and Data Mining)
ECiInternational Cryptology Conference EUROCRYPT)
ASIACCSiACM@Symposium on InformAtion, Compuer and Communications Security)
ICISC(International Conference on Information Security and Cryptology)
CRYPTO (IACR International Cryptology Conference)
CT-RSA(RSA Security Conference Cryptographers Track)
RAID(Recent Advances in Intrusion Detection)
PAKDD (Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
CCSW (ACM workshop on Cloud computing security)