Publications 2018

  • M Sepehri, A Trombetta, M Sepehri, E Damiani An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme International Conference on Availability, Reliability and Security (2018) [PDF]
  • Federico Buffoni, Gabriele Gianini, Ernesto Damiani, Michael GranitzerAll-implicants Neural Networks for Efficient Boolean Function Representation IEEE ICCC/IEEE 2018 World Congress on Services [PDF
  • Planche Benjamin, Xuejian Rong, Ziyan Wu, Srikrishna Karanam, Harald Kosch, YingLi Tian, Andreas Hutter, and Jan Ernst: Incremental Scene Synthesis. arXiv preprint arXiv:1811.12297 (2018). [PDF]
  • Planche Benjamin, Sergey Zakharov, Ziyan Wu, Andreas Hutter, Harald Kosch, and Slobodan Ilic: Seeing Beyond Appearance-Mapping Real Images into Geometrical Domains for Unsupervised CAD-based Recognition. arXiv preprint arXiv:1810.04158 (2018). [PDF]
  • Zakharov  Sergey, Benjamin Planche, Ziyan Wu, Andreas Hutter, Harald Kosch, and Slobodan Ilic: Keep it Unreal: Bridging the Realism Gap for 2.5 D Recognition with Geometry Priors Only. arXiv preprint arXiv:1804.09113 (2018). [PDF]
  • Vincent Primault, Mohamed Maouche, Antoine Boutet, Sonia Ben Mokhtar, Sara Bouchenak, Lionel Brunie: ACCIO: How to Make Location Privacy Experimentation Open and Easy. ICDCS 2018: 896-906 [PDF]
  • Mohamed Maouche, Sonia Ben Mokhtar, Sara Bouchenak: HMC: Robust Privacy Protection of Mobility Data against Multiple Re-Identification Attacks. IMWUT 2(3): 124:1-124:25 (2018) [PDF]
  • Masoomeh Sepehri, Alberto Trombetta, Maryam Sepehri, Ernesto Damiani: An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme. ARES 2018: 12:1-12:10 [PDF]
  • Vincent Primault, Mohamed Maouche, Antoine Boutet, Sonia Ben Mokhtar, Sara Bouchenak, Lionel Brunie: ACCIO: How to Make Location Privacy Experimentation Open and Easy. ICDCS 2018: 896-906
  • J. Stier, G. Gianini, M. Granitzer, K. Ziegler. Analysing Neural Network Topologies: a Game Theoretic Approach In. Procedia Computer Science, vol. 126, pp. 234-243, 2018.
  • M. Garchery, M. Granitzer. On the influence of categorical features in ranking anomalies using mixed data In. Procedia Computer Science, vol. 126, pp. 77-86, 2018.
  • A. Gerl, N. Bennani, H. Kosch, L.Brunie. LPL, Towards a GDPR-Compliant Privacy Language: Formal Definition and Usage Springer-Verlag GmbH Germany, part of Springer Nature 2018, 2018, Transactions on Large-Scale Databases and Knowledge-Centered Systems (TLDKS) XXXVII , pp. 1-40
  • Armin Gerl, Florian Prey LPL Personal Privacy Policy User Interface: Design and Evaluation Mensch und Computer 2018 – Tagungsband, Gesellschaft für Informatik e.V., 2018
  • A. Gerl, D. Pohl. Critical Analysis of LPL according to Articles 12 – 14 of the GDPR International Conference on Availability, Reliability and Security (ARES) 2018 (iE)
  • A. Gerl. Extending Layered Privacy Language to Support Privacy Icons for a Personal Privacy Policy User Interface In. Proceedings of British HCI 2018, BCS Learning and Development Ltd., Belfast, UK, 2018
  • V. Charpenay, S. Käbisch, H. Kosch. Towards a Binary Object Notation for RDF The Semantic Web. ESWC 2018.
  • J. Jurgovsky, M. Granitzer, K. Ziegler, S. Calabretto, P.-E. Portier, L. He-Guelton, O. Caelen. Sequence classification for credit-card fraud detection Expert Systems With Applications 100: 234-245 (2018)
  • D. Nurbakova, L. Laporte, S. Calabretto, J. Gensel. Recommandation de séquences d’activités pendant des événements distribués CORIA-TALN 2018: 16pp