ORCID as entered in ROS

Select Publications
2024, 'SoK: Can Trajectory Generation Combine Privacy and Utility?', Proceedings on Privacy Enhancing Technologies, 2024, pp. 75 - 93, http://dx.doi.org/10.56553/popets-2024-0068
,2024, 'Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement', in 2024 17th International Conference on Security of Information and Networks Sin 2024, http://dx.doi.org/10.1109/SIN63213.2024.10871881
,2024, 'Synthetic Trajectory Generation Through Convolutional Neural Networks', in 2024 21st Annual International Conference on Privacy Security and Trust Pst 2024, http://dx.doi.org/10.1109/PST62714.2024.10788061
,2022, 'Reconstruction Attack on Differential Private Trajectory Protection Mechanisms', in ACM International Conference Proceeding Series, pp. 279 - 292, http://dx.doi.org/10.1145/3564625.3564628
,2020, 'Privacy-Preserving Production Process Parameter Exchange', in ACM International Conference Proceeding Series, pp. 510 - 525, http://dx.doi.org/10.1145/3427228.3427248
,2020, 'Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services', in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security Asia Ccs 2020, pp. 531 - 542, http://dx.doi.org/10.1145/3320269.3384729
,2020, 'Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use', in Proceedings 2020 Learning from Authoritative Security Experiment Results Workshop, Applied Computer Security Associates, presented at Learning from Authoritative Security Experiment Results, http://dx.doi.org/10.14722/laser-acsac.2020.23088
,2025, What is the Cost of Differential Privacy for Deep Learning-Based Trajectory Generation?, http://dx.doi.org/10.48550/arxiv.2506.09312
,2024, Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement, http://dx.doi.org/10.48550/arxiv.2409.14645
,2024, Synthetic Trajectory Generation Through Convolutional Neural Networks, http://dx.doi.org/10.48550/arxiv.2407.16938
,2024, SoK: Can Trajectory Generation Combine Privacy and Utility?, http://dx.doi.org/10.48550/arxiv.2403.07218
,2022, Reconstruction Attack on Differential Private Trajectory Protection Mechanisms, http://dx.doi.org/10.1145/3564625.3564628
,2021, Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use, http://dx.doi.org/10.48550/arxiv.2112.11417
,2020, Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services, http://dx.doi.org/10.48550/arxiv.2004.06386
,