Select Publications

Journal articles

Buchholz E; Abuadbba A; Wang S; Nepal S; Kanhere SS, 2024, 'SoK: Can Trajectory Generation Combine Privacy and Utility?', Proceedings on Privacy Enhancing Technologies, 2024, pp. 75 - 93, http://dx.doi.org/10.56553/popets-2024-0068

Conference Papers

D'Silva N; Shahi T; Dokk Husveg OT; Sanjeeve A; Buchholz E; Kanhere SS, 2024, 'Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement', in 2024 17th International Conference on Security of Information and Networks Sin 2024, http://dx.doi.org/10.1109/SIN63213.2024.10871881

Merhi J; Buchholz E; Kanhere SS, 2024, 'Synthetic Trajectory Generation Through Convolutional Neural Networks', in 2024 21st Annual International Conference on Privacy Security and Trust Pst 2024, http://dx.doi.org/10.1109/PST62714.2024.10788061

Buchholz E; Abuadbba A; Wang S; Nepal S; Kanhere SS, 2022, 'Reconstruction Attack on Differential Private Trajectory Protection Mechanisms', in ACM International Conference Proceeding Series, pp. 279 - 292, http://dx.doi.org/10.1145/3564625.3564628

Pennekamp J; Buchholz E; Lockner Y; Dahlmanns M; Xi T; Fey M; Brecher C; Hopmann C; Wehrle K, 2020, 'Privacy-Preserving Production Process Parameter Exchange', in ACM International Conference Proceeding Series, pp. 510 - 525, http://dx.doi.org/10.1145/3427228.3427248

Matzutt R; Pennekamp J; Buchholz E; Wehrle K, 2020, 'Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services', in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security Asia Ccs 2020, pp. 531 - 542, http://dx.doi.org/10.1145/3320269.3384729

Pennekamp J; Buchholz E; Dahlmanns M; Kunze I; Braun S; Wagner E; Brockmann M; Wehrle K; Henze M, 2020, 'Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use', in Proceedings 2020 Learning from Authoritative Security Experiment Results Workshop, Applied Computer Security Associates, presented at Learning from Authoritative Security Experiment Results, http://dx.doi.org/10.14722/laser-acsac.2020.23088

Preprints

Buchholz E; Fernandes N; Nguyen DD; Abuadbba A; Nepal S; Kanhere SS, 2025, What is the Cost of Differential Privacy for Deep Learning-Based Trajectory Generation?, http://dx.doi.org/10.48550/arxiv.2506.09312

D'Silva N; Shahi T; Husveg ØTD; Sanjeeve A; Buchholz E; Kanhere SS, 2024, Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement, http://dx.doi.org/10.48550/arxiv.2409.14645

Merhi J; Buchholz E; Kanhere SS, 2024, Synthetic Trajectory Generation Through Convolutional Neural Networks, http://dx.doi.org/10.48550/arxiv.2407.16938

Buchholz E; Abuadbba A; Wang S; Nepal S; Kanhere SS, 2024, SoK: Can Trajectory Generation Combine Privacy and Utility?, http://dx.doi.org/10.48550/arxiv.2403.07218

Buchholz E; Abuadbba A; Wang S; Nepal S; Kanhere SS, 2022, Reconstruction Attack on Differential Private Trajectory Protection Mechanisms, http://dx.doi.org/10.1145/3564625.3564628

Pennekamp J; Buchholz E; Dahlmanns M; Kunze I; Braun S; Wagner E; Brockmann M; Wehrle K; Henze M, 2021, Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use, http://dx.doi.org/10.48550/arxiv.2112.11417

Matzutt R; Pennekamp J; Buchholz E; Wehrle K, 2020, Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services, http://dx.doi.org/10.48550/arxiv.2004.06386


Back to profile page